Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2023 12:19

General

  • Target

    Palmation.exe

  • Size

    774KB

  • MD5

    222dc22a19f7b727765a88993a083298

  • SHA1

    6b4ef2636ec2f909ef9956bcbc2b6a21c17ac381

  • SHA256

    d7cdca1d97dcd36ec44cdfa57cf055a89cbc65434fb5256720e121ffe6e186ea

  • SHA512

    8e0a919d28bd0433176eb3e87832bf9c0d674d95a457baacab46a4c0ec3c9264f4e96c3899c5233c5fa5c7070240b486bb03170601dabd1a6e299cb54d8901f0

  • SSDEEP

    24576:wIXq+/cLIcgjkTVPwPSqqbH/j0KT6k99Sxn86LjLNVD+aFFNYfm16bx3UU8TX2x9:w9l8FivQNw

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Palmation.exe
    "C:\Users\Admin\AppData\Local\Temp\Palmation.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1696-133-0x0000000000EF0000-0x0000000000FB6000-memory.dmp

    Filesize

    792KB

  • memory/1696-134-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-135-0x0000000005BD0000-0x0000000005BE0000-memory.dmp

    Filesize

    64KB

  • memory/1696-136-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/1696-137-0x000000000B6A0000-0x000000000BCB8000-memory.dmp

    Filesize

    6.1MB

  • memory/1696-138-0x000000000B190000-0x000000000B29A000-memory.dmp

    Filesize

    1.0MB

  • memory/1696-139-0x0000000005BB0000-0x0000000005BC2000-memory.dmp

    Filesize

    72KB

  • memory/1696-140-0x0000000005D50000-0x0000000005D8C000-memory.dmp

    Filesize

    240KB

  • memory/1696-141-0x000000000B3E0000-0x000000000B472000-memory.dmp

    Filesize

    584KB

  • memory/1696-142-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-143-0x000000000B480000-0x000000000B4F6000-memory.dmp

    Filesize

    472KB

  • memory/1696-144-0x0000000005BD0000-0x0000000005BE0000-memory.dmp

    Filesize

    64KB

  • memory/1696-145-0x000000000C540000-0x000000000C5A6000-memory.dmp

    Filesize

    408KB

  • memory/1696-146-0x000000000CC90000-0x000000000D234000-memory.dmp

    Filesize

    5.6MB

  • memory/1696-147-0x000000000DEC0000-0x000000000E082000-memory.dmp

    Filesize

    1.8MB

  • memory/1696-148-0x000000000E5C0000-0x000000000EAEC000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-149-0x000000000D290000-0x000000000D2E0000-memory.dmp

    Filesize

    320KB

  • memory/1696-151-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB