Analysis Overview
SHA256
b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187
Threat Level: Known bad
The file b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe was found to be: Known bad.
Malicious Activity Summary
RedLine payload
RedLine
Suspicious use of SetThreadContext
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-07-13 11:46
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-13 11:46
Reported
2024-07-13 11:48
Platform
win7-20240708-en
Max time kernel
144s
Max time network
147s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1820 set thread context of 2072 | N/A | C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe
"C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1820 -s 624
Network
| Country | Destination | Domain | Proto |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp |
Files
memory/1820-0-0x000007FEF5143000-0x000007FEF5144000-memory.dmp
memory/1820-1-0x0000000000280000-0x000000000028A000-memory.dmp
memory/1820-2-0x000000001B210000-0x000000001B21A000-memory.dmp
memory/1820-3-0x00000000020E0000-0x0000000002184000-memory.dmp
memory/1820-4-0x000007FEF5140000-0x000007FEF5B2C000-memory.dmp
memory/2072-7-0x0000000000400000-0x0000000000452000-memory.dmp
memory/2072-5-0x0000000000400000-0x0000000000452000-memory.dmp
memory/2072-14-0x0000000000400000-0x0000000000452000-memory.dmp
memory/2072-17-0x0000000000400000-0x0000000000452000-memory.dmp
memory/2072-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2072-11-0x0000000000400000-0x0000000000452000-memory.dmp
memory/2072-9-0x0000000000400000-0x0000000000452000-memory.dmp
memory/2072-15-0x0000000000400000-0x0000000000452000-memory.dmp
memory/2072-18-0x0000000073FFE000-0x0000000073FFF000-memory.dmp
memory/2072-19-0x0000000073FF0000-0x00000000746DE000-memory.dmp
memory/1820-20-0x000007FEF5143000-0x000007FEF5144000-memory.dmp
memory/1820-21-0x000007FEF5140000-0x000007FEF5B2C000-memory.dmp
memory/2072-22-0x0000000073FFE000-0x0000000073FFF000-memory.dmp
memory/2072-23-0x0000000073FF0000-0x00000000746DE000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-13 11:46
Reported
2024-07-13 11:48
Platform
win10v2004-20240709-en
Max time kernel
142s
Max time network
148s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1632 set thread context of 4408 | N/A | C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe
"C:\Users\Admin\AppData\Local\Temp\b7585402d354395dd4cb9031486b62c65856189cdf27ebf5e0a9a3685970f187.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 22.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp | |
| US | 212.162.149.77:1912 | tcp |
Files
memory/1632-0-0x00007FFADD683000-0x00007FFADD685000-memory.dmp
memory/1632-1-0x0000024A6C0C0000-0x0000024A6C0CA000-memory.dmp
memory/1632-2-0x0000024A6E630000-0x0000024A6E63A000-memory.dmp
memory/1632-3-0x0000024A6E4C0000-0x0000024A6E564000-memory.dmp
memory/1632-4-0x00007FFADD680000-0x00007FFADE141000-memory.dmp
memory/4408-5-0x0000000000400000-0x0000000000452000-memory.dmp
memory/4408-6-0x0000000074CCE000-0x0000000074CCF000-memory.dmp
memory/4408-7-0x00000000056F0000-0x0000000005C94000-memory.dmp
memory/4408-8-0x0000000005070000-0x0000000005102000-memory.dmp
memory/1632-9-0x00007FFADD680000-0x00007FFADE141000-memory.dmp
memory/4408-10-0x0000000074CC0000-0x0000000075470000-memory.dmp
memory/4408-11-0x0000000005150000-0x000000000515A000-memory.dmp
memory/4408-12-0x0000000006680000-0x0000000006C98000-memory.dmp
memory/4408-13-0x00000000063E0000-0x00000000064EA000-memory.dmp
memory/4408-14-0x0000000006340000-0x0000000006352000-memory.dmp
memory/4408-15-0x00000000063A0000-0x00000000063DC000-memory.dmp
memory/4408-16-0x0000000006500000-0x000000000654C000-memory.dmp
memory/4408-17-0x0000000074CCE000-0x0000000074CCF000-memory.dmp
memory/4408-18-0x0000000074CC0000-0x0000000075470000-memory.dmp