Analysis
-
max time kernel
42s -
max time network
65s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:13
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe
-
Size
32KB
-
MD5
cda47274841683f9a31edab3d6c69abc
-
SHA1
11c27e58791bb03a95c0fb9c4784f9a47371befe
-
SHA256
d4bb66bd17508438be397f81e2226dd6e4814fcc09573aefec5039a7ec3b10a8
-
SHA512
765c7efe511299431e385f6721f984f52d7647ccf8c7570cce115c9b28096319c7ee2a06729176465bbd9dfb9a7dc39ac91dad07e611a206af2f6806e51f5462
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/992-3-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral2/memory/992-4-0x000000000042A2BE-mapping.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exedescription pid process target process PID 1028 set thread context of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1740 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exeAddInProcess32.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe Token: SeDebugPrivilege 992 AddInProcess32.exe Token: SeDebugPrivilege 1740 taskkill.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exeAddInProcess32.execmd.exedescription pid process target process PID 1028 wrote to memory of 968 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess.exe PID 1028 wrote to memory of 968 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess.exe PID 1028 wrote to memory of 968 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess.exe PID 1028 wrote to memory of 968 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess.exe PID 1028 wrote to memory of 968 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess.exe PID 1028 wrote to memory of 968 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 1028 wrote to memory of 992 1028 SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe AddInProcess32.exe PID 992 wrote to memory of 576 992 AddInProcess32.exe cmd.exe PID 992 wrote to memory of 576 992 AddInProcess32.exe cmd.exe PID 992 wrote to memory of 576 992 AddInProcess32.exe cmd.exe PID 576 wrote to memory of 1740 576 cmd.exe taskkill.exe PID 576 wrote to memory of 1740 576 cmd.exe taskkill.exe PID 576 wrote to memory of 1740 576 cmd.exe taskkill.exe PID 576 wrote to memory of 3980 576 cmd.exe choice.exe PID 576 wrote to memory of 3980 576 cmd.exe choice.exe PID 576 wrote to memory of 3980 576 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.56.29232.23237.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe2⤵PID:968
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 992 && choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 9924⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:3980