Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
07-12-2021 12:52
Static task
static1
Behavioral task
behavioral1
Sample
f1ea8c489b66edd67b4eb1d103d64140.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
f1ea8c489b66edd67b4eb1d103d64140.exe
Resource
win10-en-20211014
General
-
Target
f1ea8c489b66edd67b4eb1d103d64140.exe
-
Size
421KB
-
MD5
f1ea8c489b66edd67b4eb1d103d64140
-
SHA1
183a88297c47ed713c001fff172d752a3cf0a9fb
-
SHA256
f8daaa065a27508babcd8e898c3f1eda824531105cdcf07ceceee2fda53d5a5f
-
SHA512
92b219df646384f8787a2c97442ca62b19fbe05c8ed7821da60551a912800c2cb8788f414465e380ff0db546193bff2d2093105c12b8df9645ca51d649c024d5
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2528-122-0x0000000000230000-0x0000000000295000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
9280844437.exepid process 2528 9280844437.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
9280844437.exepid process 2528 9280844437.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9280844437.exepid process 2528 9280844437.exe 2528 9280844437.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9280844437.exedescription pid process Token: SeDebugPrivilege 2528 9280844437.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f1ea8c489b66edd67b4eb1d103d64140.execmd.exedescription pid process target process PID 2460 wrote to memory of 2276 2460 f1ea8c489b66edd67b4eb1d103d64140.exe cmd.exe PID 2460 wrote to memory of 2276 2460 f1ea8c489b66edd67b4eb1d103d64140.exe cmd.exe PID 2460 wrote to memory of 2276 2460 f1ea8c489b66edd67b4eb1d103d64140.exe cmd.exe PID 2276 wrote to memory of 2528 2276 cmd.exe 9280844437.exe PID 2276 wrote to memory of 2528 2276 cmd.exe 9280844437.exe PID 2276 wrote to memory of 2528 2276 cmd.exe 9280844437.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1ea8c489b66edd67b4eb1d103d64140.exe"C:\Users\Admin\AppData\Local\Temp\f1ea8c489b66edd67b4eb1d103d64140.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\9280844437.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9280844437.exe"C:\Users\Admin\AppData\Local\Temp\9280844437.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9280844437.exeMD5
9753fcfc4f6d3c1c7c4928e0285ac883
SHA1ae3cabef7e0474fdf55f9f23336ee0a2de5d20ad
SHA256029ab5454401a5c37fca1c8dcd240b6727cf0ccb8c5aa1d121196e2a76db5f4d
SHA512e91092e034ac4fc1884887f18031605033e5e56d6f845fa92ccbdef3dd231c5070be588b21c5993dd2d33e7b5b44b5608570389fe411eff04d542fc064753aac
-
C:\Users\Admin\AppData\Local\Temp\9280844437.exeMD5
9753fcfc4f6d3c1c7c4928e0285ac883
SHA1ae3cabef7e0474fdf55f9f23336ee0a2de5d20ad
SHA256029ab5454401a5c37fca1c8dcd240b6727cf0ccb8c5aa1d121196e2a76db5f4d
SHA512e91092e034ac4fc1884887f18031605033e5e56d6f845fa92ccbdef3dd231c5070be588b21c5993dd2d33e7b5b44b5608570389fe411eff04d542fc064753aac
-
memory/2276-118-0x0000000000000000-mapping.dmp
-
memory/2460-117-0x0000000000400000-0x00000000004EA000-memory.dmpFilesize
936KB
-
memory/2460-116-0x00000000004F0000-0x000000000053A000-memory.dmpFilesize
296KB
-
memory/2460-115-0x0000000000761000-0x000000000078B000-memory.dmpFilesize
168KB
-
memory/2528-130-0x00000000061E0000-0x00000000061E1000-memory.dmpFilesize
4KB
-
memory/2528-133-0x0000000005C30000-0x0000000005C31000-memory.dmpFilesize
4KB
-
memory/2528-123-0x0000000002F90000-0x0000000002F91000-memory.dmpFilesize
4KB
-
memory/2528-124-0x0000000075AF0000-0x0000000075CB2000-memory.dmpFilesize
1.8MB
-
memory/2528-125-0x0000000003010000-0x0000000003055000-memory.dmpFilesize
276KB
-
memory/2528-126-0x0000000075940000-0x0000000075A31000-memory.dmpFilesize
964KB
-
memory/2528-127-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2528-129-0x0000000070C80000-0x0000000070D00000-memory.dmpFilesize
512KB
-
memory/2528-119-0x0000000000000000-mapping.dmp
-
memory/2528-131-0x0000000005BD0000-0x0000000005BD1000-memory.dmpFilesize
4KB
-
memory/2528-132-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/2528-122-0x0000000000230000-0x0000000000295000-memory.dmpFilesize
404KB
-
memory/2528-134-0x0000000003A50000-0x0000000003A51000-memory.dmpFilesize
4KB
-
memory/2528-135-0x0000000073FD0000-0x0000000074554000-memory.dmpFilesize
5.5MB
-
memory/2528-136-0x00000000760A0000-0x00000000773E8000-memory.dmpFilesize
19.3MB
-
memory/2528-137-0x0000000005C70000-0x0000000005C71000-memory.dmpFilesize
4KB
-
memory/2528-138-0x000000006EEF0000-0x000000006EF3B000-memory.dmpFilesize
300KB
-
memory/2528-139-0x0000000005F50000-0x0000000005F51000-memory.dmpFilesize
4KB
-
memory/2528-140-0x0000000006E30000-0x0000000006E31000-memory.dmpFilesize
4KB
-
memory/2528-141-0x0000000006B00000-0x0000000006B01000-memory.dmpFilesize
4KB
-
memory/2528-142-0x0000000006C20000-0x0000000006C21000-memory.dmpFilesize
4KB
-
memory/2528-143-0x0000000006DC0000-0x0000000006DC1000-memory.dmpFilesize
4KB
-
memory/2528-144-0x0000000007620000-0x0000000007621000-memory.dmpFilesize
4KB
-
memory/2528-145-0x0000000007D20000-0x0000000007D21000-memory.dmpFilesize
4KB