Analysis
-
max time kernel
55s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-02-2021 23:14
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v20201028
General
-
Target
Setup.exe
-
Size
1.4MB
-
MD5
5ecdc36b39369e672f034c5cd503a494
-
SHA1
b05378f6624481c7f6fee55fd0cf91c52ce25425
-
SHA256
db369dd75a2232803191d273b532cfaf161b154deea4b77b4045ee8bd4c9d890
-
SHA512
1029be4fb68792c469e85d2111f3be0cd8d5ba4e245a9fc325e9378263ae7176808ea6b407360c31e5926514f7e8385a4112771e1f2aa126f4af107fce9b97fc
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2888-11-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/2888-12-0x0000000000421A4E-mapping.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
Setup.exepid process 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 3888 set thread context of 2888 3888 Setup.exe Setup.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1320 3888 WerFault.exe Setup.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3952 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
Setup.exeWerFault.exeSetup.exepid process 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 3888 Setup.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 2888 Setup.exe 2888 Setup.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Setup.exeWerFault.exeSetup.exedescription pid process Token: SeDebugPrivilege 3888 Setup.exe Token: SeRestorePrivilege 1320 WerFault.exe Token: SeBackupPrivilege 1320 WerFault.exe Token: SeDebugPrivilege 1320 WerFault.exe Token: SeDebugPrivilege 2888 Setup.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Setup.execmd.exedescription pid process target process PID 3888 wrote to memory of 2800 3888 Setup.exe cmd.exe PID 3888 wrote to memory of 2800 3888 Setup.exe cmd.exe PID 3888 wrote to memory of 2800 3888 Setup.exe cmd.exe PID 2800 wrote to memory of 3952 2800 cmd.exe timeout.exe PID 2800 wrote to memory of 3952 2800 cmd.exe timeout.exe PID 2800 wrote to memory of 3952 2800 cmd.exe timeout.exe PID 3888 wrote to memory of 3164 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 3164 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 3164 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe PID 3888 wrote to memory of 2888 3888 Setup.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 15642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320