Analysis
-
max time kernel
366s -
max time network
433s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
27/09/2022, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
for Luis/ Foundation.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
for Luis/ Foundation.pdf.exe
Resource
win10-20220901-en
General
-
Target
for Luis/ Foundation.pdf.exe
-
Size
700.0MB
-
MD5
c029b2ee56752a77b6f2506224ce9d1d
-
SHA1
1aeb1c211dd367d958e8a49245c2851fb1df6fdd
-
SHA256
a1d01034ff1527f196438acd996f40c66eb146d50b3e53865a82c8b452e3cdf2
-
SHA512
edf79d8562faa879e9d21af9e87cb3d8576e6efd93fef93923651a706683a7b8d7820783019a38890d940439343da49438e0f795c862ac7728840de191c8ab38
-
SSDEEP
12288:FT2RAZPpPvF2WK2MTVc3L/oDQ0tHV1ZRllyI/o75ffxR3GnBjL8nAlA7I:FTY8PtvgH2M5c3LstHVRS75BQBLak
Malware Config
Extracted
redline
25.9
185.106.92.22:34989
-
auth_value
b54cadcc3d907373e87b436a532d2ffa
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4548 set thread context of 5048 4548 Foundation.pdf.exe 68 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3664 powershell.exe 3664 powershell.exe 3664 powershell.exe 5048 Foundation.pdf.exe 5048 Foundation.pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3664 powershell.exe Token: SeDebugPrivilege 4548 Foundation.pdf.exe Token: SeDebugPrivilege 5048 Foundation.pdf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3664 4548 Foundation.pdf.exe 66 PID 4548 wrote to memory of 3664 4548 Foundation.pdf.exe 66 PID 4548 wrote to memory of 3664 4548 Foundation.pdf.exe 66 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68 PID 4548 wrote to memory of 5048 4548 Foundation.pdf.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\for Luis\ Foundation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\for Luis\ Foundation.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\for Luis\ Foundation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\for Luis\ Foundation.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55c01a57bb6376dc958d99ed7a67870ff
SHA1d092c7dfd148ac12b086049d215e6b00bd78628d
SHA256cb8fd245425e915bfc5ff411f26303f7cb4a30ed37f2ea4a2f0a12501aa5f2a4
SHA512e4e3a4b74f8e209573cce58b572c1f71653e6f4df98f98c5a1cecdf76c9ffb91d5e6994c89df41c9f3613a0584301a56ca922ab7497a434e108b28dcd7d33038