Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
CryptoMinerBuilder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CryptoMinerBuilder.exe
Resource
win10v2004-20241007-en
General
-
Target
CryptoMinerBuilder.exe
-
Size
572KB
-
MD5
c6e1b4c935a6fc29c0761b51b9d0b436
-
SHA1
16845245dcc7eff90a4e45ed2586d18e6ca181be
-
SHA256
f7aa7848b465cabf2afd062d7831fe0fe499c765a06a5544128f3816e3097104
-
SHA512
8f663865b5bd0254c9764d9523542da074d3dd012f453bb46a73bde908ca162f9c1fdc304960921fbc57d39afcc946eae6a8e7f21d3c2f8c58080a6621e20567
-
SSDEEP
12288:18DYqxPebX3qEhMwiQ1Mr5f6G5UDYvqrC8ZJeJyP2n:14pPebX3qaOQ1M9yG5ULrDZP2n
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1412-6-0x0000000000400000-0x0000000000480000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5072 set thread context of 1412 5072 CryptoMinerBuilder.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoMinerBuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83 PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83 PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83 PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83 PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83 PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83 PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83 PID 5072 wrote to memory of 1412 5072 CryptoMinerBuilder.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\CryptoMinerBuilder.exe"C:\Users\Admin\AppData\Local\Temp\CryptoMinerBuilder.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1412
-