Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 16:41

General

  • Target

    file.exe

  • Size

    426KB

  • MD5

    6a207ddb28bc8092e5ecd21a9230e480

  • SHA1

    82451f8cfed051d2c21a46c1dbb87345ad88177e

  • SHA256

    098634b0bcb1a6dcd49924a8ab3d8e06800f07990a9e7b686a74312191bb0e26

  • SHA512

    ae8d6c9c7437f6a6a37ae237863442fa57fe8760c8aa5c5b8fd429c41c020834fc8d52db23603918777b9f108fcc99fd629d7fe9fd66f17f6a536ecfd0551f7f

  • SSDEEP

    6144:Dxyc7IZQzmRYVINzmNEvqI5RcU7JqmFD/gx3sDzg9iR1h6+:DocMZN78E4U7kmFasMYR1h

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2736
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 2556
      2⤵
      • Program crash
      PID:3888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2736 -ip 2736
    1⤵
      PID:4532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2736-0-0x000000007447E000-0x000000007447F000-memory.dmp

      Filesize

      4KB

    • memory/2736-1-0x0000000000B70000-0x0000000000BE0000-memory.dmp

      Filesize

      448KB

    • memory/2736-2-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/2736-3-0x0000000005550000-0x000000000556E000-memory.dmp

      Filesize

      120KB

    • memory/2736-4-0x0000000005EB0000-0x0000000006454000-memory.dmp

      Filesize

      5.6MB

    • memory/2736-5-0x00000000059E0000-0x0000000005A72000-memory.dmp

      Filesize

      584KB

    • memory/2736-6-0x00000000059C0000-0x00000000059CA000-memory.dmp

      Filesize

      40KB

    • memory/2736-7-0x00000000090B0000-0x00000000096C8000-memory.dmp

      Filesize

      6.1MB

    • memory/2736-8-0x0000000008BF0000-0x0000000008CFA000-memory.dmp

      Filesize

      1.0MB

    • memory/2736-9-0x0000000008B30000-0x0000000008B42000-memory.dmp

      Filesize

      72KB

    • memory/2736-10-0x0000000008B90000-0x0000000008BCC000-memory.dmp

      Filesize

      240KB

    • memory/2736-11-0x0000000008D00000-0x0000000008D4C000-memory.dmp

      Filesize

      304KB

    • memory/2736-14-0x0000000009BD0000-0x0000000009C36000-memory.dmp

      Filesize

      408KB

    • memory/2736-15-0x0000000009ED0000-0x0000000009F46000-memory.dmp

      Filesize

      472KB

    • memory/2736-16-0x0000000009E90000-0x0000000009EAE000-memory.dmp

      Filesize

      120KB

    • memory/2736-17-0x000000000AB30000-0x000000000ACF2000-memory.dmp

      Filesize

      1.8MB

    • memory/2736-18-0x000000000B230000-0x000000000B75C000-memory.dmp

      Filesize

      5.2MB

    • memory/2736-19-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB