Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 10:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.0MB
-
MD5
c44085d4f410b0335bfd853629159a98
-
SHA1
6de766aca6eea98ddd1ac940c8110ef83c6df94b
-
SHA256
63cebbe380cf99272e0d8eb7a3ed9b84633a3eaa048484ab83019b570e711383
-
SHA512
2cbb0d64464c56fdaae34f77a2eb0f624b5ce7eb5c558d8d9104e1ae7d79f18bd1405bacca33737213ea37bc715c51629fd67a5ae3cea705f82800ea6f419d14
-
SSDEEP
12288:AsDd2dAHOvLBwvJ5ykrqJd0YSFYvtZ4tGxHXm0luGwGKblxzxDBA4Aa5ou:1J2dAHOvLBwvjYSIYkX4lfd75B
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
smokiez
C2
194.169.175.232:45450
Attributes
-
auth_value
7b7d8a036038ab89b98f422d559b4f8f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4296 set thread context of 5072 4296 file.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3548 4296 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5072 AppLaunch.exe 5072 AppLaunch.exe 5072 AppLaunch.exe 5072 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5072 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4296 wrote to memory of 5072 4296 file.exe 83 PID 4296 wrote to memory of 5072 4296 file.exe 83 PID 4296 wrote to memory of 5072 4296 file.exe 83 PID 4296 wrote to memory of 5072 4296 file.exe 83 PID 4296 wrote to memory of 5072 4296 file.exe 83 PID 4296 wrote to memory of 5072 4296 file.exe 83 PID 4296 wrote to memory of 5072 4296 file.exe 83 PID 4296 wrote to memory of 5072 4296 file.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 2402⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4296 -ip 42961⤵PID:2472