Analysis
-
max time kernel
78s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 06:18
Static task
static1
General
-
Target
6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe
-
Size
355KB
-
MD5
b58af9de377e3b9574b12362042cd11e
-
SHA1
25d0cda18fdc0c59cf91fd16d4a82f06074d6ddf
-
SHA256
6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d
-
SHA512
b05b80434abbb62309e763b2cf04bb44d01dfc0a97c92252828249826b2393ed1a5fe018452fa1bac427e5d2ed9b76dc29c702a1a1407345a789b923f5596ff7
-
SSDEEP
6144:Am0wvqT7N31Yb/28PKBAP6dqy190qHXq+np1DAewpzi:Am0WqT7N3ibvKBAP6dqy190qZp1APzi
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4988-138-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-139-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-143-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-141-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-145-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-147-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-149-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-151-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-153-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-155-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-157-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-159-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-161-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-163-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-165-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-167-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-169-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-171-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-173-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-175-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-177-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-179-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-181-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-183-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-185-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-187-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-189-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-191-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-193-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-195-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-197-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-199-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline behavioral1/memory/4988-201-0x0000000004F80000-0x0000000004FD2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2292 4988 WerFault.exe 6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exepid process 4988 6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe 4988 6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exedescription pid process Token: SeDebugPrivilege 4988 6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe"C:\Users\Admin\AppData\Local\Temp\6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 15802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4988 -ip 49881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4988-134-0x00000000074A0000-0x0000000007A44000-memory.dmpFilesize
5.6MB
-
memory/4988-135-0x00000000048C0000-0x0000000004922000-memory.dmpFilesize
392KB
-
memory/4988-137-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/4988-136-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/4988-138-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-139-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-143-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-141-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-145-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-147-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-149-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-151-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-153-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-155-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-157-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-159-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-161-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-163-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-165-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-167-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-169-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-171-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-173-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-175-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-177-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-179-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-181-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-183-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-185-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-187-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-189-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-191-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-193-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-195-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-197-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-199-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-201-0x0000000004F80000-0x0000000004FD2000-memory.dmpFilesize
328KB
-
memory/4988-928-0x0000000007A50000-0x0000000008068000-memory.dmpFilesize
6.1MB
-
memory/4988-929-0x00000000073D0000-0x00000000073E2000-memory.dmpFilesize
72KB
-
memory/4988-930-0x0000000008070000-0x000000000817A000-memory.dmpFilesize
1.0MB
-
memory/4988-931-0x00000000073F0000-0x000000000742C000-memory.dmpFilesize
240KB
-
memory/4988-932-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/4988-933-0x00000000083F0000-0x0000000008456000-memory.dmpFilesize
408KB
-
memory/4988-934-0x0000000008AC0000-0x0000000008B52000-memory.dmpFilesize
584KB
-
memory/4988-935-0x0000000008B70000-0x0000000008BE6000-memory.dmpFilesize
472KB
-
memory/4988-936-0x0000000008C50000-0x0000000008E12000-memory.dmpFilesize
1.8MB
-
memory/4988-937-0x0000000008E30000-0x000000000935C000-memory.dmpFilesize
5.2MB
-
memory/4988-938-0x0000000009470000-0x000000000948E000-memory.dmpFilesize
120KB
-
memory/4988-940-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB
-
memory/4988-941-0x0000000007490000-0x00000000074A0000-memory.dmpFilesize
64KB