Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2023, 13:31

General

  • Target

    file.exe

  • Size

    299KB

  • MD5

    dea3f72864eeba91b785774b409fd92f

  • SHA1

    f22b218acdeb389e78f3e8e1a2dc462bf3a6cc8b

  • SHA256

    3ed07cb407ef3542c3b07ef7384ecabb61630cbef0ad181df3ec607dce802b40

  • SHA512

    8400d988eb791b88467b2c50150aa6760cf7ad08813e9afd5403bf0e1c2e5e7e7f670c3fa1720b56ce627590a64d5aef9618fd1dbd41dcb68ecbc987b4cec10c

  • SSDEEP

    6144:Wje9COpZddjROnyo+eGz05ncqRpVJEIC1sSw3dUY+tvMoKG:Wj4vpZddjRUygJ5nc8p0WSi+t0o

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1820-54-0x0000000002470000-0x00000000024CA000-memory.dmp

          Filesize

          360KB

        • memory/1820-55-0x000000000065B000-0x0000000000688000-memory.dmp

          Filesize

          180KB

        • memory/1820-56-0x00000000002F0000-0x0000000000352000-memory.dmp

          Filesize

          392KB

        • memory/1820-57-0x0000000000400000-0x000000000057D000-memory.dmp

          Filesize

          1.5MB

        • memory/1820-58-0x00000000024D0000-0x0000000002528000-memory.dmp

          Filesize

          352KB

        • memory/1820-59-0x00000000757B1000-0x00000000757B3000-memory.dmp

          Filesize

          8KB

        • memory/1820-60-0x0000000000400000-0x000000000057D000-memory.dmp

          Filesize

          1.5MB