Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 01:01
Behavioral task
behavioral1
Sample
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe
Resource
win10v2004-20241007-en
General
-
Target
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe
-
Size
873KB
-
MD5
706d02b9e190b243b775b2cd324f3e0a
-
SHA1
550bfa7e25c5fdbad45b23b6a9427c8cfaa2223c
-
SHA256
b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b
-
SHA512
f421d357b2279714514c243b9fc9e0ed12c36ad4ec299efa6cbb61546af86ca762f552dcf8e6c97ce0fa3b4b81bdc6ecf159f49b1e763a970397b88d95bf0014
-
SSDEEP
3072:/K1JZOpTvVQZ+rcIeRYs6YmszJqoD2n7BpGGoMTb3R35dINX9r5Dxz:mOpu0rjeRbVJqoDy1pGGoMTb3RDINN
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3600-1-0x0000000000090000-0x00000000000BA000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Kills process with taskkill 1 IoCs
pid Process 4064 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3600 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe Token: SeDebugPrivilege 4064 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3600 wrote to memory of 2912 3600 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe 89 PID 3600 wrote to memory of 2912 3600 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe 89 PID 3600 wrote to memory of 2912 3600 b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe 89 PID 2912 wrote to memory of 4064 2912 cmd.exe 91 PID 2912 wrote to memory of 4064 2912 cmd.exe 91 PID 2912 wrote to memory of 4064 2912 cmd.exe 91 PID 2912 wrote to memory of 1196 2912 cmd.exe 92 PID 2912 wrote to memory of 1196 2912 cmd.exe 92 PID 2912 wrote to memory of 1196 2912 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe"C:\Users\Admin\AppData\Local\Temp\b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3600 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\b7860797d5ca9d10d2ce686bae369f9627acea0516dfdfbf952916e63dae859b.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 36003⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-