Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 06:13
Behavioral task
behavioral1
Sample
e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe
Resource
win7-20240221-en
General
-
Target
e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe
-
Size
3.4MB
-
MD5
db427cc5464c265577871c31bc1065d0
-
SHA1
796cf29ee18ef8997b901295326f18dbe0d0a7dd
-
SHA256
e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5
-
SHA512
5002167b41cd4460417d72a283aded7d0c7c9fc171cc6996abd5fbcd02f0fbb217164e189a042631d4abf5f76d84b7b24b94008d8027b5a86b2f19523c1bc993
-
SSDEEP
24576:TVsQ6BKfC+CWDU2fy6Uuri8MmOmbCYUz7PH8Zeaj0HM3ow5XtyB:TVeBB2kMOnYUvPb
Malware Config
Extracted
redline
cheat
91.92.249.99:13359
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\build.exe family_redline behavioral1/memory/2304-18-0x00000000012D0000-0x00000000012EE000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3024-1-0x00000000002E0000-0x0000000000652000-memory.dmp family_sectoprat C:\ProgramData\HMC.exe family_sectoprat C:\ProgramData\build.exe family_sectoprat behavioral1/memory/1188-14-0x0000000000C50000-0x0000000000F5C000-memory.dmp family_sectoprat behavioral1/memory/2304-18-0x00000000012D0000-0x00000000012EE000-memory.dmp family_sectoprat -
Executes dropped EXE 2 IoCs
Processes:
HMC.exebuild.exepid process 1188 HMC.exe 2304 build.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
build.exedescription pid process Token: SeDebugPrivilege 2304 build.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exeHMC.exedescription pid process target process PID 3024 wrote to memory of 1188 3024 e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe HMC.exe PID 3024 wrote to memory of 1188 3024 e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe HMC.exe PID 3024 wrote to memory of 1188 3024 e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe HMC.exe PID 3024 wrote to memory of 2304 3024 e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe build.exe PID 3024 wrote to memory of 2304 3024 e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe build.exe PID 3024 wrote to memory of 2304 3024 e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe build.exe PID 3024 wrote to memory of 2304 3024 e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe build.exe PID 1188 wrote to memory of 2264 1188 HMC.exe WerFault.exe PID 1188 wrote to memory of 2264 1188 HMC.exe WerFault.exe PID 1188 wrote to memory of 2264 1188 HMC.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe"C:\Users\Admin\AppData\Local\Temp\e1dbb4d7308b83fa578a49acb3f8d23b643824ba5626ee3c4b7abd7b6c4f7ac5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\ProgramData\HMC.exe"C:\ProgramData\HMC.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1188 -s 6803⤵PID:2264
-
-
-
C:\ProgramData\build.exe"C:\ProgramData\build.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD56e4727684bbce2a7e6ce6824792c5cd8
SHA1d20e40c0e81476dbecdbe859931a25d279fc055e
SHA2563c0d3ca35dcf977eade9897106a46ae8def8d1eecd757cc07e31bd13b00d2198
SHA5125c55bda7008c5c54c8122e7934c3ef0f70325138a4fbff4201d430fccac13d4ade2b9be8aa86e1b8969bc26f84303d2ccb1a20cd1980ba7a85013d37a0024200
-
Filesize
96KB
MD5d1af2776a0515fa6de91acb0a442048d
SHA178c76b53352d5eb9f2761d19a3063b203d369bad
SHA256972d6d5273ea9f4615e77d13fed4c51edd7ecc263112f1ce90f8847199b5a248
SHA512b96feea2fff7f32fe3ed27c55b414bd56a56a680e2f056c8ababa278e753de680eb17ce509c1665de8477b07499ecdf0671bb36dd6515df130d1d32c0982ab5c