Analysis
-
max time kernel
31s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2023 07:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
5a21c827846f6b65822ee160ef78a7d2
-
SHA1
adbc123ed0dc041aa59ddd453d33a65c359852b1
-
SHA256
ae51ea26d95791314f8c8d951cd30e652382c4412a38d51bcbc599e1258d8d41
-
SHA512
69e5f8a88ba384ce3e44626d2d70186e2decd100bd165cc5c476c549927c517c8f44aa360b668b6947b48ca9e2f4799aebc6822e6df1d61d42bca1a1f27594ba
-
SSDEEP
6144:3PW4G7RKIR+td7M88qakp5SAOG+8KFD/M0F5oWGNJdRJoqDDp:3+4G7RKS+tVSh5Fg0FyNBJo6p
Score
10/10
Malware Config
Extracted
Family
redline
C2
45.15.157.131:36457
Attributes
-
auth_value
08264892194987982eda5ef8c0ccf9bc
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 832 set thread context of 1100 832 file.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2036 832 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1100 RegSvcs.exe 1100 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1100 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 1100 832 file.exe 29 PID 832 wrote to memory of 2036 832 file.exe 30 PID 832 wrote to memory of 2036 832 file.exe 30 PID 832 wrote to memory of 2036 832 file.exe 30 PID 832 wrote to memory of 2036 832 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 362⤵
- Program crash
PID:2036
-