Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 18:41

General

  • Target

    123.exe

  • Size

    667KB

  • MD5

    343d4defc4481746b24e7c2921c4f548

  • SHA1

    47616a15b6fecfdb7ba8a5a3d01277c1b148d530

  • SHA256

    e07aa8e347888a9fa3c9a21614e799a72c12f84507a1f567331edfed03e79d23

  • SHA512

    72aa1600efe604f85072b467acbb0cb7684874d3c7483147a72eb01968ef044030c7033d3fcc522c36bab4f7994703c57e0bb1811526c60a18c24a0d8012754b

  • SSDEEP

    6144:IHejFCzqQIfr3Q8kM30Wl2sFqtcwD0NRhf7i8jFfcasWh:IHejFIqQ6D6M30WllotcwSf7i8j5c7W

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123.exe
    "C:\Users\Admin\AppData\Local\Temp\123.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 2776
      2⤵
      • Program crash
      PID:4844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4660 -ip 4660
    1⤵
      PID:4184

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4660-0-0x0000000074B5E000-0x0000000074B5F000-memory.dmp

            Filesize

            4KB

          • memory/4660-1-0x0000000000A70000-0x0000000000B1C000-memory.dmp

            Filesize

            688KB

          • memory/4660-2-0x0000000074B50000-0x0000000075300000-memory.dmp

            Filesize

            7.7MB

          • memory/4660-3-0x00000000054A0000-0x00000000054BE000-memory.dmp

            Filesize

            120KB

          • memory/4660-4-0x0000000005DC0000-0x0000000006364000-memory.dmp

            Filesize

            5.6MB

          • memory/4660-5-0x0000000005910000-0x00000000059A2000-memory.dmp

            Filesize

            584KB

          • memory/4660-6-0x0000000005AB0000-0x0000000005ABA000-memory.dmp

            Filesize

            40KB

          • memory/4660-7-0x0000000008C70000-0x0000000009288000-memory.dmp

            Filesize

            6.1MB

          • memory/4660-8-0x00000000087A0000-0x00000000088AA000-memory.dmp

            Filesize

            1.0MB

          • memory/4660-9-0x00000000086E0000-0x00000000086F2000-memory.dmp

            Filesize

            72KB

          • memory/4660-10-0x0000000008740000-0x000000000877C000-memory.dmp

            Filesize

            240KB

          • memory/4660-11-0x00000000088B0000-0x00000000088FC000-memory.dmp

            Filesize

            304KB

          • memory/4660-14-0x00000000098B0000-0x0000000009916000-memory.dmp

            Filesize

            408KB

          • memory/4660-15-0x0000000009BE0000-0x0000000009C56000-memory.dmp

            Filesize

            472KB

          • memory/4660-16-0x0000000009B90000-0x0000000009BAE000-memory.dmp

            Filesize

            120KB

          • memory/4660-17-0x0000000009F80000-0x000000000A142000-memory.dmp

            Filesize

            1.8MB

          • memory/4660-18-0x000000000ACB0000-0x000000000B1DC000-memory.dmp

            Filesize

            5.2MB

          • memory/4660-19-0x0000000074B50000-0x0000000075300000-memory.dmp

            Filesize

            7.7MB