Analysis

  • max time kernel
    59s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    26-02-2021 12:34

General

  • Target

    Hacks.bin.exe

  • Size

    609KB

  • MD5

    51bab0bec161b0f10402de83f79e04a9

  • SHA1

    97f11fa455412b180d172549273d1f2073cc0597

  • SHA256

    abf7251fbf1cfef7cb9b046a333adcdb417cdf787035d9be7ed892dfc56c467f

  • SHA512

    23103560377628756b94ff1e20bac34f7ebf93e2a1b2beaf11da4cc5e1ee449b57ee99f8fcf0b059e6eb022c6f4fac8d1ce7dc312082ee8bf681b7e4bfb8ec35

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hacks.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Hacks.bin.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Users\Admin\AppData\Local\Temp\Hacks.bin.exe
      "{path}"
      2⤵
        PID:3168
      • C:\Users\Admin\AppData\Local\Temp\Hacks.bin.exe
        "{path}"
        2⤵
          PID:412
        • C:\Users\Admin\AppData\Local\Temp\Hacks.bin.exe
          "{path}"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:508

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Hacks.bin.exe.log
        MD5

        0c2899d7c6746f42d5bbe088c777f94c

        SHA1

        622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

        SHA256

        5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

        SHA512

        ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

      • memory/508-23-0x0000000005580000-0x0000000005581000-memory.dmp
        Filesize

        4KB

      • memory/508-22-0x0000000005520000-0x0000000005521000-memory.dmp
        Filesize

        4KB

      • memory/508-30-0x0000000006D80000-0x0000000006D81000-memory.dmp
        Filesize

        4KB

      • memory/508-15-0x0000000073430000-0x0000000073B1E000-memory.dmp
        Filesize

        6.9MB

      • memory/508-26-0x0000000006AA0000-0x0000000006AA1000-memory.dmp
        Filesize

        4KB

      • memory/508-25-0x0000000005830000-0x0000000005831000-memory.dmp
        Filesize

        4KB

      • memory/508-24-0x00000000055C0000-0x00000000055C1000-memory.dmp
        Filesize

        4KB

      • memory/508-21-0x00000000056E0000-0x00000000056E1000-memory.dmp
        Filesize

        4KB

      • memory/508-12-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/508-13-0x000000000041EFD6-mapping.dmp
      • memory/508-31-0x0000000007010000-0x0000000007011000-memory.dmp
        Filesize

        4KB

      • memory/508-27-0x00000000071A0000-0x00000000071A1000-memory.dmp
        Filesize

        4KB

      • memory/508-20-0x0000000005D00000-0x0000000005D01000-memory.dmp
        Filesize

        4KB

      • memory/508-19-0x0000000002E40000-0x0000000002E41000-memory.dmp
        Filesize

        4KB

      • memory/508-18-0x00000000054A0000-0x00000000054A1000-memory.dmp
        Filesize

        4KB

      • memory/4692-11-0x0000000008D60000-0x0000000008DCF000-memory.dmp
        Filesize

        444KB

      • memory/4692-5-0x0000000005990000-0x0000000005991000-memory.dmp
        Filesize

        4KB

      • memory/4692-2-0x0000000073430000-0x0000000073B1E000-memory.dmp
        Filesize

        6.9MB

      • memory/4692-10-0x0000000005950000-0x000000000595B000-memory.dmp
        Filesize

        44KB

      • memory/4692-9-0x0000000008DF0000-0x0000000008DF1000-memory.dmp
        Filesize

        4KB

      • memory/4692-8-0x0000000005720000-0x0000000005721000-memory.dmp
        Filesize

        4KB

      • memory/4692-7-0x0000000005560000-0x0000000005561000-memory.dmp
        Filesize

        4KB

      • memory/4692-6-0x0000000005590000-0x0000000005591000-memory.dmp
        Filesize

        4KB

      • memory/4692-3-0x0000000000CB0000-0x0000000000CB1000-memory.dmp
        Filesize

        4KB