Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
OwnCheat.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
OwnCheat.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
OwnCheat.exe
-
Size
524KB
-
MD5
59e24336505eff626ece7419c9314d1e
-
SHA1
70c4294e910f9e2980c45989c349c625a9fb82b0
-
SHA256
5d8813c8888c16b7fd0a4a71b54b2037cb12570ee9ef96d50cfacb4c7bfe926e
-
SHA512
4602d33d9c73f135ff29ecfc4966f72c44a10428c49d2bb77714ccca0792b1ea9e5aaa250ebc1717c8051296d2b37cbd8c6744a42d2b934c0acfdb360a7b4050
-
SSDEEP
12288:uKVvbfv5NToZQRDJV4hNAsDGrakzBP666juEO:rD5N8kP4hNAsK22P666jut
Score
10/10
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/460-1-0x0000000000400000-0x000000000044A000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 460 2060 OwnCheat.exe 93 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 460 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2060 wrote to memory of 4644 2060 OwnCheat.exe 92 PID 2060 wrote to memory of 4644 2060 OwnCheat.exe 92 PID 2060 wrote to memory of 4644 2060 OwnCheat.exe 92 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93 PID 2060 wrote to memory of 460 2060 OwnCheat.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\OwnCheat.exe"C:\Users\Admin\AppData\Local\Temp\OwnCheat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3640,i,14648456027158448592,4956305794400220180,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:81⤵PID:4616