Overview
overview
10Static
static
30fcedda988...81.exe
windows10-2004-x64
102432f37cfb...1d.exe
windows10-2004-x64
102b87c7a59a...5a.exe
windows10-2004-x64
102d0e9487b9...7c.exe
windows10-2004-x64
10305a49521a...a8.exe
windows10-2004-x64
1034eac23d05...83.exe
windows10-2004-x64
104288cf23e3...b7.exe
windows10-2004-x64
10566c1670c8...b3.exe
windows7-x64
3566c1670c8...b3.exe
windows10-2004-x64
105b49e20d68...4b.exe
windows10-2004-x64
106c3c673ed8...b1.exe
windows10-2004-x64
107ba1ecff94...00.exe
windows10-2004-x64
107fc78a2450...25.exe
windows10-2004-x64
1080c33721dd...df.exe
windows10-2004-x64
109c63b1ba60...a6.exe
windows10-2004-x64
10ad95249c96...29.exe
windows10-2004-x64
10b3b9cd87ed...59.exe
windows10-2004-x64
10c567fbb4ec...1d.exe
windows7-x64
3c567fbb4ec...1d.exe
windows10-2004-x64
10c69d581e2c...e2.exe
windows10-2004-x64
10e3c9a1721d...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 17:47
Static task
static1
Behavioral task
behavioral1
Sample
0fcedda9880a4fde053b44d2ef2a6b90a87db74ea8ef6e1605822364dcd8a881.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2432f37cfbe720ce2f627a725367676d71bb944d2306c1eab9bab6b0cab5e01d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2b87c7a59a469adca1693ceecd7fb1ea4eb1bb095a55e316a96eafda54e2285a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2d0e9487b9ef5db2eb0500ce9a5ed167ceb3c1f271e1a50f7283d3ed521cb67c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
305a49521aa7fa93bdb6f6a01420fcd3800a565c32194a366c1d6a22f8f00da8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
34eac23d05376694cf25e5de3b6455451ef743f0f766b72fa3e5b94726010c83.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
566c1670c8a5f43ec35b831518b15cf388fbddff2c3ba3ffc8167ac1bf0a1fb3.exe
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
566c1670c8a5f43ec35b831518b15cf388fbddff2c3ba3ffc8167ac1bf0a1fb3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
5b49e20d688471002a1cc866e323e32a0e0a2f1e92fd2f057979cd27a850f44b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6c3c673ed879b79fe56de07cf67f2547b37ddb371c94a074e9184833681145b1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7ba1ecff945330ba39b0d1bc0a81272da1abf8acbbe727db52a09c23c16c0c00.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7fc78a2450a642c8ab25d22c58c9792408d566a5b9043d95b64f6b407d9d8225.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
80c33721dd8916cf61ad4cfe3a1f57bd083b1adf9fdad50707739a67ee1c9bdf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
9c63b1ba6018935ad5e5fbb92f79d2bbd6eeb9ee0520ed5cbe7b9e1213eb33a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ad95249c96bb70f2fde592c74bf9bfaa2f25de9282a90943574ce4e547731029.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b3b9cd87ed117eff25ebae286512425b6d778c82802a6b097ac45b68e438e159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
c69d581e2c9751820b591c60023bbffd16aa66ad26d0c76b20574cdac2cc7be2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e3c9a1721d8f0eecf6a7e81b32b9823a4952d636d4930a9cdfae0876cf293d3b.exe
Resource
win10v2004-20240508-en
General
-
Target
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe
-
Size
306KB
-
MD5
5289c70cd98e713d4074b37ccdb48139
-
SHA1
6711a067f0228f67e0585df2ca478b361124244c
-
SHA256
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d
-
SHA512
4819dbc5b0fd6b56eaa5a45adb78db8a62982fd7bcf127decf0a41254ae5b9d572cfbfd1fd08038cf1083d0e788f53f476d583600169b8eb537811ab8ceb8b00
-
SSDEEP
6144:1oZd9vSWh60RVAtljy11wMChzxz2+aPie45e8q/4I1mupJyL985:CZiWhHWVbFaKeb8q/4uf7yL985
Malware Config
Extracted
redline
5195552529
https://pastebin.com/raw/NgsUAPya
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral19/memory/4532-1-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exedescription pid process target process PID 1612 set thread context of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3668 1612 WerFault.exe c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
RegAsm.exepid process 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe 4532 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 4532 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exedescription pid process target process PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe PID 1612 wrote to memory of 4532 1612 c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe"C:\Users\Admin\AppData\Local\Temp\c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 2522⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1612 -ip 16121⤵PID:4684