Analysis

  • max time kernel
    32s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    31-01-2021 22:10

General

  • Target

    forderung.pdf.exe

  • Size

    265KB

  • MD5

    e6de6f3450a5dbfc9299a582e74ab242

  • SHA1

    3ecca1133b89e1032b8c77774089accf9ea2af85

  • SHA256

    feea736830ca5f27a8bceb7f9ffd01218bbc7301b5d8d3ab5e0716471e5f8ad5

  • SHA512

    a63f49e5da3bb6153c790272310f288d3e5cbffe23f2d33b30ca6f0911c8728cc09abd2974e1c100172799ea8bb164713ab81bd7b5cb126dbe95d6b1ce1fa472

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\forderung.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\forderung.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      2⤵
        PID:864
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/324-2-0x0000000003C50000-0x0000000003C61000-memory.dmp

      Filesize

      68KB

    • memory/324-3-0x0000000003E50000-0x0000000003E61000-memory.dmp

      Filesize

      68KB

    • memory/324-4-0x00000000001C0000-0x00000000001EB000-memory.dmp

      Filesize

      172KB

    • memory/324-5-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/324-6-0x0000000074D20000-0x000000007540E000-memory.dmp

      Filesize

      6.9MB

    • memory/324-7-0x0000000006701000-0x0000000006702000-memory.dmp

      Filesize

      4KB

    • memory/324-8-0x0000000003D50000-0x0000000003D60000-memory.dmp

      Filesize

      64KB

    • memory/324-14-0x0000000003D80000-0x0000000003D8F000-memory.dmp

      Filesize

      60KB

    • memory/324-15-0x0000000006702000-0x0000000006703000-memory.dmp

      Filesize

      4KB

    • memory/324-16-0x0000000006703000-0x0000000006704000-memory.dmp

      Filesize

      4KB

    • memory/324-17-0x0000000006704000-0x0000000006706000-memory.dmp

      Filesize

      8KB

    • memory/1052-18-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1052-19-0x000000000043BA5E-mapping.dmp

    • memory/1052-20-0x0000000074D20000-0x000000007540E000-memory.dmp

      Filesize

      6.9MB

    • memory/1052-21-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1052-23-0x00000000049E0000-0x00000000049E1000-memory.dmp

      Filesize

      4KB