Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 16:02
Static task
static1
General
-
Target
ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exe
-
Size
311KB
-
MD5
06be538d980890259f83cc616d397bf4
-
SHA1
083875c97333f278823d3c938d743347c2243357
-
SHA256
ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7
-
SHA512
2086e009666a0eac8392c5c5433e7ededb3193d42bb2fa70e50d7318e32db23966453deadca3bf29ef6afb02bfc94019d2576abba30c10647a90e3de0ae0b25c
-
SSDEEP
3072:v/niGY8XLzFt23TNvXTu56ytWbr1ipANfZQl0q9Uvzfb8eXUjL0B0TtNbVG5ZrkK:328XLptAR/TYmBiWJ3OUjuLbQZ4u6SP
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/4992-136-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-137-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-139-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-141-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-143-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-145-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-151-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-148-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-154-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-156-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-158-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-160-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-162-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-164-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-166-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-168-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-170-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-172-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-174-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-176-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-178-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-180-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-182-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-184-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-186-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-188-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-190-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-192-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-194-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-196-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-198-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-200-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-202-0x0000000004E90000-0x0000000004EE2000-memory.dmp family_redline behavioral1/memory/4992-941-0x0000000005070000-0x0000000005080000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2108 4992 WerFault.exe ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exepid process 4992 ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exe 4992 ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exedescription pid process Token: SeDebugPrivilege 4992 ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exe"C:\Users\Admin\AppData\Local\Temp\ad4227d7167e62d588b09e1f04043088d048c81364534491945fd54b0fb58ad7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 17362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4992 -ip 49921⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4992-134-0x0000000002440000-0x00000000024A2000-memory.dmpFilesize
392KB
-
memory/4992-135-0x0000000005080000-0x0000000005624000-memory.dmpFilesize
5.6MB
-
memory/4992-136-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-137-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-139-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-141-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-143-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-145-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-147-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/4992-149-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/4992-152-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/4992-151-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-148-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-154-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-156-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-158-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-160-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-162-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-164-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-166-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-168-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-170-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-172-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-174-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-176-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-178-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-180-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-182-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-184-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-186-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-188-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-190-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-192-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-194-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-196-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-198-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-200-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-202-0x0000000004E90000-0x0000000004EE2000-memory.dmpFilesize
328KB
-
memory/4992-929-0x0000000005630000-0x0000000005C48000-memory.dmpFilesize
6.1MB
-
memory/4992-930-0x0000000004F50000-0x0000000004F62000-memory.dmpFilesize
72KB
-
memory/4992-931-0x0000000005C50000-0x0000000005D5A000-memory.dmpFilesize
1.0MB
-
memory/4992-932-0x0000000004F70000-0x0000000004FAC000-memory.dmpFilesize
240KB
-
memory/4992-933-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/4992-934-0x0000000005F70000-0x0000000005FD6000-memory.dmpFilesize
408KB
-
memory/4992-935-0x0000000006640000-0x00000000066D2000-memory.dmpFilesize
584KB
-
memory/4992-936-0x0000000006950000-0x00000000069C6000-memory.dmpFilesize
472KB
-
memory/4992-937-0x0000000006A00000-0x0000000006A1E000-memory.dmpFilesize
120KB
-
memory/4992-938-0x0000000006B30000-0x0000000006CF2000-memory.dmpFilesize
1.8MB
-
memory/4992-939-0x0000000006D00000-0x000000000722C000-memory.dmpFilesize
5.2MB
-
memory/4992-941-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/4992-942-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB