Analysis

  • max time kernel
    62s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 12:30

General

  • Target

    9a44b63f32b586099420810f08c13873.exe

  • Size

    595KB

  • MD5

    9a44b63f32b586099420810f08c13873

  • SHA1

    c5c7b81bb487e7a97edc0679f2d744d5f28a4ccc

  • SHA256

    1d6594dae8104135ded8e7ccb1adb6805ef9d770d866b8786dec290a639c9920

  • SHA512

    2d1ab694f97eff57a8e04daaf1a45da11a2b825b03db9964ff7d54f096801e14c70fd7baacdb66571b2b1cb047cc50c1d4cbd302a74e3256f36cea5569cc585e

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a44b63f32b586099420810f08c13873.exe
    "C:\Users\Admin\AppData\Local\Temp\9a44b63f32b586099420810f08c13873.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Users\Admin\AppData\Local\Temp\9a44b63f32b586099420810f08c13873.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1252

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9a44b63f32b586099420810f08c13873.exe.log
    MD5

    0c2899d7c6746f42d5bbe088c777f94c

    SHA1

    622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

    SHA256

    5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

    SHA512

    ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

  • memory/1252-23-0x0000000005C40000-0x0000000005C41000-memory.dmp
    Filesize

    4KB

  • memory/1252-22-0x00000000061A0000-0x00000000061A1000-memory.dmp
    Filesize

    4KB

  • memory/1252-14-0x000000000041E1AA-mapping.dmp
  • memory/1252-28-0x0000000007640000-0x0000000007641000-memory.dmp
    Filesize

    4KB

  • memory/1252-26-0x0000000005F40000-0x0000000005F41000-memory.dmp
    Filesize

    4KB

  • memory/1252-25-0x0000000005CE0000-0x0000000005CE1000-memory.dmp
    Filesize

    4KB

  • memory/1252-24-0x0000000005CA0000-0x0000000005CA1000-memory.dmp
    Filesize

    4KB

  • memory/1252-21-0x00000000059F0000-0x00000000059F1000-memory.dmp
    Filesize

    4KB

  • memory/1252-16-0x0000000073920000-0x000000007400E000-memory.dmp
    Filesize

    6.9MB

  • memory/1252-13-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1252-31-0x0000000007220000-0x0000000007221000-memory.dmp
    Filesize

    4KB

  • memory/1252-27-0x0000000006F40000-0x0000000006F41000-memory.dmp
    Filesize

    4KB

  • memory/1252-20-0x0000000005420000-0x0000000005421000-memory.dmp
    Filesize

    4KB

  • memory/1252-19-0x0000000005430000-0x0000000005431000-memory.dmp
    Filesize

    4KB

  • memory/3996-12-0x0000000009A00000-0x0000000009A2C000-memory.dmp
    Filesize

    176KB

  • memory/3996-11-0x0000000007490000-0x00000000074FC000-memory.dmp
    Filesize

    432KB

  • memory/3996-5-0x0000000005320000-0x0000000005321000-memory.dmp
    Filesize

    4KB

  • memory/3996-2-0x0000000073920000-0x000000007400E000-memory.dmp
    Filesize

    6.9MB

  • memory/3996-10-0x00000000071F0000-0x00000000071F1000-memory.dmp
    Filesize

    4KB

  • memory/3996-9-0x0000000007140000-0x0000000007142000-memory.dmp
    Filesize

    8KB

  • memory/3996-8-0x0000000004D90000-0x0000000004D91000-memory.dmp
    Filesize

    4KB

  • memory/3996-3-0x0000000000400000-0x0000000000401000-memory.dmp
    Filesize

    4KB

  • memory/3996-7-0x0000000004F80000-0x0000000004F81000-memory.dmp
    Filesize

    4KB

  • memory/3996-6-0x0000000004E20000-0x0000000004E21000-memory.dmp
    Filesize

    4KB