Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 13:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
292KB
-
MD5
ad1ff967c5ea7d2c78e48c2782c59b5f
-
SHA1
8bae7900f4b59f18f8468fd4c979882c2add36f8
-
SHA256
882c10d3523f6e5060248ec72183a1e8fee42122f2688958c3fe27404bb9119c
-
SHA512
f33e9a859b2afab9062534d4e05ebb20aeb1563e97335dab8dd9cfc5ca83b867dc4476173348e679b03f4df39b3c38d75601f7067363d8254cb761650b4aae81
-
SSDEEP
3072:JxuFjXVCnN9/OnkGZLaSCFy9ChX6XIHGMGyv1whEwr3BpY8eLa0TqlQij/tqgIax:J8ZUN3ALa++q4vvwr3Bppe5qqiRqg
Malware Config
Extracted
redline
pushka6
176.123.9.142:14845
-
auth_value
6f874eb6bb4aec568dfa7c320c6ee354
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 1272 1344 file.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1860 1344 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1272 AppLaunch.exe 1272 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1272 AppLaunch.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1272 1344 file.exe 29 PID 1344 wrote to memory of 1860 1344 file.exe 30 PID 1344 wrote to memory of 1860 1344 file.exe 30 PID 1344 wrote to memory of 1860 1344 file.exe 30 PID 1344 wrote to memory of 1860 1344 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 362⤵
- Program crash
PID:1860
-