Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 01:31

General

  • Target

    9adbdf6077ac14b7dd2a4e37f15881bbf2fa25b56690bc5000fcfb93ed3cfbe2.exe

  • Size

    141KB

  • MD5

    4793635d89c00e6f9fc0b6953530a4c0

  • SHA1

    dc168256f1b27093c7b6699fcf8ac9d4393adbe2

  • SHA256

    9adbdf6077ac14b7dd2a4e37f15881bbf2fa25b56690bc5000fcfb93ed3cfbe2

  • SHA512

    14aa1035d4343e898b42c70e075df65bdaa3265149806becf3e88b056f64486ac9219d137ed51af74edb0398cdab445741aa9b1a19c3e6db3e4ee260a2b04427

  • SSDEEP

    3072:BK1JZOpTvVQZ+rcIeRYs6YmszJqoD277BpGGoMTb3R35dINX9r5Pxk:QOpu0rjeRbVJqoDm1pGGoMTb3RDINN

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9adbdf6077ac14b7dd2a4e37f15881bbf2fa25b56690bc5000fcfb93ed3cfbe2.exe
    "C:\Users\Admin\AppData\Local\Temp\9adbdf6077ac14b7dd2a4e37f15881bbf2fa25b56690bc5000fcfb93ed3cfbe2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:13169/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3716
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb5b646f8,0x7ffcb5b64708,0x7ffcb5b64718
        3⤵
          PID:4816
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2
          3⤵
            PID:1940
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4516
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
            3⤵
              PID:3564
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              3⤵
                PID:3444
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
                3⤵
                  PID:4748
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                  3⤵
                    PID:468
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:1
                    3⤵
                      PID:3404
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:8
                      3⤵
                        PID:3736
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:640
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                        3⤵
                          PID:4120
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                          3⤵
                            PID:1160
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:1
                            3⤵
                              PID:3360
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:1
                              3⤵
                                PID:1896
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:1
                                3⤵
                                  PID:2836
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:1
                                  3⤵
                                    PID:4216
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,9018320193713126494,12482382232303960366,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5616 /prefetch:2
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4880
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /C taskkill /F /PID 4812 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\9adbdf6077ac14b7dd2a4e37f15881bbf2fa25b56690bc5000fcfb93ed3cfbe2.exe"
                                  2⤵
                                    PID:376
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /PID 4812
                                      3⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:404
                                    • C:\Windows\SysWOW64\choice.exe
                                      choice /C Y /N /D Y /T 3
                                      3⤵
                                        PID:4368
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3624
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4044

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        f53207a5ca2ef5c7e976cbb3cb26d870

                                        SHA1

                                        49a8cc44f53da77bb3dfb36fc7676ed54675db43

                                        SHA256

                                        19ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23

                                        SHA512

                                        be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        ae54e9db2e89f2c54da8cc0bfcbd26bd

                                        SHA1

                                        a88af6c673609ecbc51a1a60dfbc8577830d2b5d

                                        SHA256

                                        5009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af

                                        SHA512

                                        e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        d87df197fe18c5eb1ceb5d9b125e6ef9

                                        SHA1

                                        c8a6509c47f59d2c70a3e9edb8f24c90f02866d0

                                        SHA256

                                        32bc2f14a290dc66c8632bc3ef916dea0facf4e0f92684dd0ad2ff53826a6bad

                                        SHA512

                                        0cdc4e409345d4b05c588ccba9259735b54c2a6c5642fed194fcb729dae43c27070390ba03aafb0bcc14df2efa3cfd2bf46a90b7a65d52558e977138dacf51da

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        5601e8bb2754122363b6df040209b4de

                                        SHA1

                                        8cdeede22eb78df623d35d6d0906feb2d89213e7

                                        SHA256

                                        f3e1658c82afcf5adaa74214b3efbb174382fd9b02805a79d2df526c8ceff62b

                                        SHA512

                                        ec8f8eb8e73ea5575baef190b437e599e2f04f021897071e421e2794596168e812930aeb068b1b225f7b7145680dff3f1b54c272d978d1a7b36b5c0c0ffd8bab

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        8062dbbe434f3c04176e16693dc2e04d

                                        SHA1

                                        4fdbb9edd4a1dce97f3c9402cd2e0ab7d52c3bd1

                                        SHA256

                                        19200b1dc8374e0bf98e79301260f98d230aa71add276b617e76971b4836b5a6

                                        SHA512

                                        14378b929dd93322dcb59f402afc3429cc39625a57bd95b1fe66962638cb112a3d66de4a8355775fb1aa2ee7de9fa316c0fd63afbf40bde06cd5636f59bc8760

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        bee908252e7d1d9f61f2885280741c69

                                        SHA1

                                        ff6bcc0fb9a49d159c50a0ae6fdc7f9a4e777e7b

                                        SHA256

                                        e4bda231321d631062f914dd6e197a7dfc0e149ebfcf65e7901c5415fee0fe9e

                                        SHA512

                                        f5f5eeb765309505ce9ec3eb6d442ecd9cd67e0cf03ac4bafd2d296b6a7466a87142feddf5497e7ae47f1e8e93a03a820fb31f050ce3224846300d34ad009b7c

                                      • memory/4812-10-0x00000000069D0000-0x0000000006A36000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/4812-37-0x0000000007860000-0x00000000078FC000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/4812-0-0x00000000004E0000-0x000000000050A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/4812-8-0x00000000068C0000-0x0000000006952000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/4812-7-0x00000000051E0000-0x00000000052EA000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/4812-6-0x0000000004F80000-0x0000000004FCC000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/4812-5-0x0000000004F20000-0x0000000004F5C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/4812-9-0x0000000006F10000-0x00000000074B4000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/4812-54-0x0000000004F70000-0x0000000004F80000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4812-57-0x0000000074B10000-0x00000000752C0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/4812-4-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/4812-3-0x00000000055A0000-0x0000000005BB8000-memory.dmp

                                        Filesize

                                        6.1MB

                                      • memory/4812-2-0x0000000004F70000-0x0000000004F80000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4812-1-0x0000000074B10000-0x00000000752C0000-memory.dmp

                                        Filesize

                                        7.7MB