Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
24-10-2021 16:23
Static task
static1
Behavioral task
behavioral1
Sample
tradecheat.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
tradecheat.exe
Resource
win10-en-20210920
General
-
Target
tradecheat.exe
-
Size
1.8MB
-
MD5
c7d14620434af78c9c97915ce1ad2f3e
-
SHA1
f68964448d84fea2cb727e1048f22531e6bacb06
-
SHA256
6c798312f1aa6826f5e1dcc49ae54d4011d0e28245b3e6be0803dfd4381c6acb
-
SHA512
7153ad04f977df8464007f26348d28b08a7de854e6640d39cc74212a730b5f4522eb0b209edbc420f83817d05f6748a19882dd113f559fee6ad1d964d58ba132
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1432-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1432-64-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1432-66-0x0000000000418D4A-mapping.dmp family_redline behavioral1/memory/1432-65-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1432-67-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
tradecheat.exepid process 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tradecheat.exedescription pid process target process PID 1268 set thread context of 1432 1268 tradecheat.exe tradecheat.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1052 1268 WerFault.exe tradecheat.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
tradecheat.exeWerFault.exetradecheat.exepid process 1268 tradecheat.exe 1268 tradecheat.exe 1268 tradecheat.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1432 tradecheat.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1052 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tradecheat.exeWerFault.exetradecheat.exedescription pid process Token: SeDebugPrivilege 1268 tradecheat.exe Token: SeDebugPrivilege 1052 WerFault.exe Token: SeDebugPrivilege 1432 tradecheat.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
tradecheat.exedescription pid process target process PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1432 1268 tradecheat.exe tradecheat.exe PID 1268 wrote to memory of 1052 1268 tradecheat.exe WerFault.exe PID 1268 wrote to memory of 1052 1268 tradecheat.exe WerFault.exe PID 1268 wrote to memory of 1052 1268 tradecheat.exe WerFault.exe PID 1268 wrote to memory of 1052 1268 tradecheat.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tradecheat.exe"C:\Users\Admin\AppData\Local\Temp\tradecheat.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\tradecheat.exe"C:\Users\Admin\AppData\Local\Temp\tradecheat.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 15722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1052