Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2023 16:31

General

  • Target

    file.exe

  • Size

    416KB

  • MD5

    05cce02c0341e2ccb097cc41bac3a92a

  • SHA1

    d246a6d26cab9b912e778f34e0a088256e4f5c42

  • SHA256

    5bab80a861d325c8cf98c898f427da01676b465de826543fd435b7a7ffbafdb8

  • SHA512

    1abb5f377682e6674604f256eb78bcbbeccfb6133cd8140b96dcd2061ff9c8a17faef81b419b5bb2a9d8c9cc86ad034e0d2dbc28e892e415284c06c6a53371de

  • SSDEEP

    6144:L2Orptl2sH4+mNBHJ3mFAJQgxYiYs8W/sUxLiqeBlv:LX9Pj8p37JHYXoho9

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2000-54-0x00000000020F0000-0x000000000214A000-memory.dmp

    Filesize

    360KB

  • memory/2000-55-0x0000000002300000-0x0000000002358000-memory.dmp

    Filesize

    352KB

  • memory/2000-56-0x0000000075D11000-0x0000000075D13000-memory.dmp

    Filesize

    8KB

  • memory/2000-57-0x00000000002EC000-0x0000000000319000-memory.dmp

    Filesize

    180KB

  • memory/2000-58-0x0000000000560000-0x00000000005C2000-memory.dmp

    Filesize

    392KB

  • memory/2000-59-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/2000-60-0x00000000002EC000-0x0000000000319000-memory.dmp

    Filesize

    180KB

  • memory/2000-61-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB