Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
24-10-2021 13:41
Static task
static1
Behavioral task
behavioral1
Sample
Full-Setup.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Full-Setup.exe
Resource
win10-en-20210920
General
-
Target
Full-Setup.exe
-
Size
617KB
-
MD5
3e51441dbc25e639574078fe3beba68b
-
SHA1
1a4de23d68342dffb53efac5e9dcf102a66adea4
-
SHA256
53a144e5fd49272bbcbe6b46fb8bf54488cdedbd7b767b8128e43e709a7b929b
-
SHA512
38793d4faa8b30246988eb03b85618e6b363e8bcfefa03c6b04a975e748060737a2978d05541dbcad5334dd77665f9e19dda169d63e424e630c2db6a3c8d3c6a
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1432-62-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1432-61-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1432-63-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1432-64-0x0000000000418DC2-mapping.dmp family_redline behavioral1/memory/1432-66-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Full-Setup.exedescription pid process target process PID 608 set thread context of 1432 608 Full-Setup.exe Full-Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Full-Setup.exepid process 1432 Full-Setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Full-Setup.exedescription pid process Token: SeDebugPrivilege 1432 Full-Setup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Full-Setup.exedescription pid process target process PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe PID 608 wrote to memory of 1432 608 Full-Setup.exe Full-Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Full-Setup.exe"C:\Users\Admin\AppData\Local\Temp\Full-Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\Full-Setup.exeC:\Users\Admin\AppData\Local\Temp\Full-Setup.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432