Analysis
-
max time kernel
290s -
max time network
313s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
04-10-2023 07:07
Static task
static1
Behavioral task
behavioral1
Sample
j3160085.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
j3160085.exe
Resource
win10-20230831-en
General
-
Target
j3160085.exe
-
Size
390KB
-
MD5
4b307137183cd33be6ac81af694721ba
-
SHA1
ba1c9d62e7e97447c9c140e0df9574b1f9705a78
-
SHA256
a09a8f63ea1e5aa0da9567588c9a9f6b8c5f587a24ce603612b9aebc31637f66
-
SHA512
e5e3d8203f8801f698a1006f7976041219efb0269b63e5f714041488a3a302adcce5c22f221f2b5e349cdec2d4bf1e2520ead1b9606f0ace44c51c6875b1a3d8
-
SSDEEP
6144:YvXFo/N5ExgFbNOUAHEHIXbLvZAOixYPdgz0Tjxdy8MVs0BC+:IwDExgFY5vx0xudG0/q8Is0BC+
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
j3160085.exedescription pid process target process PID 4348 set thread context of 1840 4348 j3160085.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4748 4348 WerFault.exe j3160085.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
j3160085.exedescription pid process target process PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe PID 4348 wrote to memory of 1840 4348 j3160085.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\j3160085.exe"C:\Users\Admin\AppData\Local\Temp\j3160085.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 2522⤵
- Program crash
PID:4748
-