Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 01:01
Behavioral task
behavioral1
Sample
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe
Resource
win10v2004-20241007-en
General
-
Target
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe
-
Size
873KB
-
MD5
706d02b9e190b243b775b2cd324f3e0a
-
SHA1
550bfa7e25c5fdbad45b23b6a9427c8cfaa2223c
-
SHA256
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b
-
SHA512
f421d357b2279714514c243b9fc9e0ed12c36ad4ec299efa6cbb61546af86ca762f552dcf8e6c97ce0fa3b4b81bdc6ecf159f49b1e763a970397b88d95bf0014
-
SSDEEP
3072:/K1JZOpTvVQZ+rcIeRYs6YmszJqoD2n7BpGGoMTb3R35dINX9r5Dxz:mOpu0rjeRbVJqoDy1pGGoMTb3RDINN
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2168-1-0x00000000000F0000-0x000000000011A000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Kills process with taskkill 1 IoCs
pid Process 2888 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2168 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe Token: SeDebugPrivilege 2888 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2812 2168 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe 31 PID 2168 wrote to memory of 2812 2168 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe 31 PID 2168 wrote to memory of 2812 2168 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe 31 PID 2168 wrote to memory of 2812 2168 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe 31 PID 2812 wrote to memory of 2888 2812 cmd.exe 33 PID 2812 wrote to memory of 2888 2812 cmd.exe 33 PID 2812 wrote to memory of 2888 2812 cmd.exe 33 PID 2812 wrote to memory of 2888 2812 cmd.exe 33 PID 2812 wrote to memory of 2896 2812 cmd.exe 35 PID 2812 wrote to memory of 2896 2812 cmd.exe 35 PID 2812 wrote to memory of 2896 2812 cmd.exe 35 PID 2812 wrote to memory of 2896 2812 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe"C:\Users\Admin\AppData\Local\Temp\b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 2168 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 21683⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-