Analysis
-
max time kernel
87s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-04-2024 23:40
Static task
static1
General
-
Target
MSBuild.exe
-
Size
180KB
-
MD5
7bb3d913742d3d4ab1e2236bfde7e4a6
-
SHA1
abff865c52824231776460bd7b1d068b121d3986
-
SHA256
1c8ba0ea86801366c0e20104ab91dee4693847b2a30c7fe6a65c91ee5e449c09
-
SHA512
3c197af92e31ea114494c3843f1c1dedb869828db9130435478ebd792cfb09a5101832447be85aa18a8c86b9051dfb23108f5a23841553d4c5cd1951c2a6ed65
-
SSDEEP
3072:q6AzkocoBLU5/ZApNhZ1FIoKuLrCfutILmfLulmScfrHrqPhhNsf9Y9oG:LAzkigdZApNH1FIoKdfuGL0S8jGhN0KR
Malware Config
Extracted
redline
cheat
TKANDERS.theworkpc.com:49182
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1524-5-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1524-5-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
MSBuild.exedescription pid process target process PID 2836 set thread context of 1524 2836 MSBuild.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
MSBuild.exeMSBuild.exepid process 2836 MSBuild.exe 2836 MSBuild.exe 2836 MSBuild.exe 2836 MSBuild.exe 2836 MSBuild.exe 1524 MSBuild.exe 1524 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MSBuild.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2836 MSBuild.exe Token: SeDebugPrivilege 1524 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
MSBuild.exedescription pid process target process PID 2836 wrote to memory of 1444 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1444 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1444 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe PID 2836 wrote to memory of 1524 2836 MSBuild.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.logFilesize
847B
MD5ef375f28c91db0202bf7db29c0cbc2ce
SHA15a3f5d4ec75a468b908c2eb2b9e6f4b1e76c1017
SHA256f4d1c038db378dec10e7e2fc81ccc2e2d4b8132ef0d66905e3625a0b0cbbde5f
SHA512f18141e352fcd253e02cb25fa0cff29ab06dec62bafd5aa80ca48c959d1dba97deae830d01bf521f851a8143b9416747eb170d0cedafa32b59155027c02f244d
-
C:\Users\Admin\AppData\Local\Temp\tmpE86D.tmpFilesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
C:\Users\Admin\AppData\Local\Temp\tmpE8A2.tmpFilesize
100KB
MD5381b3586815e6993a58a56774117e22c
SHA18d0dd1b77522c8c3498665a5ef20b350a93d91c1
SHA2565b56e288e2e08a26cdbe0af5f88e9225dc1fd74ee9e3e72d68917f1befe48896
SHA512b158a089174e62ae187e8ed07b9d9c89ba20cc0b32f6a704a4fd099907b3b56be5ade05bea786664c6fc5df9d15223895d679367628c9e51095381d3b946345a
-
C:\Users\Admin\AppData\Local\Temp\tmpE91B.tmpFilesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
C:\Users\Admin\AppData\Local\Temp\tmpE931.tmpFilesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
C:\Users\Admin\AppData\Local\Temp\tmpE946.tmpFilesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
C:\Users\Admin\AppData\Local\Temp\tmpE971.tmpFilesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
memory/1524-22-0x0000000007690000-0x00000000076F6000-memory.dmpFilesize
408KB
-
memory/1524-19-0x0000000006CE0000-0x0000000006D72000-memory.dmpFilesize
584KB
-
memory/1524-10-0x0000000005A10000-0x0000000006028000-memory.dmpFilesize
6.1MB
-
memory/1524-11-0x00000000053F0000-0x0000000005402000-memory.dmpFilesize
72KB
-
memory/1524-12-0x0000000005450000-0x000000000548C000-memory.dmpFilesize
240KB
-
memory/1524-13-0x00000000053E0000-0x00000000053F0000-memory.dmpFilesize
64KB
-
memory/1524-14-0x0000000005490000-0x00000000054DC000-memory.dmpFilesize
304KB
-
memory/1524-15-0x00000000056F0000-0x00000000057FA000-memory.dmpFilesize
1.0MB
-
memory/1524-16-0x00000000069F0000-0x0000000006BB2000-memory.dmpFilesize
1.8MB
-
memory/1524-17-0x00000000070F0000-0x000000000761C000-memory.dmpFilesize
5.2MB
-
memory/1524-18-0x0000000006BC0000-0x0000000006C36000-memory.dmpFilesize
472KB
-
memory/1524-9-0x0000000074BC0000-0x0000000075371000-memory.dmpFilesize
7.7MB
-
memory/1524-20-0x0000000007BD0000-0x0000000008176000-memory.dmpFilesize
5.6MB
-
memory/1524-21-0x0000000006EA0000-0x0000000006EBE000-memory.dmpFilesize
120KB
-
memory/1524-204-0x0000000074BC0000-0x0000000075371000-memory.dmpFilesize
7.7MB
-
memory/1524-5-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2836-8-0x0000000074BC0000-0x0000000075371000-memory.dmpFilesize
7.7MB
-
memory/2836-4-0x0000000002EE0000-0x0000000002EE6000-memory.dmpFilesize
24KB
-
memory/2836-3-0x0000000002E50000-0x0000000002E6A000-memory.dmpFilesize
104KB
-
memory/2836-2-0x0000000002F10000-0x0000000002F20000-memory.dmpFilesize
64KB
-
memory/2836-1-0x0000000074BC0000-0x0000000075371000-memory.dmpFilesize
7.7MB
-
memory/2836-0-0x00000000008C0000-0x00000000008F0000-memory.dmpFilesize
192KB