Analysis
-
max time kernel
83s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
318KB
-
MD5
34c735aac13c12757a8e954f87f6852c
-
SHA1
5d0c1b22263578abf5a9cf9f2b8327dd91dc3935
-
SHA256
82b28da9dd8874b827052827a6a1214ec59689001373a71c9f7dfb8b3f56c3df
-
SHA512
a20437e1f984ca5f1087c8f8e88fc53484b93910847f2c2c691421fd5fd3857832e44f5d204f43f228ce83585033dd9eac48948d9f4c574c06cdbebf112d6571
-
SSDEEP
6144:ZPKnmlp1JPMWi7Q0VMxWwkTUI1LfXk0mTv:ZjlpHMWKQ0VgWwkTFXkd
Score
10/10
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/764-134-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 764 2044 file.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 764 AppLaunch.exe 764 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 764 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2044 wrote to memory of 764 2044 file.exe 88 PID 2044 wrote to memory of 764 2044 file.exe 88 PID 2044 wrote to memory of 764 2044 file.exe 88 PID 2044 wrote to memory of 764 2044 file.exe 88 PID 2044 wrote to memory of 764 2044 file.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-