Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
25-11-2021 12:22
Static task
static1
General
-
Target
5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe
-
Size
390KB
-
MD5
47f72d8522c2cc26903abdc241d9b257
-
SHA1
16f42fb7cae8ed5f307a71af7c346d0524777bdd
-
SHA256
5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f
-
SHA512
2765eb16e22de30bf72387406dea46059e3079bcc68191829cafd5bc72bea3dcf875d138f2cff8989e09859e60c2b13854b27692b535232ba3964c259c483a3d
Malware Config
Extracted
redline
proliv2
92.255.76.242:1101
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4344-124-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/4344-125-0x0000000000418F66-mapping.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exedescription pid process target process PID 3472 set thread context of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exepid process 4344 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exedescription pid process Token: SeDebugPrivilege 4344 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exedescription pid process target process PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe PID 3472 wrote to memory of 4344 3472 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe 5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe"C:\Users\Admin\AppData\Local\Temp\5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exeC:\Users\Admin\AppData\Local\Temp\5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5e396f77c5e8138bad46a4caa168e5be03f36fb74d33e1026831b7ddd267895f.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
memory/3472-120-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/3472-121-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/3472-122-0x0000000005880000-0x0000000005881000-memory.dmpFilesize
4KB
-
memory/3472-123-0x0000000005370000-0x0000000005371000-memory.dmpFilesize
4KB
-
memory/3472-118-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/4344-129-0x0000000005AF0000-0x0000000005AF1000-memory.dmpFilesize
4KB
-
memory/4344-125-0x0000000000418F66-mapping.dmp
-
memory/4344-124-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4344-130-0x0000000005AA0000-0x0000000005AA1000-memory.dmpFilesize
4KB
-
memory/4344-131-0x0000000007350000-0x0000000007351000-memory.dmpFilesize
4KB
-
memory/4344-132-0x0000000007280000-0x0000000007281000-memory.dmpFilesize
4KB
-
memory/4344-133-0x00000000072C0000-0x00000000072C1000-memory.dmpFilesize
4KB
-
memory/4344-134-0x00000000075F0000-0x00000000075F1000-memory.dmpFilesize
4KB
-
memory/4344-136-0x00000000078C0000-0x00000000078C1000-memory.dmpFilesize
4KB
-
memory/4344-139-0x0000000007C10000-0x0000000007C11000-memory.dmpFilesize
4KB
-
memory/4344-140-0x0000000008CE0000-0x0000000008CE1000-memory.dmpFilesize
4KB
-
memory/4344-141-0x0000000008F00000-0x0000000008F01000-memory.dmpFilesize
4KB
-
memory/4344-142-0x0000000009600000-0x0000000009601000-memory.dmpFilesize
4KB