Analysis

  • max time kernel
    134s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 04:11

General

  • Target

    514062dcadc2d0d6390597d4d78b950903dbfcd050756bf9af9867e48b092b8d.exe

  • Size

    684KB

  • MD5

    288ae7cad20c457d202aae6fc225140e

  • SHA1

    b7a3cbc2d54206a045666d52cde0e18e73bde4e6

  • SHA256

    514062dcadc2d0d6390597d4d78b950903dbfcd050756bf9af9867e48b092b8d

  • SHA512

    5d0a04ceec67cd5ec9082687268ee749d4d0e631969615fa38fc58eef05ea698a61bd5cf87d912ad30da63bc8d6eccc1ae3432c5a7721172dfb4e8c6051b3ff4

  • SSDEEP

    12288:iRIDcvRLbpTJ7IaXCc18SLJrCRomEKNvhnUutHPbFT1/PLrr9:fgZ3pRXh1JmE2PbnPH

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\514062dcadc2d0d6390597d4d78b950903dbfcd050756bf9af9867e48b092b8d.exe
    "C:\Users\Admin\AppData\Local\Temp\514062dcadc2d0d6390597d4d78b950903dbfcd050756bf9af9867e48b092b8d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5024

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1712-1-0x0000000001300000-0x0000000001301000-memory.dmp

          Filesize

          4KB

        • memory/5024-0-0x0000000000400000-0x0000000000484000-memory.dmp

          Filesize

          528KB

        • memory/5024-2-0x000000007422E000-0x000000007422F000-memory.dmp

          Filesize

          4KB

        • memory/5024-3-0x0000000074220000-0x00000000749D0000-memory.dmp

          Filesize

          7.7MB

        • memory/5024-4-0x00000000056E0000-0x0000000005700000-memory.dmp

          Filesize

          128KB

        • memory/5024-5-0x0000000006060000-0x0000000006604000-memory.dmp

          Filesize

          5.6MB

        • memory/5024-6-0x0000000005B90000-0x0000000005C22000-memory.dmp

          Filesize

          584KB

        • memory/5024-7-0x0000000005B80000-0x0000000005B8A000-memory.dmp

          Filesize

          40KB

        • memory/5024-8-0x0000000008ED0000-0x00000000094E8000-memory.dmp

          Filesize

          6.1MB

        • memory/5024-9-0x0000000008A10000-0x0000000008B1A000-memory.dmp

          Filesize

          1.0MB

        • memory/5024-10-0x0000000008950000-0x0000000008962000-memory.dmp

          Filesize

          72KB

        • memory/5024-11-0x00000000089B0000-0x00000000089EC000-memory.dmp

          Filesize

          240KB

        • memory/5024-12-0x0000000008B20000-0x0000000008B6C000-memory.dmp

          Filesize

          304KB

        • memory/5024-15-0x0000000009830000-0x0000000009896000-memory.dmp

          Filesize

          408KB

        • memory/5024-16-0x0000000009B20000-0x0000000009B96000-memory.dmp

          Filesize

          472KB

        • memory/5024-17-0x0000000008E20000-0x0000000008E3E000-memory.dmp

          Filesize

          120KB

        • memory/5024-18-0x000000000A1C0000-0x000000000A382000-memory.dmp

          Filesize

          1.8MB

        • memory/5024-19-0x000000000B480000-0x000000000B9AC000-memory.dmp

          Filesize

          5.2MB

        • memory/5024-21-0x0000000074220000-0x00000000749D0000-memory.dmp

          Filesize

          7.7MB