Analysis
-
max time kernel
46s -
max time network
45s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
21-11-2020 13:24
Static task
static1
Behavioral task
behavioral1
Sample
d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe
Resource
win10v20201028
General
-
Target
d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe
-
Size
691KB
-
MD5
82cc77b32436522b9218dcea4046f7cf
-
SHA1
57df17d8c62ca1164585efd3c5012c40b43b4223
-
SHA256
d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378
-
SHA512
9e90ad76f3470fc74912c5458b59870ec96e431f8370b9db02f7146c05e2d461d2abb447dacf000a09df4a594914edb97f6ce2a74deb8a79c7ac4e861e1d0238
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1364-6-0x0000000000400000-0x000000000042C000-memory.dmp family_redline behavioral1/memory/1364-7-0x0000000000427D9E-mapping.dmp family_redline behavioral1/memory/1364-8-0x0000000000400000-0x000000000042C000-memory.dmp family_redline behavioral1/memory/1364-9-0x0000000000400000-0x000000000042C000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exedescription pid process target process PID 1732 set thread context of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 304 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exed1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe Token: SeDebugPrivilege 1364 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe Token: SeDebugPrivilege 304 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exed1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.execmd.exedescription pid process target process PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1732 wrote to memory of 1364 1732 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe PID 1364 wrote to memory of 276 1364 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe cmd.exe PID 1364 wrote to memory of 276 1364 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe cmd.exe PID 1364 wrote to memory of 276 1364 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe cmd.exe PID 1364 wrote to memory of 276 1364 d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe cmd.exe PID 276 wrote to memory of 304 276 cmd.exe taskkill.exe PID 276 wrote to memory of 304 276 cmd.exe taskkill.exe PID 276 wrote to memory of 304 276 cmd.exe taskkill.exe PID 276 wrote to memory of 304 276 cmd.exe taskkill.exe PID 276 wrote to memory of 512 276 cmd.exe choice.exe PID 276 wrote to memory of 512 276 cmd.exe choice.exe PID 276 wrote to memory of 512 276 cmd.exe choice.exe PID 276 wrote to memory of 512 276 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe"C:\Users\Admin\AppData\Local\Temp\d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1364 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\d1353423d03fecdaecb4f50c3a3309787375926ac6a490759f7e33b10d006378.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 13644⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:304 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:512