Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2023 22:03

General

  • Target

    file.exe

  • Size

    418KB

  • MD5

    07e73de70f3e77a3c2a6a90b003a56a8

  • SHA1

    40d7c7ff20e9b57fc90a73bea5c1751a9b7c7c41

  • SHA256

    a0253597a85974127ced18973e7df4949826b54149b63e0bcccf7a11c7083b3f

  • SHA512

    fbd775bbb686fccfbacc8b0f60eaf2cc4f88abdf691d58dc2849051d20493721015f995fbd6d75e8f4ba54e78dd7b6a38a4d1619511ee939e17be81d26e1c283

  • SSDEEP

    6144:b/sCy2tBhPOqsxQ91KCO0Z9MipKCLhLiqmv:bkB2tBtOCPKd0Ztg

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1720-54-0x00000000006FB000-0x0000000000729000-memory.dmp

    Filesize

    184KB

  • memory/1720-55-0x0000000000220000-0x0000000000282000-memory.dmp

    Filesize

    392KB

  • memory/1720-57-0x00000000021D0000-0x000000000222A000-memory.dmp

    Filesize

    360KB

  • memory/1720-56-0x0000000000400000-0x00000000005A7000-memory.dmp

    Filesize

    1.7MB

  • memory/1720-58-0x0000000002230000-0x0000000002288000-memory.dmp

    Filesize

    352KB

  • memory/1720-59-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

    Filesize

    8KB

  • memory/1720-60-0x00000000006FB000-0x0000000000729000-memory.dmp

    Filesize

    184KB

  • memory/1720-61-0x0000000000400000-0x00000000005A7000-memory.dmp

    Filesize

    1.7MB