Analysis
-
max time kernel
27s -
max time network
26s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
01-02-2021 23:14
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v20201028
General
-
Target
Setup.exe
-
Size
1.4MB
-
MD5
5ecdc36b39369e672f034c5cd503a494
-
SHA1
b05378f6624481c7f6fee55fd0cf91c52ce25425
-
SHA256
db369dd75a2232803191d273b532cfaf161b154deea4b77b4045ee8bd4c9d890
-
SHA512
1029be4fb68792c469e85d2111f3be0cd8d5ba4e245a9fc325e9378263ae7176808ea6b407360c31e5926514f7e8385a4112771e1f2aa126f4af107fce9b97fc
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/520-13-0x0000000000421A4E-mapping.dmp family_redline behavioral1/memory/520-12-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/520-16-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
Setup.exepid process 1056 Setup.exe 1056 Setup.exe 1056 Setup.exe 1056 Setup.exe 1056 Setup.exe 1056 Setup.exe 1056 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 1056 set thread context of 520 1056 Setup.exe Setup.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1528 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Setup.exeSetup.exepid process 1056 Setup.exe 1056 Setup.exe 1056 Setup.exe 520 Setup.exe 520 Setup.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Setup.exeSetup.exedescription pid process Token: SeDebugPrivilege 1056 Setup.exe Token: SeDebugPrivilege 520 Setup.exe Token: SeRestorePrivilege 520 Setup.exe Token: SeBackupPrivilege 520 Setup.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
Setup.execmd.exedescription pid process target process PID 1056 wrote to memory of 1768 1056 Setup.exe cmd.exe PID 1056 wrote to memory of 1768 1056 Setup.exe cmd.exe PID 1056 wrote to memory of 1768 1056 Setup.exe cmd.exe PID 1056 wrote to memory of 1768 1056 Setup.exe cmd.exe PID 1056 wrote to memory of 1768 1056 Setup.exe cmd.exe PID 1056 wrote to memory of 1768 1056 Setup.exe cmd.exe PID 1056 wrote to memory of 1768 1056 Setup.exe cmd.exe PID 1768 wrote to memory of 1528 1768 cmd.exe timeout.exe PID 1768 wrote to memory of 1528 1768 cmd.exe timeout.exe PID 1768 wrote to memory of 1528 1768 cmd.exe timeout.exe PID 1768 wrote to memory of 1528 1768 cmd.exe timeout.exe PID 1768 wrote to memory of 1528 1768 cmd.exe timeout.exe PID 1768 wrote to memory of 1528 1768 cmd.exe timeout.exe PID 1768 wrote to memory of 1528 1768 cmd.exe timeout.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe PID 1056 wrote to memory of 520 1056 Setup.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520