Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe
Resource
win10v2004-20241007-en
General
-
Target
8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe
-
Size
1.3MB
-
MD5
b4138222931b8458a109d11cd2194ce8
-
SHA1
3b78247eea213f18d0fa745860b3099238b31fe9
-
SHA256
8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc
-
SHA512
8b7f99577a57e42fd9e302ed979a940fc6e64bdc6457866702af44272223c439e5128461120c68b88eed8d6d5257b7e29eb4625a62d9680cd2cf29feff3392bb
-
SSDEEP
24576:dpxRSasbbtRTnQ5sUm0n0m4DH5fS9Mr9CKkMcvBJsJYs45Z3S8IVej:dpfSamk5sUm0nXsCMkDBU16Z3w
Malware Config
Extracted
redline
HWID-SPOOFER
amrican-sport-live-stream.cc:4581
-
auth_value
82cc1998a304a60caeeadbaf5bb109cb
Signatures
-
Detect PureCrypter injector 34 IoCs
resource yara_rule behavioral1/memory/2940-2-0x0000000004CC0000-0x0000000004F46000-memory.dmp family_purecrypter behavioral1/memory/2940-7-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-4-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-5-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-9-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-25-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-27-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-29-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-33-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-37-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-41-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-43-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-45-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-39-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-35-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-31-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-24-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-21-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-19-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-17-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-15-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-13-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-11-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-47-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-67-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-49-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-65-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-63-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-61-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-59-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-57-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-55-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-53-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter behavioral1/memory/2940-51-0x0000000004CC0000-0x0000000004F3F000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2940 set thread context of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31 PID 2940 wrote to memory of 2776 2940 8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe"C:\Users\Admin\AppData\Local\Temp\8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- System Location Discovery: System Language Discovery
PID:2776
-