Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
Autoplay.exe
Resource
win7-20230621-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Autoplay.exe
Resource
win10v2004-20230621-en
7 signatures
150 seconds
General
-
Target
Autoplay.exe
-
Size
954KB
-
MD5
b2336173f2aff00a213adac912a25002
-
SHA1
d4d609124b8944ce71058cce5e6a11c32512d15a
-
SHA256
2d9d480842e4838d2c53fabfa04fb9b6c7f0592a8ff81d4704f257696a6aaa1c
-
SHA512
a08dfdb4422df0e40b72b9075cf2333fa5f802ef93a93e8ec41b4d09debe112f8e969329eb4613bb3316875b7649a24abe0c57f10e44d0eb52bcacb979ee5c9e
-
SSDEEP
6144:BeBIRrYhNNeRi1s1DIO++q0jUOc8GG1GGyGQGTGGrGGhG4tWX:BeBIMQQ1EDl+L0wdMWX
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
@elvinps
C2
94.142.138.4:80
Attributes
-
auth_value
340dbc2c535b0544884964a214045bd5
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5112 set thread context of 2140 5112 Autoplay.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 4508 5112 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2140 AppLaunch.exe 2140 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5112 wrote to memory of 2140 5112 Autoplay.exe 86 PID 5112 wrote to memory of 2140 5112 Autoplay.exe 86 PID 5112 wrote to memory of 2140 5112 Autoplay.exe 86 PID 5112 wrote to memory of 2140 5112 Autoplay.exe 86 PID 5112 wrote to memory of 2140 5112 Autoplay.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Autoplay.exe"C:\Users\Admin\AppData\Local\Temp\Autoplay.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 5762⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5112 -ip 51121⤵PID:1012