Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2023 16:04

General

  • Target

    507180e75c6daae7d802c4c4128d4c62ebf334a6c733db4d078fe53b81513f53.exe

  • Size

    497KB

  • MD5

    97b28e31c893f9b362f3c06debba492a

  • SHA1

    29b63e112ba4f18418248af5513a728262097487

  • SHA256

    507180e75c6daae7d802c4c4128d4c62ebf334a6c733db4d078fe53b81513f53

  • SHA512

    e4f8ead5badeb76a528b57f4cf30a1800f8a7c9b1ca6cbb6bd7a26f551749b087544b5c3c6049d5d952a1b1f85834293e49da309bd91e2e504aa8d148730d812

  • SSDEEP

    6144:JyIsQ6QfD2brEeyt8zpUOAia60W2CBFAR2S64AxQcXJ6b25yeQB8AC6ANh:fsQn2bzjzpUOAia60WJS2R+cx5mBEDL

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\507180e75c6daae7d802c4c4128d4c62ebf334a6c733db4d078fe53b81513f53.exe
    "C:\Users\Admin\AppData\Local\Temp\507180e75c6daae7d802c4c4128d4c62ebf334a6c733db4d078fe53b81513f53.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2364-0-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2364-1-0x0000000000520000-0x000000000057A000-memory.dmp

    Filesize

    360KB

  • memory/2364-5-0x00000000745F0000-0x0000000074DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2364-6-0x0000000006FF0000-0x0000000007594000-memory.dmp

    Filesize

    5.6MB

  • memory/2364-7-0x00000000075A0000-0x0000000007632000-memory.dmp

    Filesize

    584KB

  • memory/2364-8-0x00000000077C0000-0x00000000077D0000-memory.dmp

    Filesize

    64KB

  • memory/2364-9-0x0000000004B10000-0x0000000004B1A000-memory.dmp

    Filesize

    40KB

  • memory/2364-10-0x00000000078C0000-0x0000000007ED8000-memory.dmp

    Filesize

    6.1MB

  • memory/2364-11-0x00000000076B0000-0x00000000076C2000-memory.dmp

    Filesize

    72KB

  • memory/2364-12-0x0000000007FF0000-0x00000000080FA000-memory.dmp

    Filesize

    1.0MB

  • memory/2364-13-0x0000000007710000-0x000000000774C000-memory.dmp

    Filesize

    240KB

  • memory/2364-14-0x0000000007EE0000-0x0000000007F2C000-memory.dmp

    Filesize

    304KB

  • memory/2364-15-0x0000000008110000-0x0000000008176000-memory.dmp

    Filesize

    408KB

  • memory/2364-16-0x00000000088E0000-0x0000000008956000-memory.dmp

    Filesize

    472KB

  • memory/2364-17-0x00000000089C0000-0x0000000008B82000-memory.dmp

    Filesize

    1.8MB

  • memory/2364-18-0x0000000008BA0000-0x00000000090CC000-memory.dmp

    Filesize

    5.2MB

  • memory/2364-19-0x00000000091D0000-0x00000000091EE000-memory.dmp

    Filesize

    120KB

  • memory/2364-22-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2364-23-0x00000000745F0000-0x0000000074DA0000-memory.dmp

    Filesize

    7.7MB