Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
21-01-2021 07:09
Static task
static1
Behavioral task
behavioral1
Sample
1cee7f3e56ca6f40161af3f84c4972f2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1cee7f3e56ca6f40161af3f84c4972f2.exe
Resource
win10v20201028
General
-
Target
1cee7f3e56ca6f40161af3f84c4972f2.exe
-
Size
329KB
-
MD5
1cee7f3e56ca6f40161af3f84c4972f2
-
SHA1
9385a652b3f7f60c7c0028d8c4d176267b8a8edb
-
SHA256
57b01e75fdb6b0da38dd794744850e787ac069febb340eef4b3a5cf4760e6726
-
SHA512
a6761fb7fc3e9e48e8516307c9421536f0a51fb9bdcca59a0cc49daafbc8cdf550769c4dd559f8fedfb29a757545997937a384b72f2f735ecc38adcedc9b5127
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/728-8-0x0000000006BB0000-0x0000000006BD9000-memory.dmp family_redline behavioral2/memory/728-13-0x0000000009340000-0x0000000009368000-memory.dmp family_redline -
Processes:
resource yara_rule behavioral2/memory/3816-29-0x00000000046B0000-0x00000000046B1000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3816 728 WerFault.exe 1cee7f3e56ca6f40161af3f84c4972f2.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
1cee7f3e56ca6f40161af3f84c4972f2.exeWerFault.exepid process 728 1cee7f3e56ca6f40161af3f84c4972f2.exe 728 1cee7f3e56ca6f40161af3f84c4972f2.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe 3816 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
1cee7f3e56ca6f40161af3f84c4972f2.exeWerFault.exedescription pid process Token: SeDebugPrivilege 728 1cee7f3e56ca6f40161af3f84c4972f2.exe Token: SeRestorePrivilege 3816 WerFault.exe Token: SeBackupPrivilege 3816 WerFault.exe Token: SeDebugPrivilege 3816 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cee7f3e56ca6f40161af3f84c4972f2.exe"C:\Users\Admin\AppData\Local\Temp\1cee7f3e56ca6f40161af3f84c4972f2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 25642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816