Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    16/02/2023, 08:33

General

  • Target

    file.exe

  • Size

    303KB

  • MD5

    38be316a8a1cc96f755886059673a83d

  • SHA1

    4152ba7a4ac695408d14b64f5345e26f4d1586eb

  • SHA256

    9c4fd015ee98e884ff12316a00717659c63d0c7aa168870ba99dbf0706903d27

  • SHA512

    7b60436499e32ff9ca06e566ef1a187a749d73b41db7b9f5a977c9c4f9ce408db35dfeee194acc4928f19a904139be2912eb67f79b3c26d20748ac3b34951327

  • SSDEEP

    6144:+EZLB207UOxo8fGlsNw34VSMEkjSWBIdo6sO85s2:+mt20gOzel1FXWBI+6sp

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1796

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1796-54-0x0000000002550000-0x00000000025AA000-memory.dmp

          Filesize

          360KB

        • memory/1796-55-0x0000000004AD0000-0x0000000004B28000-memory.dmp

          Filesize

          352KB

        • memory/1796-56-0x00000000008FC000-0x0000000000929000-memory.dmp

          Filesize

          180KB

        • memory/1796-57-0x0000000000220000-0x0000000000282000-memory.dmp

          Filesize

          392KB

        • memory/1796-58-0x0000000000400000-0x00000000007CB000-memory.dmp

          Filesize

          3.8MB

        • memory/1796-59-0x00000000761E1000-0x00000000761E3000-memory.dmp

          Filesize

          8KB

        • memory/1796-60-0x00000000008FC000-0x0000000000929000-memory.dmp

          Filesize

          180KB

        • memory/1796-61-0x0000000000400000-0x00000000007CB000-memory.dmp

          Filesize

          3.8MB