Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/07/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe
Resource
win11-20240709-en
General
-
Target
ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe
-
Size
684KB
-
MD5
ccb5fb482644c646c2e8d6cb452cd8b9
-
SHA1
672a3777e9af918c12684c2443fad0408d4f0b9c
-
SHA256
ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3
-
SHA512
68f586064fe36d5d8cb7946b3e0575f81acdc8e9cc96279fc86c77bdc90ab13593f6600e4a613e38fd85be4ca420d65fe315f149634d34dcbed652d3c8af0ee6
-
SSDEEP
12288:8x4DcvRLEezYlCGlxr5mEjZZOGWqmHBs9PR9oStB2GN:lgZ4zlCIrIUgG1aEPjHtB
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2336-1-0x0000000000400000-0x0000000000484000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe 2336 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2336 RegAsm.exe Token: SeBackupPrivilege 2336 RegAsm.exe Token: SeSecurityPrivilege 2336 RegAsm.exe Token: SeSecurityPrivilege 2336 RegAsm.exe Token: SeSecurityPrivilege 2336 RegAsm.exe Token: SeSecurityPrivilege 2336 RegAsm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4788 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 83 PID 2924 wrote to memory of 4788 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 83 PID 2924 wrote to memory of 4788 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 83 PID 2924 wrote to memory of 3812 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 84 PID 2924 wrote to memory of 3812 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 84 PID 2924 wrote to memory of 3812 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 84 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85 PID 2924 wrote to memory of 2336 2924 ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe"C:\Users\Admin\AppData\Local\Temp\ccf84555c4eb3c3e81f4e939ee2dbf7b4922ee90cc7137aaa11afe6062b309d3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-