Analysis
-
max time kernel
54s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/02/2023, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe
Resource
win10-20220812-en
General
-
Target
650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe
-
Size
1.3MB
-
MD5
88472c005bdfa43a03ef843ab75ec661
-
SHA1
0e536c0e1f5de122ca22de0c7b164f9fb6368c3b
-
SHA256
650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e
-
SHA512
6e5211efbe14925550bf71b78741c2643c5b1a022bbdb6e0ea80a6961678d1b64984304b2d0ae35e7b949fed9d80f749a74ec409dc46af6299366b8f12a03825
-
SSDEEP
24576:Zlf4Qknt/xAfoqRBkXlSlj3mk4a9YUEBg+KWHxLA34penxHQOl+z92HoBqtUu0/k:ZlfpOyf/Q1+j3mkJStQ4GwOlQ2HySUr
Malware Config
Extracted
redline
HEXO-CLIENTS
amrican-sport-live-stream.cc:4581
-
auth_value
c89aa436caaa4074b5f219890c543d38
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/2696-160-0x00000000058B0000-0x0000000005B2C000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 InstallUtil.exe 3668 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe Token: SeDebugPrivilege 3668 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67 PID 2696 wrote to memory of 3668 2696 650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe"C:\Users\Admin\AppData\Local\Temp\650ada27b894204248d0af32365b2f400e4a19244293ef54c439d2c54345449e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-