Analysis

  • max time kernel
    30s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-01-2021 23:44

General

  • Target

    Ramstam.exe

  • Size

    25KB

  • MD5

    79870a39c043dbc5e6c1959ae1ca61d8

  • SHA1

    aa889650128a5178205c5d74894b0ade97d0cee0

  • SHA256

    38ff1916bf18ce69b3dc98a2a81160d19023c77e5e83e240798114d249886eb8

  • SHA512

    dd2264e9cd18625c7a061604f6469e059f7ee9095d860723aea6f638bd2acf4101b9c3ce7f6bd588dc3cfee66d40b145804c18bd38668b41789bc2769fc4e906

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ramstam.exe
    "C:\Users\Admin\AppData\Local\Temp\Ramstam.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-6-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/1660-7-0x000000000044802E-mapping.dmp

  • memory/1660-8-0x0000000074110000-0x00000000747FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1660-9-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/1660-11-0x0000000001060000-0x0000000001061000-memory.dmp

    Filesize

    4KB

  • memory/1668-2-0x0000000074110000-0x00000000747FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1668-3-0x0000000000D60000-0x0000000000D61000-memory.dmp

    Filesize

    4KB

  • memory/1668-5-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB