Analysis

  • max time kernel
    101s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 23:20

General

  • Target

    624694f3981ee201a9b9c352a4d97f679e01ce71f5ab0bce3765db47a644c48d.exe

  • Size

    383KB

  • MD5

    24e885c23db36ca7965733febe200755

  • SHA1

    878d50cd7ae3400aefbba0ed4a4ed7440d1b16e6

  • SHA256

    624694f3981ee201a9b9c352a4d97f679e01ce71f5ab0bce3765db47a644c48d

  • SHA512

    ef2268b461dd5075589a2f1967d2b723f8a7324f964ae39feb504705adcb6eeb42146ae764c505c6fda494a1ec70be31a232cf5259205d59035bc14570955dc2

  • SSDEEP

    6144:vO0IrLPoaQNDZ0SVx17aXpPnQpTtgdXNmDTCLMgI0p8va:m0IrLAacXx58pPnQ1ilYDeLMg13

Malware Config

Extracted

Family

redline

Botnet

@Germany

C2

185.11.61.125:22344

Attributes
  • auth_value

    9d15d78194367a949e54a07d6ce02c62

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\624694f3981ee201a9b9c352a4d97f679e01ce71f5ab0bce3765db47a644c48d.exe
    "C:\Users\Admin\AppData\Local\Temp\624694f3981ee201a9b9c352a4d97f679e01ce71f5ab0bce3765db47a644c48d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4272
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 1220
      2⤵
      • Program crash
      PID:2928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4272 -ip 4272
    1⤵
      PID:2160

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4272-134-0x00000000074D0000-0x0000000007A74000-memory.dmp

      Filesize

      5.6MB

    • memory/4272-135-0x0000000002D20000-0x0000000002D82000-memory.dmp

      Filesize

      392KB

    • memory/4272-136-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-138-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-139-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/4272-141-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/4272-137-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/4272-142-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-144-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-146-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-148-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-150-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-152-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-154-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-156-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-158-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-160-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-162-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-164-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-166-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-168-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-170-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-172-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-174-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-176-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-178-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-180-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-182-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-184-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-186-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-188-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-190-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-192-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-194-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-196-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-198-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-200-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-202-0x0000000004E90000-0x0000000004EE2000-memory.dmp

      Filesize

      328KB

    • memory/4272-929-0x0000000007A80000-0x0000000008098000-memory.dmp

      Filesize

      6.1MB

    • memory/4272-930-0x0000000005090000-0x00000000050A2000-memory.dmp

      Filesize

      72KB

    • memory/4272-931-0x00000000080A0000-0x00000000081AA000-memory.dmp

      Filesize

      1.0MB

    • memory/4272-932-0x00000000050B0000-0x00000000050EC000-memory.dmp

      Filesize

      240KB

    • memory/4272-933-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/4272-934-0x00000000083F0000-0x0000000008456000-memory.dmp

      Filesize

      408KB

    • memory/4272-935-0x0000000008AC0000-0x0000000008B52000-memory.dmp

      Filesize

      584KB

    • memory/4272-936-0x0000000008B70000-0x0000000008BE6000-memory.dmp

      Filesize

      472KB

    • memory/4272-937-0x0000000008C30000-0x0000000008C4E000-memory.dmp

      Filesize

      120KB

    • memory/4272-939-0x0000000008DE0000-0x0000000008FA2000-memory.dmp

      Filesize

      1.8MB

    • memory/4272-940-0x0000000008FB0000-0x00000000094DC000-memory.dmp

      Filesize

      5.2MB

    • memory/4272-941-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/4272-942-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/4272-943-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB