Analysis
-
max time kernel
25s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-12-2020 08:47
Static task
static1
Behavioral task
behavioral1
Sample
a7e9e9cf220846cf4886665f5dca877d.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
a7e9e9cf220846cf4886665f5dca877d.exe
Resource
win10v20201028
General
-
Target
a7e9e9cf220846cf4886665f5dca877d.exe
-
Size
371KB
-
MD5
a7e9e9cf220846cf4886665f5dca877d
-
SHA1
25316dff51b674a33b4db6aa4187477f1bcfb72f
-
SHA256
f8c01a2d1b187aee1a6b8fc7cb87369cbc920e6c288f53af356287cb3def107e
-
SHA512
b2922db7d114e27eda9d436bcd7bb7c29791fbee25a5807223dd9fc0f6b913b0caacbd0518ce97494f42a8bc2f44b0f33ec1cfb0144b41249589f64b23f266db
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/944-6-0x0000000007350000-0x0000000007374000-memory.dmp family_redline behavioral2/memory/944-8-0x00000000074D0000-0x00000000074F2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a7e9e9cf220846cf4886665f5dca877d.exepid process 944 a7e9e9cf220846cf4886665f5dca877d.exe 944 a7e9e9cf220846cf4886665f5dca877d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a7e9e9cf220846cf4886665f5dca877d.exedescription pid process Token: SeDebugPrivilege 944 a7e9e9cf220846cf4886665f5dca877d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a7e9e9cf220846cf4886665f5dca877d.execmd.exedescription pid process target process PID 944 wrote to memory of 1324 944 a7e9e9cf220846cf4886665f5dca877d.exe cmd.exe PID 944 wrote to memory of 1324 944 a7e9e9cf220846cf4886665f5dca877d.exe cmd.exe PID 944 wrote to memory of 1324 944 a7e9e9cf220846cf4886665f5dca877d.exe cmd.exe PID 1324 wrote to memory of 1216 1324 cmd.exe PING.EXE PID 1324 wrote to memory of 1216 1324 cmd.exe PING.EXE PID 1324 wrote to memory of 1216 1324 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e9e9cf220846cf4886665f5dca877d.exe"C:\Users\Admin\AppData\Local\Temp\a7e9e9cf220846cf4886665f5dca877d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""2⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1216