Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
1aa334cd885efd407bfe0f753ee530f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1aa334cd885efd407bfe0f753ee530f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
1aa334cd885efd407bfe0f753ee530f0N.exe
-
Size
684KB
-
MD5
1aa334cd885efd407bfe0f753ee530f0
-
SHA1
b45559fbc5c37bc2a410da36a78618a32b938b9c
-
SHA256
35c1a3bcbb45c220e02a5be6a0ca7079fbd59e83d7565471ebdc5141ef1340d6
-
SHA512
4c480c39196f021b70209dae3cfdf150fe308de6d36faf176545bc40f60eceaa498f304ab9a23c7463f8d7d25e2ae0305c6a7f464aa296a0b641e60a41eb5bf5
-
SSDEEP
12288:OdgDcvRLr90kPcouDw07vHzi0SB9Ma9zvamDWarxedCHsv3eenlgWiaO:3gZrLwp/zA9Oil4kceenQa
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2360-1-0x0000000000400000-0x0000000000484000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 728 set thread context of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1aa334cd885efd407bfe0f753ee530f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe 2360 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 2360 RegAsm.exe Token: SeBackupPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeBackupPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeBackupPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeBackupPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeBackupPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeBackupPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe Token: SeSecurityPrivilege 2360 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88 PID 728 wrote to memory of 2360 728 1aa334cd885efd407bfe0f753ee530f0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa334cd885efd407bfe0f753ee530f0N.exe"C:\Users\Admin\AppData\Local\Temp\1aa334cd885efd407bfe0f753ee530f0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-