Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    23-10-2021 15:56

General

  • Target

    HWIDSpoofer.exe

  • Size

    228KB

  • MD5

    7f6c1c3dab43e36343f5afd2f8dd0a48

  • SHA1

    9c23bfd4cfbddf63322166c6a6607aa7c98d4073

  • SHA256

    22a6f7091bc5db307a3c26c51281b9220eb193e822a724a45f409269511758b7

  • SHA512

    607ff3aad98f4d0818c4155fc0419785d783cf5f279804103fc435aad5c972d774a11e784bdcc7c14c7abcf219731cf448b9aa993329e16f8f354699121a22a9

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HWIDSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\HWIDSpoofer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4184

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4184-115-0x0000000000E70000-0x0000000000E71000-memory.dmp
    Filesize

    4KB

  • memory/4184-117-0x00000000015A0000-0x00000000015A1000-memory.dmp
    Filesize

    4KB

  • memory/4184-118-0x0000000001700000-0x000000000171B000-memory.dmp
    Filesize

    108KB

  • memory/4184-119-0x000000001DE60000-0x000000001DE61000-memory.dmp
    Filesize

    4KB

  • memory/4184-120-0x0000000001740000-0x0000000001741000-memory.dmp
    Filesize

    4KB

  • memory/4184-121-0x00000000017A0000-0x00000000017A1000-memory.dmp
    Filesize

    4KB

  • memory/4184-122-0x000000001BB80000-0x000000001BB82000-memory.dmp
    Filesize

    8KB

  • memory/4184-123-0x000000001DD50000-0x000000001DD51000-memory.dmp
    Filesize

    4KB

  • memory/4184-124-0x0000000001760000-0x0000000001761000-memory.dmp
    Filesize

    4KB

  • memory/4184-125-0x000000001E440000-0x000000001E441000-memory.dmp
    Filesize

    4KB

  • memory/4184-126-0x000000001EB40000-0x000000001EB41000-memory.dmp
    Filesize

    4KB

  • memory/4184-127-0x000000001BB82000-0x000000001BB84000-memory.dmp
    Filesize

    8KB