Analysis

  • max time kernel
    281s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/04/2024, 04:43

General

  • Target

    770d7762357d81bb193d2be8596f7a777c7e743f751dbecafc04400837ff65ed.exe

  • Size

    541KB

  • MD5

    6d8c71b3cda20b4e8f1980672de98ed1

  • SHA1

    e968d8914f7aa942b79b343fd6c6b666fa32121d

  • SHA256

    770d7762357d81bb193d2be8596f7a777c7e743f751dbecafc04400837ff65ed

  • SHA512

    62a7b89df62d49a8558436fb4a85ccff9b82f13d2098cdf58de855c9d7279e2c07be67a3c9a66bb375c0969bb1e3c0c04e2063359266759f0570b5000b9db964

  • SSDEEP

    6144:3a9dbaaHZG+ZQlQdtNpqF7DscN3p0NIb88WsNMPaKFP3b2V122J0sL:3SaaHZG4rEF7QcN3CNIb88WsNMP5F1k

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\770d7762357d81bb193d2be8596f7a777c7e743f751dbecafc04400837ff65ed.exe
    "C:\Users\Admin\AppData\Local\Temp\770d7762357d81bb193d2be8596f7a777c7e743f751dbecafc04400837ff65ed.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3900

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3900-0-0x0000000000910000-0x000000000099C000-memory.dmp

          Filesize

          560KB

        • memory/3900-1-0x00007FFC8AAB0000-0x00007FFC8B49C000-memory.dmp

          Filesize

          9.9MB

        • memory/3900-2-0x0000000002B60000-0x0000000002B70000-memory.dmp

          Filesize

          64KB

        • memory/3900-3-0x000000001E540000-0x000000001E64A000-memory.dmp

          Filesize

          1.0MB

        • memory/3900-4-0x000000001E450000-0x000000001E462000-memory.dmp

          Filesize

          72KB

        • memory/3900-5-0x000000001E4B0000-0x000000001E4EE000-memory.dmp

          Filesize

          248KB

        • memory/3900-6-0x00007FFC8AAB0000-0x00007FFC8B49C000-memory.dmp

          Filesize

          9.9MB

        • memory/3900-7-0x0000000002B60000-0x0000000002B70000-memory.dmp

          Filesize

          64KB