Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe
Resource
win7-20240220-en
General
-
Target
ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe
-
Size
976KB
-
MD5
8a1d971b45cc4b91fbe2a98a14f1f7e9
-
SHA1
331b950e0d0ae79c362ae3fdac6ff5e8f02db280
-
SHA256
ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5
-
SHA512
2c8913b0680eeeb505b9aabd9f5a7c060f92be1279b6585d820141ac2f41e26778fb83486ed9e3380de0e5f914f3f063fff60e0fcf017e59e4d451154daa0552
-
SSDEEP
24576:TxLsMs8WdXk89WycIljgE94nI0DkKesxgaai+pBkTx8:Bsld/9WyxlpYI0DkCvepBka
Malware Config
Extracted
redline
cheat
185.222.58.99:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2492-32-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2492-33-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2492-36-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2492-39-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2492-42-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 7 IoCs
resource yara_rule behavioral1/memory/2492-32-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2492-33-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2492-36-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2492-39-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2492-42-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2440-49-0x0000000002870000-0x00000000028B0000-memory.dmp family_sectoprat behavioral1/memory/2492-52-0x0000000000CF0000-0x0000000000D30000-memory.dmp family_sectoprat -
Executes dropped EXE 2 IoCs
pid Process 2956 PO.exe 2492 PO.exe -
Loads dropped DLL 5 IoCs
pid Process 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 2956 PO.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2956 set thread context of 2492 2956 PO.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2956 PO.exe 2956 PO.exe 2956 PO.exe 2956 PO.exe 2440 powershell.exe 2492 PO.exe 2492 PO.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2956 PO.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 2492 PO.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 DllHost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2956 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 29 PID 1740 wrote to memory of 2956 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 29 PID 1740 wrote to memory of 2956 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 29 PID 1740 wrote to memory of 2956 1740 ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe 29 PID 2956 wrote to memory of 2440 2956 PO.exe 30 PID 2956 wrote to memory of 2440 2956 PO.exe 30 PID 2956 wrote to memory of 2440 2956 PO.exe 30 PID 2956 wrote to memory of 2440 2956 PO.exe 30 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32 PID 2956 wrote to memory of 2492 2956 PO.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe"C:\Users\Admin\AppData\Local\Temp\ec0453e0735261daf96af26ddebba797b1394056812d40d9fbbc063f73513aa5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
868KB
MD505688bf5edaa27b50cdf1bc3a4de8c63
SHA148c7640543918824efebb21b073330aaa0dced50
SHA2563528b922058c0904e97f80d335cef3873f3f0551fef3fd7b8a614bd7a8188239
SHA51219e2dc1424b85ea58f7d3445c5c3ede97d9d6c911692d6fc18c1f2d85bebc46064e7ceb5ed918e33884d103c55719284c2646426bec38855cc9545ed29a3385b
-
Filesize
83KB
MD5016025125f3b479aaabf8a4246073856
SHA1123cf64214f2ba96dedc076d388ddf60d2ec5ce5
SHA25639f3195908d56ee6d4d0f6484c913bbb268e934121856c590b397bbf7a3573ca
SHA5124c83f010593e2ec86de367653a0c03aad7a41d1a7f6e26e302666ee81b6f4f4841e3395a026856e35ba9d092ef530af0756b4adb13e944dd7a0d5d5b64ddc62b
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD518e04095708297d6889a6962f81e8d8f
SHA19a25645db1da0217092c06579599b04982192124
SHA2564ed16c019fe50bb4ab1c9dcedf0e52f93454b5dbaf18615d60761e7927b69fb7
SHA51245ec57bddeeb8bca05babcf8da83bf9db630819b23076a1cf79f2e54b3e88e14cd7db650332554026ab5e8634061dd699f322bcba6683765063e67ac47ea1caf