Analysis

  • max time kernel
    108s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 09:13

General

  • Target

    2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a.exe

  • Size

    333KB

  • MD5

    70b649dc98496fdd95d3c31dd28c8a96

  • SHA1

    8ac9a901047426fcaec73a4fa061b85ab28a378a

  • SHA256

    2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a

  • SHA512

    5a3c19ceee7df6d988bb3ad15c6242820629da8c941f69773f30fc7491a63629f6b1cfc603b2167b04ddbb85d304c1938b3f0d6f1af89af468a6ab5fb0ad873a

  • SSDEEP

    6144:R1RwZfFQDiioMvzATd5W0jbSXRYyghzqjjjjjjjfMNV4iJBcp+0Xp:R/zDiioMvzA+iyg9qjjjjjjjf+V4iJB+

Malware Config

Extracted

Family

redline

Botnet

5345987420

C2

https://pastebin.com/raw/NgsUAPya

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a.exe
    "C:\Users\Admin\AppData\Local\Temp\2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4824
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:756
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1404,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:8
      1⤵
        PID:2600

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/756-10-0x00000000060E0000-0x000000000611C000-memory.dmp
        Filesize

        240KB

      • memory/756-17-0x0000000006700000-0x0000000006776000-memory.dmp
        Filesize

        472KB

      • memory/756-2-0x0000000000400000-0x0000000000422000-memory.dmp
        Filesize

        136KB

      • memory/756-8-0x0000000005420000-0x000000000552A000-memory.dmp
        Filesize

        1.0MB

      • memory/756-4-0x0000000074C5E000-0x0000000074C5F000-memory.dmp
        Filesize

        4KB

      • memory/756-5-0x0000000004D90000-0x0000000004DF6000-memory.dmp
        Filesize

        408KB

      • memory/756-6-0x0000000005870000-0x0000000005E88000-memory.dmp
        Filesize

        6.1MB

      • memory/756-18-0x00000000066C0000-0x00000000066DE000-memory.dmp
        Filesize

        120KB

      • memory/756-20-0x0000000074C50000-0x0000000075400000-memory.dmp
        Filesize

        7.7MB

      • memory/756-9-0x0000000074C50000-0x0000000075400000-memory.dmp
        Filesize

        7.7MB

      • memory/756-7-0x00000000052F0000-0x0000000005302000-memory.dmp
        Filesize

        72KB

      • memory/756-11-0x0000000006120000-0x000000000616C000-memory.dmp
        Filesize

        304KB

      • memory/756-12-0x0000000006460000-0x0000000006622000-memory.dmp
        Filesize

        1.8MB

      • memory/756-13-0x0000000006B60000-0x000000000708C000-memory.dmp
        Filesize

        5.2MB

      • memory/756-14-0x0000000007640000-0x0000000007BE4000-memory.dmp
        Filesize

        5.6MB

      • memory/756-15-0x00000000067D0000-0x0000000006862000-memory.dmp
        Filesize

        584KB

      • memory/756-16-0x0000000006630000-0x0000000006680000-memory.dmp
        Filesize

        320KB

      • memory/3248-1-0x0000000000BD0000-0x0000000000BD1000-memory.dmp
        Filesize

        4KB

      • memory/3248-0-0x0000000000BD0000-0x0000000000BD1000-memory.dmp
        Filesize

        4KB

      • memory/3248-3-0x0000000000BD0000-0x0000000000BD1000-memory.dmp
        Filesize

        4KB