Analysis
-
max time kernel
113s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-12-2021 03:27
Static task
static1
Behavioral task
behavioral1
Sample
9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe
Resource
win7-en-20211014
General
-
Target
9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe
-
Size
1.5MB
-
MD5
dec22ccebba8916f15efac9fa0d19986
-
SHA1
5dab7a780b575aadb6eec991893f4982702cd079
-
SHA256
9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c30054a9df1751cbb474
-
SHA512
6823bd910dc905279192f9cfbd89aa1241113875e51f4955e3a6d31ffadb1dbf804c59d383a46891a1ad1302ce65a67d58ffb555632b1966169ca1f9c2b0dd88
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2716-163-0x0000000000400000-0x00000000007FA000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exepid process 2716 9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exedescription pid process Token: SeDebugPrivilege 2716 9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe"C:\Users\Admin\AppData\Local\Temp\9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2716-115-0x0000000000CF0000-0x0000000000D50000-memory.dmpFilesize
384KB
-
memory/2716-117-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/2716-116-0x0000000002890000-0x0000000002891000-memory.dmpFilesize
4KB
-
memory/2716-119-0x00000000028C0000-0x00000000028C1000-memory.dmpFilesize
4KB
-
memory/2716-118-0x0000000002850000-0x0000000002851000-memory.dmpFilesize
4KB
-
memory/2716-121-0x0000000002870000-0x0000000002871000-memory.dmpFilesize
4KB
-
memory/2716-120-0x0000000002880000-0x0000000002881000-memory.dmpFilesize
4KB
-
memory/2716-123-0x00000000028B0000-0x00000000028B1000-memory.dmpFilesize
4KB
-
memory/2716-122-0x00000000028E0000-0x00000000028E1000-memory.dmpFilesize
4KB
-
memory/2716-125-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-124-0x0000000003580000-0x0000000003581000-memory.dmpFilesize
4KB
-
memory/2716-127-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-126-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-128-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-129-0x0000000002670000-0x0000000002671000-memory.dmpFilesize
4KB
-
memory/2716-131-0x0000000002620000-0x0000000002621000-memory.dmpFilesize
4KB
-
memory/2716-130-0x0000000002680000-0x0000000002681000-memory.dmpFilesize
4KB
-
memory/2716-132-0x0000000002650000-0x0000000002651000-memory.dmpFilesize
4KB
-
memory/2716-133-0x00000000026A0000-0x00000000026A1000-memory.dmpFilesize
4KB
-
memory/2716-135-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-134-0x00000000026C0000-0x00000000026C1000-memory.dmpFilesize
4KB
-
memory/2716-136-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-137-0x00000000027E0000-0x00000000027E1000-memory.dmpFilesize
4KB
-
memory/2716-138-0x00000000027F0000-0x00000000027F1000-memory.dmpFilesize
4KB
-
memory/2716-140-0x0000000002810000-0x0000000002811000-memory.dmpFilesize
4KB
-
memory/2716-139-0x00000000027A0000-0x00000000027A1000-memory.dmpFilesize
4KB
-
memory/2716-141-0x00000000027D0000-0x00000000027D1000-memory.dmpFilesize
4KB
-
memory/2716-143-0x0000000002830000-0x0000000002831000-memory.dmpFilesize
4KB
-
memory/2716-142-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/2716-145-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-144-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-146-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-147-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-148-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2716-151-0x0000000002950000-0x0000000002951000-memory.dmpFilesize
4KB
-
memory/2716-149-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/2716-150-0x0000000002940000-0x0000000002941000-memory.dmpFilesize
4KB
-
memory/2716-153-0x0000000002970000-0x0000000002971000-memory.dmpFilesize
4KB
-
memory/2716-152-0x0000000002900000-0x0000000002901000-memory.dmpFilesize
4KB
-
memory/2716-155-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/2716-154-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/2716-157-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/2716-156-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/2716-159-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/2716-158-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/2716-161-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/2716-160-0x00000000026D0000-0x00000000026D1000-memory.dmpFilesize
4KB
-
memory/2716-162-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/2716-163-0x0000000000400000-0x00000000007FA000-memory.dmpFilesize
4.0MB
-
memory/2716-164-0x0000000000400000-0x0000000000402000-memory.dmpFilesize
8KB
-
memory/2716-166-0x0000000005C70000-0x0000000005C71000-memory.dmpFilesize
4KB
-
memory/2716-167-0x0000000006310000-0x0000000006311000-memory.dmpFilesize
4KB
-
memory/2716-168-0x0000000006340000-0x0000000006341000-memory.dmpFilesize
4KB
-
memory/2716-169-0x0000000006450000-0x0000000006451000-memory.dmpFilesize
4KB
-
memory/2716-170-0x0000000006630000-0x0000000006631000-memory.dmpFilesize
4KB
-
memory/2716-171-0x00000000064D0000-0x00000000064D1000-memory.dmpFilesize
4KB
-
memory/2716-172-0x0000000006670000-0x0000000006671000-memory.dmpFilesize
4KB
-
memory/2716-173-0x0000000006BB0000-0x0000000006BB1000-memory.dmpFilesize
4KB
-
memory/2716-174-0x0000000006C70000-0x0000000006C71000-memory.dmpFilesize
4KB
-
memory/2716-175-0x0000000006E90000-0x0000000006E91000-memory.dmpFilesize
4KB
-
memory/2716-176-0x0000000007100000-0x0000000007101000-memory.dmpFilesize
4KB
-
memory/2716-177-0x00000000075A0000-0x00000000075A1000-memory.dmpFilesize
4KB
-
memory/2716-178-0x0000000007770000-0x0000000007771000-memory.dmpFilesize
4KB
-
memory/2716-179-0x0000000007DE0000-0x0000000007DE1000-memory.dmpFilesize
4KB