Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
372KB
-
MD5
6e1c8047cd8888ad27dd34d430cf1485
-
SHA1
8d56c99a6ca73e88e6e68e90ba9435a622451726
-
SHA256
56d8611936d8264b3fab9451f57ed8ef5bfcab43a2a1d14c6faf5556bedbccf1
-
SHA512
f97b63b97fbc0a0e80538102e79a534924df44ad4cb001b1a5be92fd0addcdcf4512e4b2705e3d57a4d652a7db7cdec0fc448282be6134c607f1b72600edb44d
-
SSDEEP
3072:J/YVvMvV9YX80mAOMQLFyXQPkuOev5fjCYNDHUk0MSCM2qGW4W3Itqggax:J/i0NslOWevxjBD0o/bqhkqg
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
2703-doZKey
C2
137.184.30.252:81
Attributes
-
auth_value
189276e9cea60fd1b41a08d2c5e93c2e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4028 set thread context of 2868 4028 file.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 684 4028 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 AppLaunch.exe 2868 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4028 wrote to memory of 2868 4028 file.exe 86 PID 4028 wrote to memory of 2868 4028 file.exe 86 PID 4028 wrote to memory of 2868 4028 file.exe 86 PID 4028 wrote to memory of 2868 4028 file.exe 86 PID 4028 wrote to memory of 2868 4028 file.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 1362⤵
- Program crash
PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4028 -ip 40281⤵PID:4652