Analysis
-
max time kernel
127s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
27-11-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe
Resource
win10-20231020-en
General
-
Target
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe
-
Size
1.6MB
-
MD5
346bcb0f32a5f129bcc397b3ff149d06
-
SHA1
cc9ef4edeb9d2c2ecf4a8fdca5b0c194244e0d85
-
SHA256
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8
-
SHA512
4efbd8295b8021f4ae58962fb623478a2ae0095e0fa0bb08840382573fae47352a55ffaadab016abca6413155abe64536cb8eb819e0ea6a96fbaf2f49a00eedc
-
SSDEEP
24576:SeFafLTWHB2CUuE7GaTRWAlVzQKPBG2qIeO46EhX:SyGTWHM75TNVB5HqmFAX
Malware Config
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2564-26-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon behavioral1/memory/2564-42-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon behavioral1/memory/2564-43-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2152-34-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2152-36-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2152-45-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2152-47-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2152-49-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exeAddInProcess32.exedescription pid process target process PID 1600 set thread context of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 set thread context of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 2704 set thread context of 2152 2704 AddInProcess32.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exeAddInProcess32.exeInstallUtil.exepid process 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe 2704 AddInProcess32.exe 2704 AddInProcess32.exe 2152 InstallUtil.exe 2152 InstallUtil.exe 2152 InstallUtil.exe 2152 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exeAddInProcess32.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe Token: SeDebugPrivilege 2704 AddInProcess32.exe Token: SeDebugPrivilege 2152 InstallUtil.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exeAddInProcess32.exedescription pid process target process PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2704 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 1600 wrote to memory of 2564 1600 017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe AddInProcess32.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe PID 2704 wrote to memory of 2152 2704 AddInProcess32.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe"C:\Users\Admin\AppData\Local\Temp\017fdf6b4016eb83c74165110d7b1b77aab163c1b58ef133b93f07788a1906b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2564