Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 22:11
Static task
static1
Behavioral task
behavioral1
Sample
9744d48a89a883ff6ca3a33dc419001b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9744d48a89a883ff6ca3a33dc419001b.exe
Resource
win10v2004-20230220-en
General
-
Target
9744d48a89a883ff6ca3a33dc419001b.exe
-
Size
295KB
-
MD5
9744d48a89a883ff6ca3a33dc419001b
-
SHA1
e0d406538b3fa79ac96f07ceb0ff8bd99fdc7438
-
SHA256
2ed78a7170336d23af7b56c93a0c38c7c041e135ee38f52375a61a3245eb02ce
-
SHA512
d405499ca967acb632846a8a7d4e19251b26abfc4b8f037ec40f48274d2651b72399644a394ebbecbb2b242f728fc5116b4e7b3ed28c22730c091f3a12d02740
-
SSDEEP
3072:U1L/wDkkPHR8Vhuy+tQ+ZV2BX7PhHVD0SH2VWS6cYDT6QALnxGL6L5RR26l11Uq+:o8vRvtQ8YX7Ph1D0SWVWS6cYCLnmj
Malware Config
Extracted
redline
135.181.173.163:4324
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1900 2032 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1712 AppLaunch.exe 1712 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 AppLaunch.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1712 2032 9744d48a89a883ff6ca3a33dc419001b.exe 29 PID 2032 wrote to memory of 1900 2032 9744d48a89a883ff6ca3a33dc419001b.exe 30 PID 2032 wrote to memory of 1900 2032 9744d48a89a883ff6ca3a33dc419001b.exe 30 PID 2032 wrote to memory of 1900 2032 9744d48a89a883ff6ca3a33dc419001b.exe 30 PID 2032 wrote to memory of 1900 2032 9744d48a89a883ff6ca3a33dc419001b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9744d48a89a883ff6ca3a33dc419001b.exe"C:\Users\Admin\AppData\Local\Temp\9744d48a89a883ff6ca3a33dc419001b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 362⤵
- Program crash
PID:1900
-