Analysis

  • max time kernel
    143s
  • max time network
    161s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-03-2024 18:47

General

  • Target

    f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e.exe

  • Size

    541KB

  • MD5

    3b069f3dd741e4360f26cb27cb10320a

  • SHA1

    6a9503aaf1e297f2696482ddf1bd4605a8710101

  • SHA256

    f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

  • SHA512

    bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

  • SSDEEP

    12288:q5aw1dGYJeEVZjYGcN3CNIb88WsNMP5F1k:qLVRYGW3CNIb88WsNMhF

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e.exe
    "C:\Users\Admin\AppData\Local\Temp\f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1788-0-0x00000000006A0000-0x000000000072C000-memory.dmp

    Filesize

    560KB

  • memory/1788-1-0x00007FFEE05E0000-0x00007FFEE10A2000-memory.dmp

    Filesize

    10.8MB

  • memory/1788-2-0x00000000010F0000-0x0000000001100000-memory.dmp

    Filesize

    64KB

  • memory/1788-4-0x000000001B700000-0x000000001B712000-memory.dmp

    Filesize

    72KB

  • memory/1788-5-0x000000001C280000-0x000000001C2BC000-memory.dmp

    Filesize

    240KB

  • memory/1788-3-0x000000001D960000-0x000000001DA6A000-memory.dmp

    Filesize

    1.0MB

  • memory/1788-6-0x00000000010F0000-0x0000000001100000-memory.dmp

    Filesize

    64KB

  • memory/1788-7-0x000000001DDF0000-0x000000001DE66000-memory.dmp

    Filesize

    472KB

  • memory/1788-8-0x000000001DD90000-0x000000001DDAE000-memory.dmp

    Filesize

    120KB

  • memory/1788-9-0x00000000010F0000-0x0000000001100000-memory.dmp

    Filesize

    64KB

  • memory/1788-10-0x000000001E740000-0x000000001E902000-memory.dmp

    Filesize

    1.8MB

  • memory/1788-11-0x000000001EE40000-0x000000001F368000-memory.dmp

    Filesize

    5.2MB

  • memory/1788-12-0x00007FFEE05E0000-0x00007FFEE10A2000-memory.dmp

    Filesize

    10.8MB

  • memory/1788-13-0x00000000010F0000-0x0000000001100000-memory.dmp

    Filesize

    64KB

  • memory/1788-14-0x00000000010F0000-0x0000000001100000-memory.dmp

    Filesize

    64KB

  • memory/1788-15-0x00000000010F0000-0x0000000001100000-memory.dmp

    Filesize

    64KB