Analysis Overview
SHA256
f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf
Threat Level: Known bad
The file f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf was found to be: Known bad.
Malicious Activity Summary
RedLine
Suspicious use of SetThreadContext
Unsigned PE
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-09-10 22:20
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2023-09-10 22:20
Reported
2023-09-10 22:28
Platform
win10-20230831-en
Max time kernel
289s
Max time network
303s
Command Line
Signatures
RedLine
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 520 set thread context of 5108 | N/A | C:\Users\Admin\AppData\Local\Temp\f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf.exe
"C:\Users\Admin\AppData\Local\Temp\f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 212
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 133.121.18.2.in-addr.arpa | udp |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| GB | 51.89.253.22:31098 | tcp | |
| US | 8.8.8.8:53 | 38.148.119.40.in-addr.arpa | udp |
| GB | 51.89.253.22:31098 | tcp | |
| US | 8.8.8.8:53 | 35.197.79.40.in-addr.arpa | udp |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp |
Files
memory/5108-0-0x0000000000400000-0x0000000000430000-memory.dmp
memory/5108-4-0x00000000738C0000-0x0000000073FAE000-memory.dmp
memory/5108-5-0x0000000006B40000-0x0000000006B46000-memory.dmp
memory/5108-6-0x000000000EB60000-0x000000000F166000-memory.dmp
memory/5108-7-0x000000000E660000-0x000000000E76A000-memory.dmp
memory/5108-9-0x00000000091C0000-0x00000000091D0000-memory.dmp
memory/5108-8-0x000000000E570000-0x000000000E582000-memory.dmp
memory/5108-10-0x000000000E5D0000-0x000000000E60E000-memory.dmp
memory/5108-11-0x000000000E610000-0x000000000E65B000-memory.dmp
memory/5108-16-0x00000000738C0000-0x0000000073FAE000-memory.dmp
memory/5108-17-0x00000000091C0000-0x00000000091D0000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-10 22:20
Reported
2023-09-10 22:27
Platform
win7-20230831-en
Max time kernel
290s
Max time network
302s
Command Line
Signatures
RedLine
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1964 set thread context of 2228 | N/A | C:\Users\Admin\AppData\Local\Temp\f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf.exe
"C:\Users\Admin\AppData\Local\Temp\f408ed71ed8bcd42edfec72d0ea8dd6bd9eaf3dc198fc492a20f6b98555bedbf.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
Network
| Country | Destination | Domain | Proto |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp | |
| GB | 51.89.253.22:31098 | tcp |
Files
memory/2228-0-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2228-1-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2228-2-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2228-3-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2228-4-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
memory/2228-5-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2228-7-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2228-9-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2228-10-0x00000000740A0000-0x000000007478E000-memory.dmp
memory/2228-11-0x0000000000310000-0x0000000000316000-memory.dmp
memory/2228-12-0x0000000004940000-0x0000000004980000-memory.dmp
memory/2228-13-0x00000000740A0000-0x000000007478E000-memory.dmp
memory/2228-14-0x0000000004940000-0x0000000004980000-memory.dmp