Analysis Overview
SHA256
437631f5368601d9c03477626b970cc746815a50a5bb87066c422e61bef5feb0
Threat Level: Known bad
The file 437631f5368601d9c03477626b970cc746815a50a5bb87066c422e61bef5feb0 was found to be: Known bad.
Malicious Activity Summary
RedLine payload
RedLine
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious use of SetThreadContext
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-21 21:59
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-21 21:59
Reported
2024-05-21 22:02
Platform
win7-20240221-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2924 wrote to memory of 2944 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2924 wrote to memory of 2944 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2924 wrote to memory of 2944 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2924 wrote to memory of 2944 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2924 wrote to memory of 2944 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2924 wrote to memory of 2944 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2924 wrote to memory of 2944 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\437631f5368601d9c03477626b970cc746815a50a5bb87066c422e61bef5feb0.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\437631f5368601d9c03477626b970cc746815a50a5bb87066c422e61bef5feb0.dll,#1
Network
Files
memory/2944-0-0x0000000075400000-0x00000000754C1000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-21 21:59
Reported
2024-05-21 22:02
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
154s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 916 set thread context of 1584 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\437631f5368601d9c03477626b970cc746815a50a5bb87066c422e61bef5feb0.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\437631f5368601d9c03477626b970cc746815a50a5bb87066c422e61bef5feb0.dll,#1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| NL | 194.26.232.43:20746 | tcp | |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.129:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.232.26.194.in-addr.arpa | udp |
| NL | 23.62.61.129:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 129.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 131.211.222.173.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 27.178.89.13.in-addr.arpa | udp |
Files
memory/1584-1-0x0000000000520000-0x0000000000572000-memory.dmp
memory/916-2-0x0000000077B81000-0x0000000077CA1000-memory.dmp
memory/1584-3-0x0000000074D2E000-0x0000000074D2F000-memory.dmp
memory/1584-4-0x0000000005110000-0x00000000056B4000-memory.dmp
memory/1584-5-0x0000000004C00000-0x0000000004C92000-memory.dmp
memory/1584-6-0x0000000004BE0000-0x0000000004BEA000-memory.dmp
memory/1584-7-0x0000000074D20000-0x00000000754D0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Tmp4E10.tmp
| MD5 | 1420d30f964eac2c85b2ccfe968eebce |
| SHA1 | bdf9a6876578a3e38079c4f8cf5d6c79687ad750 |
| SHA256 | f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9 |
| SHA512 | 6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8 |
memory/1584-24-0x00000000058C0000-0x0000000005936000-memory.dmp
memory/1584-25-0x0000000005FC0000-0x0000000005FDE000-memory.dmp
memory/1584-28-0x0000000006600000-0x0000000006C18000-memory.dmp
memory/1584-29-0x0000000006150000-0x000000000625A000-memory.dmp
memory/1584-30-0x0000000006090000-0x00000000060A2000-memory.dmp
memory/1584-31-0x00000000060F0000-0x000000000612C000-memory.dmp
memory/1584-32-0x0000000006260000-0x00000000062AC000-memory.dmp
memory/1584-33-0x00000000063A0000-0x0000000006406000-memory.dmp
memory/1584-36-0x00000000065A0000-0x00000000065F0000-memory.dmp
memory/1584-37-0x0000000007060000-0x0000000007222000-memory.dmp
memory/1584-38-0x0000000007960000-0x0000000007E8C000-memory.dmp
memory/1584-40-0x0000000074D20000-0x00000000754D0000-memory.dmp