Analysis
-
max time kernel
143s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2023, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f.exe
Resource
win10v2004-20230220-en
General
-
Target
0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f.exe
-
Size
292KB
-
MD5
630cc5557aaae98c7e2e72554b03e269
-
SHA1
7721dc2463a1ba58a20ff4c1d498b9d44c7e7380
-
SHA256
0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f
-
SHA512
6c4a66ab2e2b0b1f5efc55cdc764db0e89eff11b116555d9126c84de401b9151d2ce36b88ca974fb1a617991521c4fa87165b60d334918342324cfb2f752a863
-
SSDEEP
6144:ls1FVQORSy4tVj75VyyQJTnXqHtxHg5o5q:sFVvyVnyUH/15q
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2996-137-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-138-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-140-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-142-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-144-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-148-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-150-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-152-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-154-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-156-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-158-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-160-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-162-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-164-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-168-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-166-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-170-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-172-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-174-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-176-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-180-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-178-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-182-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-184-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-186-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-188-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-190-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-192-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-194-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-196-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-198-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-200-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline behavioral1/memory/2996-202-0x0000000004C80000-0x0000000004CD2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1508 2996 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2996 0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f.exe 2996 0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2996 0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f.exe"C:\Users\Admin\AppData\Local\Temp\0bcef2bf54ca71238c28d3b8fd4321e6d724f51a0589b5d9635cc3681fb4630f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 12802⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2996 -ip 29961⤵PID:3736