Malware Analysis Report

2025-03-15 04:59

Sample ID 240713-nxd4mszanl
Target b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe
SHA256 b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187
Tags
redline vip-data infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187

Threat Level: Known bad

The file b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe was found to be: Known bad.

Malicious Activity Summary

redline vip-data infostealer

RedLine payload

RedLine

Suspicious use of SetThreadContext

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-13 11:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-13 11:46

Reported

2024-07-13 11:48

Platform

win7-20240708-en

Max time kernel

144s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1820 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\system32\WerFault.exe
PID 1820 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\system32\WerFault.exe
PID 1820 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\system32\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe

"C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 1820 -s 624

Network

Country Destination Domain Proto
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp

Files

memory/1820-0-0x000007FEF5143000-0x000007FEF5144000-memory.dmp

memory/1820-1-0x0000000000280000-0x000000000028A000-memory.dmp

memory/1820-2-0x000000001B210000-0x000000001B21A000-memory.dmp

memory/1820-3-0x00000000020E0000-0x0000000002184000-memory.dmp

memory/1820-4-0x000007FEF5140000-0x000007FEF5B2C000-memory.dmp

memory/2072-7-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2072-5-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2072-14-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2072-17-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2072-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2072-11-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2072-9-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2072-15-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2072-18-0x0000000073FFE000-0x0000000073FFF000-memory.dmp

memory/2072-19-0x0000000073FF0000-0x00000000746DE000-memory.dmp

memory/1820-20-0x000007FEF5143000-0x000007FEF5144000-memory.dmp

memory/1820-21-0x000007FEF5140000-0x000007FEF5B2C000-memory.dmp

memory/2072-22-0x0000000073FFE000-0x0000000073FFF000-memory.dmp

memory/2072-23-0x0000000073FF0000-0x00000000746DE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-13 11:46

Reported

2024-07-13 11:48

Platform

win10v2004-20240709-en

Max time kernel

142s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1632 set thread context of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4408 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1632 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe

"C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp
US 212.162.149.77:1912 tcp

Files

memory/1632-0-0x00007FFADD683000-0x00007FFADD685000-memory.dmp

memory/1632-1-0x0000024A6C0C0000-0x0000024A6C0CA000-memory.dmp

memory/1632-2-0x0000024A6E630000-0x0000024A6E63A000-memory.dmp

memory/1632-3-0x0000024A6E4C0000-0x0000024A6E564000-memory.dmp

memory/1632-4-0x00007FFADD680000-0x00007FFADE141000-memory.dmp

memory/4408-5-0x0000000000400000-0x0000000000452000-memory.dmp

memory/4408-6-0x0000000074CCE000-0x0000000074CCF000-memory.dmp

memory/4408-7-0x00000000056F0000-0x0000000005C94000-memory.dmp

memory/4408-8-0x0000000005070000-0x0000000005102000-memory.dmp

memory/1632-9-0x00007FFADD680000-0x00007FFADE141000-memory.dmp

memory/4408-10-0x0000000074CC0000-0x0000000075470000-memory.dmp

memory/4408-11-0x0000000005150000-0x000000000515A000-memory.dmp

memory/4408-12-0x0000000006680000-0x0000000006C98000-memory.dmp

memory/4408-13-0x00000000063E0000-0x00000000064EA000-memory.dmp

memory/4408-14-0x0000000006340000-0x0000000006352000-memory.dmp

memory/4408-15-0x00000000063A0000-0x00000000063DC000-memory.dmp

memory/4408-16-0x0000000006500000-0x000000000654C000-memory.dmp

memory/4408-17-0x0000000074CCE000-0x0000000074CCF000-memory.dmp

memory/4408-18-0x0000000074CC0000-0x0000000075470000-memory.dmp