Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17/02/2023, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
Hogwarts Legacy by EMPRESS/Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Hogwarts Legacy by EMPRESS/Setup.exe
Resource
win10v2004-20220812-en
General
-
Target
Hogwarts Legacy by EMPRESS/Setup.exe
-
Size
249KB
-
MD5
a0744e6b91a6458df48aa0fe03ab6bab
-
SHA1
604a00dfa1a6672bf63c349c4214ccb41d4089b8
-
SHA256
482dca82f5b76d68a3486d7559a2e904b33a713e46ed9c08713cbf1829df9f12
-
SHA512
c59093825bc87b480a3f91e10b49fb5461d19721536d3c8e14de787616de79e0ec95308a886220659436dcc3be479a669c81ef5e6f658910758189ce294c0be0
-
SSDEEP
6144:Dm0YBSHhC398bZq1aoENPcrjcvj4z7fqHBbQ:DnUq88bZo/rAb4zjqHBb
Malware Config
Extracted
redline
45.15.157.131:36457
-
auth_value
f4bbe99787a086a2bbc36d534a2de4f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 1048 1672 Setup.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 AppLaunch.exe 1048 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29 PID 1672 wrote to memory of 1048 1672 Setup.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hogwarts Legacy by EMPRESS\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Hogwarts Legacy by EMPRESS\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-