Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 15:40
Static task
static1
Behavioral task
behavioral1
Sample
EasyCheat.exe
Resource
win7-en-20211208
General
-
Target
EasyCheat.exe
-
Size
74KB
-
MD5
76cd2291f9307d31ca70cc155bfef971
-
SHA1
e36c68f7bc50150dfb1f3ed54c6a3503f680852a
-
SHA256
f576580f69157f1e64941256a721f74d38ae8b562281d631f9b864538871ef3d
-
SHA512
da6c892b97f6d402be227c6ad6ad772824d5e6dfe3d8088ce51d22f26bd1d652472e743aac0fb3a83f96f4d686b3b6c13b074e0c592f43a68a4881da5544919e
Malware Config
Extracted
redline
Panel
185.128.107.102:6886
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/828-62-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/828-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/828-64-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/828-66-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
EasyCheat.exedescription pid process target process PID 1796 set thread context of 828 1796 EasyCheat.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1240 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
EasyCheat.exeRegAsm.exepid process 1796 EasyCheat.exe 1796 EasyCheat.exe 828 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
EasyCheat.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1796 EasyCheat.exe Token: SeDebugPrivilege 828 RegAsm.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
EasyCheat.execmd.exedescription pid process target process PID 1796 wrote to memory of 468 1796 EasyCheat.exe cmd.exe PID 1796 wrote to memory of 468 1796 EasyCheat.exe cmd.exe PID 1796 wrote to memory of 468 1796 EasyCheat.exe cmd.exe PID 1796 wrote to memory of 468 1796 EasyCheat.exe cmd.exe PID 468 wrote to memory of 1240 468 cmd.exe timeout.exe PID 468 wrote to memory of 1240 468 cmd.exe timeout.exe PID 468 wrote to memory of 1240 468 cmd.exe timeout.exe PID 468 wrote to memory of 1240 468 cmd.exe timeout.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe PID 1796 wrote to memory of 828 1796 EasyCheat.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EasyCheat.exe"C:\Users\Admin\AppData\Local\Temp\EasyCheat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 202⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\timeout.exetimeout 203⤵
- Delays execution with timeout.exe
PID:1240
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-