Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2025 01:10

General

  • Target

    73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9.exe

  • Size

    141KB

  • MD5

    cfd49ff803bee148321ed6d276e15546

  • SHA1

    ba070a939674ddb00af3b0a0287103be44da6574

  • SHA256

    73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9

  • SHA512

    79bb968818525153b1361071988f2f21d7198e1ae477f05d496c6035796797b9d482361d820129c0ac924e7701ff374ea52787787733250b47e7d83cfebb8ea2

  • SSDEEP

    3072:BK1JZOpTvVQZ+rcIeRYs6YmszJqoD277BpGGoMTb3R35dINX9r5pxk:QOpu0rjeRbVJqoDm1pGGoMTb3RDINN

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9.exe
    "C:\Users\Admin\AppData\Local\Temp\73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:13441/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa36646f8,0x7fffa3664708,0x7fffa3664718
        3⤵
          PID:4924
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
          3⤵
            PID:4184
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4656
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:8
            3⤵
              PID:4972
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
              3⤵
                PID:2088
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                3⤵
                  PID:1376
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:1
                  3⤵
                    PID:712
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:8
                    3⤵
                      PID:2220
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4840
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                      3⤵
                        PID:4752
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                        3⤵
                          PID:5052
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:1
                          3⤵
                            PID:4312
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:1
                            3⤵
                              PID:1192
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7292083371979143168,1783208945237021352,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4068 /prefetch:2
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4320
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /C taskkill /F /PID 432 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3796
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /PID 432
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3184
                            • C:\Windows\SysWOW64\choice.exe
                              choice /C Y /N /D Y /T 3
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2488
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1824
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2432

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              7de1bbdc1f9cf1a58ae1de4951ce8cb9

                              SHA1

                              010da169e15457c25bd80ef02d76a940c1210301

                              SHA256

                              6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                              SHA512

                              e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              85ba073d7015b6ce7da19235a275f6da

                              SHA1

                              a23c8c2125e45a0788bac14423ae1f3eab92cf00

                              SHA256

                              5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                              SHA512

                              eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                              Filesize

                              214KB

                              MD5

                              ba958dfa97ba4abe328dce19c50cd19c

                              SHA1

                              122405a9536dd824adcc446c3f0f3a971c94f1b1

                              SHA256

                              3124365e9e20791892ee21f47763d3df116763da0270796ca42fd63ecc23c607

                              SHA512

                              aad22e93babe3255a7e78d9a9e24c1cda167d449e5383bb740125445e7c7ddd8df53a0e53705f4262a49a307dc54ceb40c66bab61bec206fbe59918110af70bf

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              96B

                              MD5

                              da98fe47c8a1a9133882d81f44d1bff7

                              SHA1

                              36dfc844673d6ca550d2cb824be30688d1a0ef0a

                              SHA256

                              d3d9de7575e2ca578fd1e2ee0937752cdbcffe7ad2c247bfac14864fafaef151

                              SHA512

                              4037db826c4945cdd2a2de0986a42e203978c3af491f40bf2863eb96d2bc93feb5990f4678890141c29519affd5190ea30d082f6ec0f2f6c8bf3aa6df3c7ef40

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              1004B

                              MD5

                              4b33d752657c9841186cda96c7c5485d

                              SHA1

                              18971565f7d47f063e0a63223e89f9e03a056b92

                              SHA256

                              e738dcca37632b4b1fad13cb64263eb2cfce4e7469d2727b0483bc995a4d3999

                              SHA512

                              d42726441137d3bdfdcbc386f110ec5e7295c2e33db473a5083d4d021987cd7311b25fe15f13178e34e6a8e76ebd45ff19a5b048419eddf4aa77959d394495b0

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              a1c6cac253ec0ffa5b204103b87181e9

                              SHA1

                              9427e9bb3d061aef4614e6b6650afe95dd8b845a

                              SHA256

                              e5652bda287373bea591cf238ee64d30569801050d0fcffa1b1d80f139b038d9

                              SHA512

                              40a1296af326574dd415a2989c443ab99f399af024a336a19aac0aac94fbbc7be6934ad7b95e29987954db09fcb5999dd5dd7de32e742a262fc896212ad12863

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              c397ede54f8a944afae34c545aad68da

                              SHA1

                              24e4dcb074c149e916f444c4e4b487c7179707b4

                              SHA256

                              38442e2076e20f18f07c5835acf3fa62f2d0ac2bb615131899afee8f43792fe5

                              SHA512

                              43d2ff2083c9cb8129ef23235dc0df505073331bb0d06502fef0d992f66f2fe3df2c74eb8c45573bc49258f5bd4f321ba952bec8120d673679ff25f0c76ddaa2

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              00eb93e6ef0ef4574248ad25fff5df6a

                              SHA1

                              50ed48e0f7aea67bab67781549c1460ef70e7b2e

                              SHA256

                              f968da636c0ce627019c5e021211508549ab00602b4a7f912b6c630afff18f63

                              SHA512

                              7bc85f65ed8b9d360736bbe3b38860e70a231f136a9bd9d7eae2e30a98d5bd1f4f31b86d5fe209b741ed2a8b1895aeba68788cbfe99a23dc8aaba39484119819

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              f66dbf79feeb3f7252b132a9dcac6644

                              SHA1

                              af9e862b8a3856cd5ff2e8086da66f2a05019b54

                              SHA256

                              cca4787788e9a9835f00a4067ba7c28499e9231ab7008af00269d3181da59a77

                              SHA512

                              6f25d317d880500a3ce4d568ccec55525951d8d9afb0abee82e9818a31398e84f8566c9048c28715c0fc266ee8ed330ed03ab56d498dfec3d009a6a9dd8f75a8

                            • memory/432-7-0x0000000004FE0000-0x00000000050EA000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/432-89-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

                              Filesize

                              4KB

                            • memory/432-9-0x0000000006C10000-0x00000000071B4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/432-37-0x0000000007860000-0x00000000078FC000-memory.dmp

                              Filesize

                              624KB

                            • memory/432-56-0x0000000074EB0000-0x0000000075660000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/432-8-0x00000000065C0000-0x0000000006652000-memory.dmp

                              Filesize

                              584KB

                            • memory/432-10-0x00000000067D0000-0x0000000006836000-memory.dmp

                              Filesize

                              408KB

                            • memory/432-6-0x0000000004D70000-0x0000000004DBC000-memory.dmp

                              Filesize

                              304KB

                            • memory/432-0-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

                              Filesize

                              4KB

                            • memory/432-90-0x0000000074EB0000-0x0000000075660000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/432-5-0x0000000004D20000-0x0000000004D5C000-memory.dmp

                              Filesize

                              240KB

                            • memory/432-4-0x0000000004CC0000-0x0000000004CD2000-memory.dmp

                              Filesize

                              72KB

                            • memory/432-3-0x0000000005390000-0x00000000059A8000-memory.dmp

                              Filesize

                              6.1MB

                            • memory/432-2-0x0000000074EB0000-0x0000000075660000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/432-1-0x00000000002E0000-0x000000000030A000-memory.dmp

                              Filesize

                              168KB