Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-01-2021 23:44

General

  • Target

    Ramstam.exe

  • Size

    25KB

  • MD5

    79870a39c043dbc5e6c1959ae1ca61d8

  • SHA1

    aa889650128a5178205c5d74894b0ade97d0cee0

  • SHA256

    38ff1916bf18ce69b3dc98a2a81160d19023c77e5e83e240798114d249886eb8

  • SHA512

    dd2264e9cd18625c7a061604f6469e059f7ee9095d860723aea6f638bd2acf4101b9c3ce7f6bd588dc3cfee66d40b145804c18bd38668b41789bc2769fc4e906

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ramstam.exe
    "C:\Users\Admin\AppData\Local\Temp\Ramstam.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4068-15-0x0000000005760000-0x0000000005761000-memory.dmp

    Filesize

    4KB

  • memory/4068-21-0x00000000063F0000-0x00000000063F1000-memory.dmp

    Filesize

    4KB

  • memory/4068-27-0x0000000008380000-0x0000000008381000-memory.dmp

    Filesize

    4KB

  • memory/4068-17-0x0000000005070000-0x0000000005071000-memory.dmp

    Filesize

    4KB

  • memory/4068-16-0x0000000004F90000-0x0000000004F91000-memory.dmp

    Filesize

    4KB

  • memory/4068-8-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/4068-9-0x000000000044802E-mapping.dmp

  • memory/4068-10-0x0000000073360000-0x0000000073A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/4068-13-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

    Filesize

    4KB

  • memory/4068-14-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/4068-26-0x0000000008290000-0x0000000008291000-memory.dmp

    Filesize

    4KB

  • memory/4068-24-0x0000000007520000-0x0000000007521000-memory.dmp

    Filesize

    4KB

  • memory/4068-22-0x0000000006AF0000-0x0000000006AF1000-memory.dmp

    Filesize

    4KB

  • memory/4068-18-0x0000000005190000-0x0000000005191000-memory.dmp

    Filesize

    4KB

  • memory/4068-19-0x00000000051D0000-0x00000000051D1000-memory.dmp

    Filesize

    4KB

  • memory/4068-20-0x0000000005410000-0x0000000005411000-memory.dmp

    Filesize

    4KB

  • memory/4772-3-0x0000000000F20000-0x0000000000F21000-memory.dmp

    Filesize

    4KB

  • memory/4772-6-0x0000000005820000-0x0000000005821000-memory.dmp

    Filesize

    4KB

  • memory/4772-7-0x0000000006370000-0x0000000006371000-memory.dmp

    Filesize

    4KB

  • memory/4772-5-0x0000000005720000-0x0000000005721000-memory.dmp

    Filesize

    4KB

  • memory/4772-2-0x0000000073360000-0x0000000073A4E000-memory.dmp

    Filesize

    6.9MB