Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 16:41
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240508-en
General
-
Target
file.exe
-
Size
426KB
-
MD5
6a207ddb28bc8092e5ecd21a9230e480
-
SHA1
82451f8cfed051d2c21a46c1dbb87345ad88177e
-
SHA256
098634b0bcb1a6dcd49924a8ab3d8e06800f07990a9e7b686a74312191bb0e26
-
SHA512
ae8d6c9c7437f6a6a37ae237863442fa57fe8760c8aa5c5b8fd429c41c020834fc8d52db23603918777b9f108fcc99fd629d7fe9fd66f17f6a536ecfd0551f7f
-
SSDEEP
6144:Dxyc7IZQzmRYVINzmNEvqI5RcU7JqmFD/gx3sDzg9iR1h6+:DocMZN78E4U7kmFasMYR1h
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2736-1-0x0000000000B70000-0x0000000000BE0000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3888 2736 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe 2736 file.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2736 file.exe Token: SeBackupPrivilege 2736 file.exe Token: SeSecurityPrivilege 2736 file.exe Token: SeSecurityPrivilege 2736 file.exe Token: SeSecurityPrivilege 2736 file.exe Token: SeSecurityPrivilege 2736 file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 25562⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2736 -ip 27361⤵PID:4532