Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2023 18:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
702KB
-
MD5
75b9806a4dcac3cd2db78ea61f4391e3
-
SHA1
d551e0dd927a240a757ccfcb0540d446eb60f59d
-
SHA256
4a6233c912ff669059c5b9b3ab52e5d603033b3bd4f10f4eb50622d37c164242
-
SHA512
bb4d106b62b21e68fbe6959b7b5dc00ac01116e96a1bc891b916a2f07a4adcba10513bbc57a2b7689b41508ea34584acb4424cad5e69d4e5b9b4778210bc773f
-
SSDEEP
12288:j2shISEAQgsPfg64uVQPTpxRFDKofu4vC:j2shIUQgsPfYpJS4a
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
smokiez
C2
194.169.175.232:45450
Attributes
-
auth_value
7b7d8a036038ab89b98f422d559b4f8f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2076 set thread context of 4276 2076 file.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 2796 2076 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4276 AppLaunch.exe 4276 AppLaunch.exe 4276 AppLaunch.exe 4276 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4276 AppLaunch.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2076 wrote to memory of 4448 2076 file.exe 90 PID 2076 wrote to memory of 4448 2076 file.exe 90 PID 2076 wrote to memory of 4448 2076 file.exe 90 PID 2076 wrote to memory of 4276 2076 file.exe 91 PID 2076 wrote to memory of 4276 2076 file.exe 91 PID 2076 wrote to memory of 4276 2076 file.exe 91 PID 2076 wrote to memory of 4276 2076 file.exe 91 PID 2076 wrote to memory of 4276 2076 file.exe 91 PID 2076 wrote to memory of 4276 2076 file.exe 91 PID 2076 wrote to memory of 4276 2076 file.exe 91 PID 2076 wrote to memory of 4276 2076 file.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 1482⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2076 -ip 20761⤵PID:1640