Analysis

  • max time kernel
    94s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:07

General

  • Target

    d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb.exe

  • Size

    313KB

  • MD5

    3faf2c23c82e2855758895ba3587a53a

  • SHA1

    27fd7616044af939a58c5175126bf544d4ed487b

  • SHA256

    d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb

  • SHA512

    e9a969462ed2a91f26bf1b2abf27a5fa8c116754224e5209032190bb44e4726e37083dc6bff20467f016998f8e4b7a1722ed0ac56790427d5f7adfb44aec8fd8

  • SSDEEP

    6144:UjVHgrVLPNg+K8inLgkFxXtON88eIE2EfW1sd:cRgrVLFgN8EvIVzE+K

Malware Config

Extracted

Family

redline

Botnet

frtrack

C2

francestracking.com:80

Attributes
  • auth_value

    f2f94b780071d26409283a3478312faf

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb.exe
    "C:\Users\Admin\AppData\Local\Temp\d8f93ba40d8706020e7ffe2884cce017735af3c9749a004acccbca967bd362cb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 1284
      2⤵
      • Program crash
      PID:3940
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2076 -ip 2076
    1⤵
      PID:2376

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2076-134-0x0000000004E30000-0x00000000053D4000-memory.dmp
      Filesize

      5.6MB

    • memory/2076-135-0x0000000002290000-0x00000000022F2000-memory.dmp
      Filesize

      392KB

    • memory/2076-136-0x0000000004E20000-0x0000000004E30000-memory.dmp
      Filesize

      64KB

    • memory/2076-138-0x0000000004E20000-0x0000000004E30000-memory.dmp
      Filesize

      64KB

    • memory/2076-137-0x0000000004E20000-0x0000000004E30000-memory.dmp
      Filesize

      64KB

    • memory/2076-139-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-140-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-142-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-144-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-146-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-148-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-150-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-152-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-154-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-156-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-158-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-160-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-162-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-164-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-166-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-168-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-170-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-172-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-174-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-176-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-178-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-180-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-182-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-184-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-186-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-188-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-190-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-192-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-194-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-196-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-198-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-200-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-202-0x00000000027B0000-0x0000000002802000-memory.dmp
      Filesize

      328KB

    • memory/2076-929-0x00000000053E0000-0x00000000059F8000-memory.dmp
      Filesize

      6.1MB

    • memory/2076-930-0x0000000004D00000-0x0000000004D12000-memory.dmp
      Filesize

      72KB

    • memory/2076-931-0x0000000005A00000-0x0000000005B0A000-memory.dmp
      Filesize

      1.0MB

    • memory/2076-932-0x0000000004D20000-0x0000000004D5C000-memory.dmp
      Filesize

      240KB

    • memory/2076-933-0x0000000004E20000-0x0000000004E30000-memory.dmp
      Filesize

      64KB

    • memory/2076-934-0x0000000005D30000-0x0000000005D96000-memory.dmp
      Filesize

      408KB

    • memory/2076-935-0x0000000006E20000-0x0000000006EB2000-memory.dmp
      Filesize

      584KB

    • memory/2076-936-0x0000000006ED0000-0x0000000006F46000-memory.dmp
      Filesize

      472KB

    • memory/2076-937-0x0000000006F90000-0x0000000006FAE000-memory.dmp
      Filesize

      120KB

    • memory/2076-938-0x0000000007040000-0x0000000007202000-memory.dmp
      Filesize

      1.8MB

    • memory/2076-939-0x0000000007220000-0x000000000774C000-memory.dmp
      Filesize

      5.2MB

    • memory/2076-941-0x0000000007BD0000-0x0000000007C20000-memory.dmp
      Filesize

      320KB

    • memory/2076-943-0x0000000004E20000-0x0000000004E30000-memory.dmp
      Filesize

      64KB