Analysis

  • max time kernel
    80s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2023, 10:26

General

  • Target

    160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe

  • Size

    358KB

  • MD5

    afcd41851326685f7780c56300cfe249

  • SHA1

    f4279dedea48a033d042a9dec7440e1f725dc86b

  • SHA256

    160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18

  • SHA512

    05d62d44a6b892334da7e15a3b16da5b2aff461a8221d8ace2626cc57fc11ed0c037e167ba35b6821e2939240d498f6e8ea7db0004570b501b4316b25ed072dd

  • SSDEEP

    6144:5oLvd+sEQpohx4ckgHC+fgv2L34VJPw7EF9t57I+iQB7iiSHMNb:5o7d+sEQpohhHC+fc2TX7QI+iQB7Ty

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe
    "C:\Users\Admin\AppData\Local\Temp\160fe2e03a3a98494515d9961a9ae62f4bd13d95ec66902b7b6577cf55a38e18.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 1220
      2⤵
      • Program crash
      PID:1600
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1752 -ip 1752
    1⤵
      PID:1556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1752-137-0x0000000000590000-0x00000000005F2000-memory.dmp

      Filesize

      392KB

    • memory/1752-138-0x0000000004C20000-0x00000000051C4000-memory.dmp

      Filesize

      5.6MB

    • memory/1752-139-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-140-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-142-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-144-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-146-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-148-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-150-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-152-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-154-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-156-0x00000000027C0000-0x00000000027D0000-memory.dmp

      Filesize

      64KB

    • memory/1752-158-0x00000000027C0000-0x00000000027D0000-memory.dmp

      Filesize

      64KB

    • memory/1752-160-0x00000000027C0000-0x00000000027D0000-memory.dmp

      Filesize

      64KB

    • memory/1752-161-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-157-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-163-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-165-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-167-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-169-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-171-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-175-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-173-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-177-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-179-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-181-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-185-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-183-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-189-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-187-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-191-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-193-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-195-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-199-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-197-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-201-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-205-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-203-0x00000000051D0000-0x0000000005222000-memory.dmp

      Filesize

      328KB

    • memory/1752-932-0x0000000005240000-0x0000000005858000-memory.dmp

      Filesize

      6.1MB

    • memory/1752-933-0x0000000005900000-0x0000000005912000-memory.dmp

      Filesize

      72KB

    • memory/1752-934-0x0000000005920000-0x0000000005A2A000-memory.dmp

      Filesize

      1.0MB

    • memory/1752-935-0x0000000005A30000-0x0000000005A6C000-memory.dmp

      Filesize

      240KB

    • memory/1752-936-0x00000000027C0000-0x00000000027D0000-memory.dmp

      Filesize

      64KB

    • memory/1752-937-0x0000000005D40000-0x0000000005DA6000-memory.dmp

      Filesize

      408KB

    • memory/1752-938-0x0000000006550000-0x00000000065E2000-memory.dmp

      Filesize

      584KB

    • memory/1752-939-0x0000000006860000-0x00000000068D6000-memory.dmp

      Filesize

      472KB

    • memory/1752-940-0x0000000006920000-0x0000000006AE2000-memory.dmp

      Filesize

      1.8MB

    • memory/1752-941-0x0000000006B00000-0x000000000702C000-memory.dmp

      Filesize

      5.2MB

    • memory/1752-942-0x0000000007140000-0x000000000715E000-memory.dmp

      Filesize

      120KB

    • memory/1752-945-0x00000000027C0000-0x00000000027D0000-memory.dmp

      Filesize

      64KB

    • memory/1752-946-0x00000000027C0000-0x00000000027D0000-memory.dmp

      Filesize

      64KB