Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2023, 01:36

General

  • Target

    9ecb26d586194894552acafc76e8fba3eb1159ef98952d99e561aa728ca8f4a1.exe

  • Size

    376KB

  • MD5

    2aa640047b3591cb50ac47933ba4dcd8

  • SHA1

    c903143c4134cf67670cd50bc6258048de89fde2

  • SHA256

    9ecb26d586194894552acafc76e8fba3eb1159ef98952d99e561aa728ca8f4a1

  • SHA512

    e91e38b129d9ddd844f1f3a5e203b98a3155932072e7d83341f7e58f621686a2459f89ba62d95e563f5a9ae138563c9d26a94cba3ebeee3594991b5afc8186c5

  • SSDEEP

    6144:Mq4uVfFu2Xp1mJY8WZjlrze20P6OhsP1hAK:1rV02XpUWDz86ZAK

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ecb26d586194894552acafc76e8fba3eb1159ef98952d99e561aa728ca8f4a1.exe
    "C:\Users\Admin\AppData\Local\Temp\9ecb26d586194894552acafc76e8fba3eb1159ef98952d99e561aa728ca8f4a1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 1608
      2⤵
      • Program crash
      PID:2608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1688 -ip 1688
    1⤵
      PID:2516

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1688-134-0x0000000004DA0000-0x0000000005344000-memory.dmp

            Filesize

            5.6MB

          • memory/1688-135-0x0000000000790000-0x00000000007F2000-memory.dmp

            Filesize

            392KB

          • memory/1688-136-0x0000000004D90000-0x0000000004DA0000-memory.dmp

            Filesize

            64KB

          • memory/1688-137-0x0000000004D90000-0x0000000004DA0000-memory.dmp

            Filesize

            64KB

          • memory/1688-138-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-139-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-141-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-143-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-145-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-147-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-149-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-151-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-153-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-155-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-157-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-159-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-161-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-163-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-165-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-167-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-169-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-171-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-173-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-175-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-177-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-179-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-181-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-183-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-185-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-187-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-189-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-191-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-193-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-195-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-197-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-199-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-201-0x0000000004CD0000-0x0000000004D22000-memory.dmp

            Filesize

            328KB

          • memory/1688-928-0x0000000005350000-0x0000000005968000-memory.dmp

            Filesize

            6.1MB

          • memory/1688-929-0x00000000059D0000-0x00000000059E2000-memory.dmp

            Filesize

            72KB

          • memory/1688-930-0x00000000059F0000-0x0000000005AFA000-memory.dmp

            Filesize

            1.0MB

          • memory/1688-931-0x0000000004D90000-0x0000000004DA0000-memory.dmp

            Filesize

            64KB

          • memory/1688-932-0x0000000005B00000-0x0000000005B3C000-memory.dmp

            Filesize

            240KB

          • memory/1688-933-0x0000000005E10000-0x0000000005E76000-memory.dmp

            Filesize

            408KB

          • memory/1688-934-0x00000000064E0000-0x0000000006572000-memory.dmp

            Filesize

            584KB

          • memory/1688-935-0x0000000006590000-0x0000000006606000-memory.dmp

            Filesize

            472KB

          • memory/1688-936-0x0000000006650000-0x000000000666E000-memory.dmp

            Filesize

            120KB

          • memory/1688-937-0x0000000006810000-0x00000000069D2000-memory.dmp

            Filesize

            1.8MB

          • memory/1688-938-0x00000000069F0000-0x0000000006F1C000-memory.dmp

            Filesize

            5.2MB

          • memory/1688-941-0x0000000004D90000-0x0000000004DA0000-memory.dmp

            Filesize

            64KB

          • memory/1688-942-0x0000000004D90000-0x0000000004DA0000-memory.dmp

            Filesize

            64KB