Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
CryptoMinerBuilder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CryptoMinerBuilder.exe
Resource
win10v2004-20241007-en
General
-
Target
CryptoMinerBuilder.exe
-
Size
572KB
-
MD5
c6e1b4c935a6fc29c0761b51b9d0b436
-
SHA1
16845245dcc7eff90a4e45ed2586d18e6ca181be
-
SHA256
f7aa7848b465cabf2afd062d7831fe0fe499c765a06a5544128f3816e3097104
-
SHA512
8f663865b5bd0254c9764d9523542da074d3dd012f453bb46a73bde908ca162f9c1fdc304960921fbc57d39afcc946eae6a8e7f21d3c2f8c58080a6621e20567
-
SSDEEP
12288:18DYqxPebX3qEhMwiQ1Mr5f6G5UDYvqrC8ZJeJyP2n:14pPebX3qaOQ1M9yG5ULrDZP2n
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2344-19-0x0000000000400000-0x0000000000480000-memory.dmp family_redline behavioral1/memory/2344-17-0x0000000000400000-0x0000000000480000-memory.dmp family_redline behavioral1/memory/2344-14-0x0000000000400000-0x0000000000480000-memory.dmp family_redline behavioral1/memory/2344-10-0x0000000000400000-0x0000000000480000-memory.dmp family_redline behavioral1/memory/2344-8-0x0000000000400000-0x0000000000480000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2816 set thread context of 2344 2816 CryptoMinerBuilder.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoMinerBuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32 PID 2816 wrote to memory of 2344 2816 CryptoMinerBuilder.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\CryptoMinerBuilder.exe"C:\Users\Admin\AppData\Local\Temp\CryptoMinerBuilder.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2344
-