Analysis
-
max time kernel
19s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
23/11/2023, 19:57
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20231025-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20231025-en
8 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
7.1MB
-
MD5
655c9ab59afafdcc3c3ea06fe256c716
-
SHA1
f9689d55005562013f98fbbc9cbb92d2c6016033
-
SHA256
ed53c20f0d55834a573d7303e9ed64242568ae139b06cdbcac9bd173d0d23c0a
-
SHA512
a563a21f1266566a7b85de12912a9fb69ef8c602c73764632a745fae7407de5f876c30ca7b21864488f089fee32c3418d36590e0e631835085bc8563762366c5
-
SSDEEP
49152:q7Nx5ZBZQgqykOKQrb/TvvO90d7HjmAFd4A64nsfJIkLPXdsvn30By+GaF9lhLQT:LgqeKxPXco3/Xxt1EF+CqLj4Vv
Score
10/10
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2388-6-0x0000000000080000-0x00000000000DA000-memory.dmp family_redline behavioral1/memory/2388-10-0x0000000000080000-0x00000000000DA000-memory.dmp family_redline behavioral1/memory/2388-12-0x0000000000080000-0x00000000000DA000-memory.dmp family_redline -
resource yara_rule behavioral1/memory/2388-4-0x0000000000080000-0x00000000000DA000-memory.dmp match_everything behavioral1/memory/2388-6-0x0000000000080000-0x00000000000DA000-memory.dmp match_everything behavioral1/memory/2388-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp match_everything behavioral1/memory/2388-10-0x0000000000080000-0x00000000000DA000-memory.dmp match_everything behavioral1/memory/2388-12-0x0000000000080000-0x00000000000DA000-memory.dmp match_everything behavioral1/memory/2944-8-0x000000013F210000-0x000000013F98D000-memory.dmp match_everything behavioral1/memory/2388-13-0x0000000074E20000-0x000000007550E000-memory.dmp match_everything behavioral1/memory/2388-14-0x0000000007230000-0x0000000007270000-memory.dmp match_everything behavioral1/memory/2388-15-0x0000000074E20000-0x000000007550E000-memory.dmp match_everything -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2944 set thread context of 2388 2944 Setup.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2388 jsc.exe 2388 jsc.exe 2388 jsc.exe 2388 jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 jsc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2388 2944 Setup.exe 28 PID 2944 wrote to memory of 2388 2944 Setup.exe 28 PID 2944 wrote to memory of 2388 2944 Setup.exe 28 PID 2944 wrote to memory of 2388 2944 Setup.exe 28 PID 2944 wrote to memory of 2388 2944 Setup.exe 28 PID 2944 wrote to memory of 2388 2944 Setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-