Analysis
-
max time kernel
105s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
02-02-2022 14:41
Static task
static1
General
-
Target
d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe
-
Size
489KB
-
MD5
183a84c3d59fa6de2b34b5ccbc32637c
-
SHA1
6e30576335ccda4544d4120af63317e634dc49ed
-
SHA256
d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e
-
SHA512
bb273052914d30ad66191950a301f9899cf28d7ac52ea3d0a1c1cf1e02f8ffcfccffce031533fcf5d6b39aaf139185dcce683f32fe4b01e55bcb4d21291fa495
Malware Config
Extracted
redline
1
stata2021.best:21675
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3020-180-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/3020-190-0x0000000005650000-0x0000000005C68000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exedescription pid process target process PID 3712 set thread context of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exedescription pid process Token: SeDebugPrivilege 3020 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exedescription pid process target process PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe PID 3712 wrote to memory of 3020 3712 d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe"C:\Users\Admin\AppData\Local\Temp\d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exeC:\Users\Admin\AppData\Local\Temp\d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e.exe.logMD5
e5352797047ad2c91b83e933b24fbc4f
SHA19bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827
-
memory/3020-189-0x00000000056F0000-0x000000000572C000-memory.dmpFilesize
240KB
-
memory/3020-190-0x0000000005650000-0x0000000005C68000-memory.dmpFilesize
6.1MB
-
memory/3020-195-0x00000000074E0000-0x0000000007530000-memory.dmpFilesize
320KB
-
memory/3020-180-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3020-184-0x0000000005C70000-0x0000000006288000-memory.dmpFilesize
6.1MB
-
memory/3020-185-0x0000000005690000-0x00000000056A2000-memory.dmpFilesize
72KB
-
memory/3020-194-0x00000000079C0000-0x0000000007EEC000-memory.dmpFilesize
5.2MB
-
memory/3020-193-0x00000000072C0000-0x0000000007482000-memory.dmpFilesize
1.8MB
-
memory/3020-188-0x00000000057C0000-0x00000000058CA000-memory.dmpFilesize
1.0MB
-
memory/3020-191-0x0000000005A90000-0x0000000005B22000-memory.dmpFilesize
584KB
-
memory/3020-192-0x0000000005B30000-0x0000000005B96000-memory.dmpFilesize
408KB
-
memory/3712-130-0x00000000003C0000-0x0000000000440000-memory.dmpFilesize
512KB
-
memory/3712-152-0x0000000004D70000-0x0000000004D8E000-memory.dmpFilesize
120KB
-
memory/3712-178-0x00000000054A0000-0x0000000005A44000-memory.dmpFilesize
5.6MB
-
memory/3712-133-0x0000000004DF0000-0x0000000004E66000-memory.dmpFilesize
472KB