Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    23-10-2021 15:56

General

  • Target

    HWIDSpoofer.exe

  • Size

    228KB

  • MD5

    7f6c1c3dab43e36343f5afd2f8dd0a48

  • SHA1

    9c23bfd4cfbddf63322166c6a6607aa7c98d4073

  • SHA256

    22a6f7091bc5db307a3c26c51281b9220eb193e822a724a45f409269511758b7

  • SHA512

    607ff3aad98f4d0818c4155fc0419785d783cf5f279804103fc435aad5c972d774a11e784bdcc7c14c7abcf219731cf448b9aa993329e16f8f354699121a22a9

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HWIDSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\HWIDSpoofer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1588

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1588-55-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
    Filesize

    4KB

  • memory/1588-57-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/1588-58-0x000000001B040000-0x000000001B042000-memory.dmp
    Filesize

    8KB

  • memory/1588-59-0x00000000003A0000-0x00000000003BB000-memory.dmp
    Filesize

    108KB