Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-02-2021 16:31
Static task
static1
Behavioral task
behavioral1
Sample
7ab1ee8789d848137fb8bb8811c3eecd.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
7ab1ee8789d848137fb8bb8811c3eecd.exe
Resource
win10v20201028
General
-
Target
7ab1ee8789d848137fb8bb8811c3eecd.exe
-
Size
1.1MB
-
MD5
7ab1ee8789d848137fb8bb8811c3eecd
-
SHA1
52059dafa51bd8e656ad357855424f3c32bdcd3f
-
SHA256
20510b85596724711f8fb4c7111055086f6e44845206038fa7b7c4bcfebf2265
-
SHA512
45aa42289af1c90ea612fac02b332b84620d60e1199999c17ad20d7ab21a27d55ddeac226ef0a0c359cc9832e45252f5df0259d94e748c699523290591466933
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/608-8-0x0000000000400000-0x000000000042A000-memory.dmp family_redline behavioral1/memory/608-9-0x0000000000423E32-mapping.dmp family_redline behavioral1/memory/608-11-0x0000000000400000-0x000000000042A000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7ab1ee8789d848137fb8bb8811c3eecd.exedescription pid process target process PID 744 set thread context of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7ab1ee8789d848137fb8bb8811c3eecd.exepid process 608 7ab1ee8789d848137fb8bb8811c3eecd.exe 608 7ab1ee8789d848137fb8bb8811c3eecd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7ab1ee8789d848137fb8bb8811c3eecd.exedescription pid process Token: SeDebugPrivilege 608 7ab1ee8789d848137fb8bb8811c3eecd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7ab1ee8789d848137fb8bb8811c3eecd.exedescription pid process target process PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe PID 744 wrote to memory of 608 744 7ab1ee8789d848137fb8bb8811c3eecd.exe 7ab1ee8789d848137fb8bb8811c3eecd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ab1ee8789d848137fb8bb8811c3eecd.exe"C:\Users\Admin\AppData\Local\Temp\7ab1ee8789d848137fb8bb8811c3eecd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\7ab1ee8789d848137fb8bb8811c3eecd.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:608