Analysis
-
max time kernel
61s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 06:26
Static task
static1
Behavioral task
behavioral1
Sample
e7c31cd054f469c689a28cdaf1f3c50e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e7c31cd054f469c689a28cdaf1f3c50e.exe
Resource
win10v2004-20230220-en
General
-
Target
e7c31cd054f469c689a28cdaf1f3c50e.exe
-
Size
1.1MB
-
MD5
e7c31cd054f469c689a28cdaf1f3c50e
-
SHA1
f251f739b449975a67d06aac65b1ef54e7f661ee
-
SHA256
0c58c80d4e98864168be4d8c4eb795994d7964a8f7835ca9043167c8d232aaa2
-
SHA512
1e9a132f37fde3799bd4b5c172575cb15f4b9dbd76230511ca80be11537793f584cb25b3c97357847798a64ad66834872a4a1417bb97917a29e7c948d410cea1
-
SSDEEP
6144:S+i0XUaVUOAOx/7hMRLE0ewMMMMxMMGMf+/sAdO27t9vC:S+i0XD/7qRg0ehMMMxMMGMGs4O4C
Malware Config
Extracted
redline
135.181.173.163:4325
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3240 set thread context of 2692 3240 e7c31cd054f469c689a28cdaf1f3c50e.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 1756 3240 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 RegSvcs.exe 2692 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3240 wrote to memory of 2692 3240 e7c31cd054f469c689a28cdaf1f3c50e.exe 83 PID 3240 wrote to memory of 2692 3240 e7c31cd054f469c689a28cdaf1f3c50e.exe 83 PID 3240 wrote to memory of 2692 3240 e7c31cd054f469c689a28cdaf1f3c50e.exe 83 PID 3240 wrote to memory of 2692 3240 e7c31cd054f469c689a28cdaf1f3c50e.exe 83 PID 3240 wrote to memory of 2692 3240 e7c31cd054f469c689a28cdaf1f3c50e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7c31cd054f469c689a28cdaf1f3c50e.exe"C:\Users\Admin\AppData\Local\Temp\e7c31cd054f469c689a28cdaf1f3c50e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 2602⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3240 -ip 32401⤵PID:1812