Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2023 14:30

General

  • Target

    BestSoftware.exe

  • Size

    1.4MB

  • MD5

    1c9cb19f72b337353fab5826b145b2f3

  • SHA1

    2fe6ddb2fb7fc0082388904ffddb5902c520179b

  • SHA256

    f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a

  • SHA512

    90a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc

  • SSDEEP

    24576:Slu3eXnSurrbe0DUBB//rAMg2aUqC3qRo/H/:SqSSCXe4ULOcqRC/

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BestSoftware.exe
    "C:\Users\Admin\AppData\Local\Temp\BestSoftware.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:4956
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1288-28-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-14-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-2-0x0000000005700000-0x000000000579C000-memory.dmp

      Filesize

      624KB

    • memory/1288-3-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/1288-4-0x00000000030C0000-0x00000000030D0000-memory.dmp

      Filesize

      64KB

    • memory/1288-5-0x00000000057A0000-0x0000000005886000-memory.dmp

      Filesize

      920KB

    • memory/1288-6-0x0000000003090000-0x00000000030AC000-memory.dmp

      Filesize

      112KB

    • memory/1288-7-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-8-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-10-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-12-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-34-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/1288-16-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-31-0x00000000056C0000-0x00000000056C1000-memory.dmp

      Filesize

      4KB

    • memory/1288-20-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-22-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-24-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-26-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-0-0x0000000000BB0000-0x0000000000D0A000-memory.dmp

      Filesize

      1.4MB

    • memory/1288-1-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/1288-18-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/1288-30-0x0000000003090000-0x00000000030A5000-memory.dmp

      Filesize

      84KB

    • memory/3436-45-0x0000000008020000-0x0000000008086000-memory.dmp

      Filesize

      408KB

    • memory/3436-35-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/3436-36-0x0000000007A00000-0x0000000007FA4000-memory.dmp

      Filesize

      5.6MB

    • memory/3436-37-0x00000000074F0000-0x0000000007582000-memory.dmp

      Filesize

      584KB

    • memory/3436-38-0x0000000007660000-0x0000000007670000-memory.dmp

      Filesize

      64KB

    • memory/3436-39-0x0000000007480000-0x000000000748A000-memory.dmp

      Filesize

      40KB

    • memory/3436-40-0x00000000085D0000-0x0000000008BE8000-memory.dmp

      Filesize

      6.1MB

    • memory/3436-41-0x00000000075E0000-0x00000000075F2000-memory.dmp

      Filesize

      72KB

    • memory/3436-42-0x00000000078A0000-0x00000000079AA000-memory.dmp

      Filesize

      1.0MB

    • memory/3436-43-0x0000000007790000-0x00000000077CC000-memory.dmp

      Filesize

      240KB

    • memory/3436-44-0x00000000077D0000-0x000000000781C000-memory.dmp

      Filesize

      304KB

    • memory/3436-32-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3436-46-0x0000000008E70000-0x0000000008EE6000-memory.dmp

      Filesize

      472KB

    • memory/3436-47-0x00000000090C0000-0x0000000009282000-memory.dmp

      Filesize

      1.8MB

    • memory/3436-48-0x00000000097C0000-0x0000000009CEC000-memory.dmp

      Filesize

      5.2MB

    • memory/3436-49-0x0000000008F90000-0x0000000008FAE000-memory.dmp

      Filesize

      120KB

    • memory/3436-51-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB