Analysis
-
max time kernel
99s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 04:01
Static task
static1
General
-
Target
01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exe
-
Size
348KB
-
MD5
d02f42679b4bb7ad604168e5477f30d2
-
SHA1
10c25adc83b22124489d59bfce063d4310cc229b
-
SHA256
01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395
-
SHA512
5a94e252ec7931ae9d6526515a8e2ba3a6c9ce78873115c6f191bf0b79b6c8a6a63a4822cca9462a41070d0127d14cddba3be25b87ea2bbed6980d2342916c6a
-
SSDEEP
6144:BVuxhw6zy2yhA5RWWsOFNeazu3+KdKmR/TZtkjt:B0xS6cW5IWsUaO4tGt
Malware Config
Extracted
redline
@chicago
185.11.61.125:22344
-
auth_value
21f863e0cbd09d0681058e068d0d1d7f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/5072-139-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-140-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-142-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-144-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-146-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-148-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-150-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-152-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-154-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-156-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-158-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-160-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-162-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-164-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-166-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-168-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-170-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-172-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-174-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-178-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-176-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-180-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-182-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-184-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-186-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-188-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-190-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-192-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-194-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-196-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-198-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-200-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline behavioral1/memory/5072-202-0x0000000002C20000-0x0000000002C72000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4348 5072 WerFault.exe 01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exepid process 5072 01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exedescription pid process Token: SeDebugPrivilege 5072 01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exe"C:\Users\Admin\AppData\Local\Temp\01e5f4f24fd809ad587a3f2104d033239d9ba25caac8c161161b2586109ed395.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 18162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5072 -ip 50721⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5072-134-0x0000000002410000-0x0000000002472000-memory.dmpFilesize
392KB
-
memory/5072-135-0x0000000005050000-0x00000000055F4000-memory.dmpFilesize
5.6MB
-
memory/5072-136-0x0000000002CE0000-0x0000000002CF0000-memory.dmpFilesize
64KB
-
memory/5072-137-0x0000000002CE0000-0x0000000002CF0000-memory.dmpFilesize
64KB
-
memory/5072-138-0x0000000002CE0000-0x0000000002CF0000-memory.dmpFilesize
64KB
-
memory/5072-139-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-140-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-142-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-144-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-146-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-148-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-150-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-152-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-154-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-156-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-158-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-160-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-162-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-164-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-166-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-168-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-170-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-172-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-174-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-178-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-176-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-180-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-182-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-184-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-186-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-188-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-190-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-192-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-194-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-196-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-198-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-200-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-202-0x0000000002C20000-0x0000000002C72000-memory.dmpFilesize
328KB
-
memory/5072-929-0x0000000005600000-0x0000000005C18000-memory.dmpFilesize
6.1MB
-
memory/5072-930-0x0000000005C30000-0x0000000005C42000-memory.dmpFilesize
72KB
-
memory/5072-931-0x0000000005C50000-0x0000000005D5A000-memory.dmpFilesize
1.0MB
-
memory/5072-932-0x0000000002CE0000-0x0000000002CF0000-memory.dmpFilesize
64KB
-
memory/5072-933-0x0000000005D60000-0x0000000005D9C000-memory.dmpFilesize
240KB
-
memory/5072-934-0x0000000006070000-0x00000000060D6000-memory.dmpFilesize
408KB
-
memory/5072-935-0x0000000006740000-0x00000000067D2000-memory.dmpFilesize
584KB
-
memory/5072-936-0x0000000006930000-0x00000000069A6000-memory.dmpFilesize
472KB
-
memory/5072-937-0x0000000006A10000-0x0000000006BD2000-memory.dmpFilesize
1.8MB
-
memory/5072-938-0x0000000006BF0000-0x000000000711C000-memory.dmpFilesize
5.2MB
-
memory/5072-939-0x0000000007230000-0x000000000724E000-memory.dmpFilesize
120KB