Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2023 11:56
Static task
static1
Behavioral task
behavioral1
Sample
06677899.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
06677899.exe
Resource
win10v2004-20230221-en
General
-
Target
06677899.exe
-
Size
1.1MB
-
MD5
05d2607674b12556392ad7d31c498bb2
-
SHA1
6a30c01505a666f109502e563df48287fc68af7b
-
SHA256
dc4df62efb7c9b410401653297e66098809afa302874d98711b82e20864a8049
-
SHA512
4f9019a34c89cc49b29ae808e272a5acb5e6bb18b4369cf826cc2ce46b41586418494ad535ef7d95408c86ff468457bb5227db619b0c64381172b3eecb77f549
-
SSDEEP
6144:vhMIAaYKyQdiU+oboLaSORJ3k5QH2rCfdOrAOGLNf9C42PVWI/L6VGuXZ:vhMvaYTQdiU+oboLLuiELNOPVWIzmfZ
Malware Config
Extracted
redline
2
95.216.249.153:81
-
auth_value
101013a5e99e0857595aae297a11351d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1292 set thread context of 1460 1292 06677899.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 436 1292 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1460 RegSvcs.exe 1460 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1460 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 1460 1292 06677899.exe 28 PID 1292 wrote to memory of 436 1292 06677899.exe 29 PID 1292 wrote to memory of 436 1292 06677899.exe 29 PID 1292 wrote to memory of 436 1292 06677899.exe 29 PID 1292 wrote to memory of 436 1292 06677899.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\06677899.exe"C:\Users\Admin\AppData\Local\Temp\06677899.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 482⤵
- Program crash
PID:436
-