Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21-09-2023 18:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
702KB
-
MD5
75b9806a4dcac3cd2db78ea61f4391e3
-
SHA1
d551e0dd927a240a757ccfcb0540d446eb60f59d
-
SHA256
4a6233c912ff669059c5b9b3ab52e5d603033b3bd4f10f4eb50622d37c164242
-
SHA512
bb4d106b62b21e68fbe6959b7b5dc00ac01116e96a1bc891b916a2f07a4adcba10513bbc57a2b7689b41508ea34584acb4424cad5e69d4e5b9b4778210bc773f
-
SSDEEP
12288:j2shISEAQgsPfg64uVQPTpxRFDKofu4vC:j2shIUQgsPfYpJS4a
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
smokiez
C2
194.169.175.232:45450
Attributes
-
auth_value
7b7d8a036038ab89b98f422d559b4f8f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 320 set thread context of 2704 320 file.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1172 320 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2704 AppLaunch.exe 2704 AppLaunch.exe 2704 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 AppLaunch.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 2704 320 file.exe 29 PID 320 wrote to memory of 1172 320 file.exe 30 PID 320 wrote to memory of 1172 320 file.exe 30 PID 320 wrote to memory of 1172 320 file.exe 30 PID 320 wrote to memory of 1172 320 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 922⤵
- Program crash
PID:1172
-