Analysis Overview
SHA256
cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0
Threat Level: Known bad
The file cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0 was found to be: Known bad.
Malicious Activity Summary
RedLine
Suspicious use of SetThreadContext
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-09-25 01:41
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-25 01:41
Reported
2023-09-25 01:49
Platform
win7-20230831-en
Max time kernel
290s
Max time network
302s
Command Line
Signatures
RedLine
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2396 set thread context of 880 | N/A | C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe
"C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 92
Network
| Country | Destination | Domain | Proto |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp |
Files
memory/880-0-0x0000000000400000-0x0000000000430000-memory.dmp
memory/880-1-0x0000000000400000-0x0000000000430000-memory.dmp
memory/880-2-0x0000000000400000-0x0000000000430000-memory.dmp
memory/880-3-0x0000000000400000-0x0000000000430000-memory.dmp
memory/880-5-0x0000000000400000-0x0000000000430000-memory.dmp
memory/880-4-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
memory/880-9-0x0000000000400000-0x0000000000430000-memory.dmp
memory/880-7-0x0000000000400000-0x0000000000430000-memory.dmp
memory/880-10-0x0000000074000000-0x00000000746EE000-memory.dmp
memory/880-11-0x00000000003C0000-0x00000000003C6000-memory.dmp
memory/880-12-0x0000000000CF0000-0x0000000000D30000-memory.dmp
memory/880-13-0x0000000074000000-0x00000000746EE000-memory.dmp
memory/880-14-0x0000000000CF0000-0x0000000000D30000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-09-25 01:41
Reported
2023-09-25 01:49
Platform
win10-20230915-en
Max time kernel
290s
Max time network
306s
Command Line
Signatures
RedLine
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 5072 set thread context of 5036 | N/A | C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe
"C:\Users\Admin\AppData\Local\Temp\cbd638a1495365200c2f32f608cdbb4e07264dc13e3e3a3985eb0494d93390a0.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 244
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | c.c.c.c.c.c.c.c.c.c.c.c.c.c.c.c.5.6.5.6.2.7.6.4.8.0.8.0.8.0.8.0.ip6.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.121.18.2.in-addr.arpa | udp |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| US | 8.8.8.8:53 | 126.209.247.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 253.15.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| GB | 51.38.95.107:42494 | tcp |
Files
memory/5036-0-0x0000000000400000-0x0000000000430000-memory.dmp
memory/5036-4-0x0000000073B80000-0x000000007426E000-memory.dmp
memory/5036-5-0x0000000006C20000-0x0000000006C26000-memory.dmp
memory/5036-6-0x000000000EC50000-0x000000000F256000-memory.dmp
memory/5036-7-0x000000000E7E0000-0x000000000E8EA000-memory.dmp
memory/5036-8-0x00000000092B0000-0x00000000092C0000-memory.dmp
memory/5036-9-0x000000000E710000-0x000000000E722000-memory.dmp
memory/5036-10-0x000000000E770000-0x000000000E7AE000-memory.dmp
memory/5036-11-0x000000000E8F0000-0x000000000E93B000-memory.dmp
memory/5036-16-0x0000000073B80000-0x000000007426E000-memory.dmp
memory/5036-17-0x00000000092B0000-0x00000000092C0000-memory.dmp