Analysis
-
max time kernel
149s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
123.exe
Resource
win10v2004-20230220-en
General
-
Target
123.exe
-
Size
704.3MB
-
MD5
8584416cd8d5c7095bd38831d775ae4b
-
SHA1
6bfa29983d6d5f345156a435ac52df25d2335b5c
-
SHA256
f5854b5b708d95d228d7c67643b4693d633f03515a5bcbcb69c995aac3bbe224
-
SHA512
4c4f04a5423b39d2d53aa6e6c513e45d71e73d7fee2d7ac388a02e198e1259e581d8177882dee26cc884b95e8eaa81776724470200772c4fd4d16d1fc3058fe8
-
SSDEEP
98304:mdDHuBJUPXfOZtVyqMLyut+vVxKaDOpZlehjfOeEhiG:+DHuBqvfQtAqMNyxpOIh4hiG
Malware Config
Extracted
redline
@gramms_CC 14/06
5.42.64.70:45663
-
auth_value
7415b604399dcb01a5a0788cf91d64ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5072 set thread context of 1152 5072 123.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1152 vbc.exe 1152 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 vbc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 1152 5072 123.exe 88 PID 5072 wrote to memory of 404 5072 123.exe 89 PID 5072 wrote to memory of 404 5072 123.exe 89 PID 5072 wrote to memory of 404 5072 123.exe 89 PID 5072 wrote to memory of 4932 5072 123.exe 92 PID 5072 wrote to memory of 4932 5072 123.exe 92 PID 5072 wrote to memory of 4932 5072 123.exe 92 PID 5072 wrote to memory of 752 5072 123.exe 91 PID 5072 wrote to memory of 752 5072 123.exe 91 PID 5072 wrote to memory of 752 5072 123.exe 91 PID 4932 wrote to memory of 1084 4932 cmd.exe 95 PID 4932 wrote to memory of 1084 4932 cmd.exe 95 PID 4932 wrote to memory of 1084 4932 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Local\Temp\foe"2⤵PID:404
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\123.exe" "C:\Users\Admin\AppData\Local\Temp\foe\foe.exe"2⤵PID:752
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 25 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\foe\foe.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 25 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\foe\foe.exe'" /f3⤵
- Creates scheduled task(s)
PID:1084
-
-