Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
01-02-2022 16:56
Behavioral task
behavioral1
Sample
2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe
Resource
win10-en-20211208
General
-
Target
2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe
-
Size
1.7MB
-
MD5
6682e8026bf41367710e90514205b756
-
SHA1
d0cf2f9bf38109840172d88ba11db803d8bd1bc3
-
SHA256
2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7
-
SHA512
3bffb3c860f4dac65de11a58d2858b98d04404bd9a4e4236e2ffe0fe1821cc7974170e063aab351aa315be55fbfc7f787ecd44c8d8a218a95e640175e5592248
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3500-118-0x0000000000D50000-0x0000000000EED000-memory.dmp family_redline behavioral1/memory/3500-123-0x0000000000D50000-0x0000000000EED000-memory.dmp family_redline behavioral1/memory/3500-124-0x0000000000D50000-0x0000000000EED000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exepid process 3500 2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exepid process 3500 2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe 3500 2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe 3500 2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exedescription pid process Token: SeDebugPrivilege 3500 2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe"C:\Users\Admin\AppData\Local\Temp\2d6c4142c93b3a5b6644c32c472ab73046504e8ee54f9e5f439bdb01b61aead7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3500-118-0x0000000000D50000-0x0000000000EED000-memory.dmpFilesize
1.6MB
-
memory/3500-119-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/3500-120-0x00000000762F0000-0x00000000764B2000-memory.dmpFilesize
1.8MB
-
memory/3500-121-0x0000000000C50000-0x0000000000C94000-memory.dmpFilesize
272KB
-
memory/3500-122-0x0000000075630000-0x0000000075721000-memory.dmpFilesize
964KB
-
memory/3500-123-0x0000000000D50000-0x0000000000EED000-memory.dmpFilesize
1.6MB
-
memory/3500-124-0x0000000000D50000-0x0000000000EED000-memory.dmpFilesize
1.6MB
-
memory/3500-125-0x0000000071B10000-0x0000000071B90000-memory.dmpFilesize
512KB
-
memory/3500-126-0x0000000076A40000-0x0000000076FC4000-memory.dmpFilesize
5.5MB
-
memory/3500-128-0x0000000004E20000-0x0000000004E21000-memory.dmpFilesize
4KB
-
memory/3500-127-0x0000000073EA0000-0x00000000751E8000-memory.dmpFilesize
19.3MB
-
memory/3500-129-0x0000000005440000-0x0000000005A46000-memory.dmpFilesize
6.0MB
-
memory/3500-130-0x0000000004DB0000-0x0000000004DC2000-memory.dmpFilesize
72KB
-
memory/3500-131-0x0000000004F40000-0x000000000504A000-memory.dmpFilesize
1.0MB
-
memory/3500-132-0x0000000004E30000-0x0000000004E6E000-memory.dmpFilesize
248KB
-
memory/3500-133-0x0000000005220000-0x00000000053E2000-memory.dmpFilesize
1.8MB
-
memory/3500-134-0x0000000004E70000-0x0000000004EBB000-memory.dmpFilesize
300KB
-
memory/3500-135-0x0000000071780000-0x00000000717CB000-memory.dmpFilesize
300KB
-
memory/3500-136-0x0000000005BC0000-0x0000000005C26000-memory.dmpFilesize
408KB
-
memory/3500-137-0x0000000005CD0000-0x0000000005D62000-memory.dmpFilesize
584KB
-
memory/3500-138-0x0000000006420000-0x0000000006496000-memory.dmpFilesize
472KB
-
memory/3500-139-0x00000000069A0000-0x0000000006E9E000-memory.dmpFilesize
5.0MB
-
memory/3500-140-0x0000000006650000-0x000000000666E000-memory.dmpFilesize
120KB
-
memory/3500-141-0x0000000007E80000-0x00000000083AC000-memory.dmpFilesize
5.2MB