Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
Adobe Acrobat Reader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Adobe Acrobat Reader.exe
Resource
win10v2004-20241007-en
General
-
Target
Adobe Acrobat Reader.exe
-
Size
750.0MB
-
MD5
0d10e696bd976e8b85c527a47762e4a3
-
SHA1
8b90dbdbcc47c2d1911574f93b7ff0ac45b82a64
-
SHA256
0ff20157672c8473518e8699d508c4fc88c835ebc4d0dd42c892853cae0fac19
-
SHA512
4dd5d2e39d20c509ee89a4ec3c2c54054eff476970f3e7d0db5b09f594cdcf244e3d8d65a526fb6851f9273c7cf78117978e5b8ee9e3074ade2a6929cc090a59
-
SSDEEP
6144:aNsKOejBzPPHaHpDAOHrvpmNMLEG0Rk8FSjxIqg3zpFwHls+bew:aWKOeNPEDtp2RkkSjXIVFie
Malware Config
Extracted
redline
37.220.87.13:48790
-
auth_value
4600169dcd362a3f56b73ff7100d93d6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1820-2-0x0000000000400000-0x0000000000444000-memory.dmp family_redline behavioral1/memory/1820-10-0x0000000000400000-0x0000000000444000-memory.dmp family_redline behavioral1/memory/1820-9-0x0000000000400000-0x0000000000444000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2856 set thread context of 1820 2856 Adobe Acrobat Reader.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2692 2856 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Acrobat Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 1820 2856 Adobe Acrobat Reader.exe 31 PID 2856 wrote to memory of 2692 2856 Adobe Acrobat Reader.exe 32 PID 2856 wrote to memory of 2692 2856 Adobe Acrobat Reader.exe 32 PID 2856 wrote to memory of 2692 2856 Adobe Acrobat Reader.exe 32 PID 2856 wrote to memory of 2692 2856 Adobe Acrobat Reader.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Adobe Acrobat Reader.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Acrobat Reader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 882⤵
- Program crash
PID:2692
-