Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 01:03
Behavioral task
behavioral1
Sample
b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe
Resource
win10v2004-20240226-en
General
-
Target
b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe
-
Size
141KB
-
MD5
7fcb91d10fe0ca177b46ee4afe46f834
-
SHA1
f10ee865a62923024cdb9681f488dad4d41afff8
-
SHA256
b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5
-
SHA512
eb6a33324d0b1a6ee60fb3098c844111503d4750c58ae46e769ae8dc891be2d3040a51fb239e2942060e8049e340691a0c7f43ba1456e5bb7f07d477dc45e557
-
SSDEEP
3072:RK1JZOpTvVQZ+rcIeRYs6YmszJqoD2r7BpGGoMTb3R35dINX9r5Wx0:AOpu0rjeRbVJqoD21pGGoMTb3RDINN
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2796-0-0x0000000000A00000-0x0000000000A2A000-memory.dmp family_redline -
Kills process with taskkill 1 IoCs
pid Process 3264 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2796 b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe Token: SeDebugPrivilege 3264 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4892 2796 b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe 93 PID 2796 wrote to memory of 4892 2796 b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe 93 PID 2796 wrote to memory of 4892 2796 b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe 93 PID 4892 wrote to memory of 3264 4892 cmd.exe 95 PID 4892 wrote to memory of 3264 4892 cmd.exe 95 PID 4892 wrote to memory of 3264 4892 cmd.exe 95 PID 4892 wrote to memory of 4676 4892 cmd.exe 97 PID 4892 wrote to memory of 4676 4892 cmd.exe 97 PID 4892 wrote to memory of 4676 4892 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe"C:\Users\Admin\AppData\Local\Temp\b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 2796 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\b8d0d8de96b67426c07e2735824fb59362b614547a6e45f206d3d66939c998c5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 27963⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:4676
-
-