Analysis
-
max time kernel
107s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
nitrogen.exe
Resource
win10v2004-20231023-en
9 signatures
120 seconds
General
-
Target
nitrogen.exe
-
Size
564KB
-
MD5
25af44a770129f892ae848f39b1382b4
-
SHA1
ab3a11cbaa8b9ee9072b3d7ca406ed1a76032fd9
-
SHA256
da02ca08066fcaba7be915dd04fb03a3f1ef494fcb9931ee93db500e00280872
-
SHA512
a968770e878b9c68c82768bd1a71bb003770bfa88704f37a5272b3592d08479384dc84714535fa3445373c0c0abb2143d86c6f559d1ce8f352b25b2470927bb9
-
SSDEEP
12288:MOHlJFblyvSOgVA4TQS03ULaHNqrxlKIQNoZZJ6Ku5gMKmRxgDMkr:LHFlyavVA4TkEaHNYK3u6vFLgb
Score
10/10
Malware Config
Extracted
Family
redline
C2
193.203.202.185:20856
Attributes
-
auth_value
662246af7f290874d3816d23ebbc55c1
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2108 set thread context of 2180 2108 nitrogen.exe 85 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2184 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2184 taskmgr.exe Token: SeSystemProfilePrivilege 2184 taskmgr.exe Token: SeCreateGlobalPrivilege 2184 taskmgr.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2180 2108 nitrogen.exe 85 PID 2108 wrote to memory of 2180 2108 nitrogen.exe 85 PID 2108 wrote to memory of 2180 2108 nitrogen.exe 85 PID 2108 wrote to memory of 2180 2108 nitrogen.exe 85 PID 2108 wrote to memory of 2180 2108 nitrogen.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\nitrogen.exe"C:\Users\Admin\AppData\Local\Temp\nitrogen.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2180
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2184