Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/02/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe
Resource
win11-20231215-en
General
-
Target
124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe
-
Size
345KB
-
MD5
268cf16a004a6b7515bec416b64ee904
-
SHA1
9f65969bb579206dc46baadce4a294004b7a1a32
-
SHA256
124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de
-
SHA512
934c2a850076a8e5084cee21a6b5a73aaac368c48d2e90bcd1ec4794214f93caa1be368464ddecf6673434732e5acfb24043802b6e5736c29907589f6d32f79c
-
SSDEEP
6144:NDKW1Fgbdl0TBBvjc/xqFbCfgJFPA7rtPNdxGrP0n8DdFd8EiylyckrTrT:lh1Fk70TnvjcpgVBAnpcDfGz
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2868-9-0x0000000000400000-0x000000000042E000-memory.dmp family_redline -
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1456-0-0x00000000027D0000-0x0000000002810000-memory.dmp net_reactor behavioral1/memory/1456-5-0x0000000004BD0000-0x0000000004C0E000-memory.dmp net_reactor behavioral1/memory/1456-6-0x0000000004C70000-0x0000000004C80000-memory.dmp net_reactor -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2868 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81 PID 1456 wrote to memory of 2868 1456 124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe"C:\Users\Admin\AppData\Local\Temp\124adb0a0efcf7f8306fd05d4c13ee429f79a0065778fa19207d9f6ddd3fb0de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-