Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 14:12

General

  • Target

    359bfa54c409c691a52553bad61144bc1fa065287aa7dbe59097d698e73e2ef8.exe

  • Size

    360KB

  • MD5

    dd4d397589a458b0e6af9ddfa6ab5970

  • SHA1

    59e2dec72b2686159bf3df7f7e272ed855563071

  • SHA256

    359bfa54c409c691a52553bad61144bc1fa065287aa7dbe59097d698e73e2ef8

  • SHA512

    d46ed5c2d5cf214b5e40b542b3e0a6b6174f18fb180d3dfc05ebb60cdf8e4fb02e5d5f1e27f80b21388bb1de15ba4444db0c5860b24c4f6a021d297a4027d3c3

  • SSDEEP

    6144:YjszWh028o0/7PLQuhUACybJfEpSsVtarYPDWJs:msC0eSzO/yJfCTZ

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\359bfa54c409c691a52553bad61144bc1fa065287aa7dbe59097d698e73e2ef8.exe
    "C:\Users\Admin\AppData\Local\Temp\359bfa54c409c691a52553bad61144bc1fa065287aa7dbe59097d698e73e2ef8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2536-1-0x0000000000270000-0x0000000000370000-memory.dmp

    Filesize

    1024KB

  • memory/2536-2-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2536-3-0x0000000006E60000-0x0000000006E9C000-memory.dmp

    Filesize

    240KB

  • memory/2536-4-0x0000000000400000-0x0000000002BB3000-memory.dmp

    Filesize

    39.7MB

  • memory/2536-5-0x0000000000400000-0x0000000002BB3000-memory.dmp

    Filesize

    39.7MB

  • memory/2536-6-0x0000000006EA0000-0x0000000006EDA000-memory.dmp

    Filesize

    232KB

  • memory/2536-7-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-8-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-10-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-12-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-14-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-16-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-18-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-20-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-22-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-34-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-36-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-42-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-50-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-60-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-58-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-56-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-54-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-52-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-48-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-46-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-44-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-40-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-38-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-32-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-30-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-29-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-26-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-24-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-70-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-68-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-66-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-64-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-62-0x0000000006EA0000-0x0000000006ED5000-memory.dmp

    Filesize

    212KB

  • memory/2536-799-0x0000000000270000-0x0000000000370000-memory.dmp

    Filesize

    1024KB

  • memory/2536-801-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB