Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-11-2021 15:49
Static task
static1
Behavioral task
behavioral1
Sample
f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe
Resource
win10-en-20211014
General
-
Target
f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe
-
Size
145KB
-
MD5
975e2a8879c2d40e6db9704e75868e53
-
SHA1
746e10e1a92ead22dc951a2feb0ec70a696f944e
-
SHA256
f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00
-
SHA512
2ebbdf66c21d3a64a92f3e56a524e9255af702158ab9c39b1700515abd64aa301f24bab5560d056b777982bceee7a99d0bdd7fc71c83d8b25e2a6bc461b83f07
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1156-122-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/1156-123-0x0000000000436D2E-mapping.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exedescription pid process target process PID 3616 set thread context of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exef2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exepid process 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe 1156 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exef2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exedescription pid process Token: SeDebugPrivilege 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe Token: SeDebugPrivilege 1156 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exedescription pid process target process PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe PID 3616 wrote to memory of 1156 3616 f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe"C:\Users\Admin\AppData\Local\Temp\f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exeC:\Users\Admin\AppData\Local\Temp\f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f2b97834b52dab540606e6cf181131ea9c9ad621c8d7ef9f6f4dc1ad40de3a00.exe.logMD5
daa436d058b25bdde9e2d6fe53c6ccf6
SHA13fc5d1eab28db05865915d8f6d9ecf85d9cc1d9e
SHA256afb0ed8659b214fe4251a87a1c0a362c123363497fbd50737c1ae36a9376c4cd
SHA51284f13582070ae4a3a9bb5e4b29620e659c258ab282e43e9bfa50528c08aae875d8c33cf3647fbb1253102af39b89f3b97f316e62f544355cc9c379e04fba960a
-
memory/1156-133-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/1156-136-0x0000000005E10000-0x0000000005E11000-memory.dmpFilesize
4KB
-
memory/1156-129-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/1156-131-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/1156-130-0x0000000004E20000-0x0000000004E21000-memory.dmpFilesize
4KB
-
memory/1156-122-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1156-123-0x0000000000436D2E-mapping.dmp
-
memory/1156-141-0x0000000007A90000-0x0000000007A91000-memory.dmpFilesize
4KB
-
memory/1156-127-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/1156-128-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/1156-140-0x0000000006B80000-0x0000000006B81000-memory.dmpFilesize
4KB
-
memory/1156-139-0x00000000060D0000-0x00000000060D1000-memory.dmpFilesize
4KB
-
memory/1156-138-0x0000000005F10000-0x0000000005F11000-memory.dmpFilesize
4KB
-
memory/1156-132-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/1156-135-0x0000000005CF0000-0x0000000005CF1000-memory.dmpFilesize
4KB
-
memory/3616-115-0x0000000000460000-0x0000000000461000-memory.dmpFilesize
4KB
-
memory/3616-118-0x00000000054C0000-0x000000000551D000-memory.dmpFilesize
372KB
-
memory/3616-120-0x0000000005B50000-0x0000000005B51000-memory.dmpFilesize
4KB
-
memory/3616-121-0x00000000056C0000-0x00000000056E7000-memory.dmpFilesize
156KB
-
memory/3616-119-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/3616-117-0x00000000027A0000-0x00000000027A1000-memory.dmpFilesize
4KB