Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
114f1c23daae885f851b9cf1fdaf8457.exe
Resource
win7-20240705-en
General
-
Target
114f1c23daae885f851b9cf1fdaf8457.exe
-
Size
797KB
-
MD5
114f1c23daae885f851b9cf1fdaf8457
-
SHA1
82338420d02452dfbd4bed8ed753e50739f27484
-
SHA256
b77fc538e119d7b94ac123c2fe21b5d403316cbc4510479130f195a18dc61f32
-
SHA512
262650ad16731df09db9f6f5c816d45e6e2b9bf72a3d8af30ec121d3a1f0fc6e402da3117ecee472af777c7a6e1ac8fa5cd5e7c4ab7517fc7d2d61a9d9659ddb
-
SSDEEP
24576:jqxzXQRlUnZRJOU3MlrQvB5LcFFVo7S+vRSBJIZJi:jq91ZR0U3MlMvHcFFVo7EBAJi
Malware Config
Extracted
redline
cheat
45.137.22.78:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/884-28-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/884-25-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/884-23-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/884-30-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/884-29-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/884-28-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/884-25-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/884-23-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/884-30-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/884-29-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2620 powershell.exe 2464 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
114f1c23daae885f851b9cf1fdaf8457.exedescription pid process target process PID 2632 set thread context of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
114f1c23daae885f851b9cf1fdaf8457.exepowershell.exepowershell.exe114f1c23daae885f851b9cf1fdaf8457.exepid process 2632 114f1c23daae885f851b9cf1fdaf8457.exe 2632 114f1c23daae885f851b9cf1fdaf8457.exe 2632 114f1c23daae885f851b9cf1fdaf8457.exe 2632 114f1c23daae885f851b9cf1fdaf8457.exe 2632 114f1c23daae885f851b9cf1fdaf8457.exe 2632 114f1c23daae885f851b9cf1fdaf8457.exe 2632 114f1c23daae885f851b9cf1fdaf8457.exe 2464 powershell.exe 2620 powershell.exe 884 114f1c23daae885f851b9cf1fdaf8457.exe 884 114f1c23daae885f851b9cf1fdaf8457.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
114f1c23daae885f851b9cf1fdaf8457.exepowershell.exepowershell.exe114f1c23daae885f851b9cf1fdaf8457.exedescription pid process Token: SeDebugPrivilege 2632 114f1c23daae885f851b9cf1fdaf8457.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 884 114f1c23daae885f851b9cf1fdaf8457.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
114f1c23daae885f851b9cf1fdaf8457.exedescription pid process target process PID 2632 wrote to memory of 2620 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2620 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2620 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2620 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2464 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2464 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2464 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2464 2632 114f1c23daae885f851b9cf1fdaf8457.exe powershell.exe PID 2632 wrote to memory of 2060 2632 114f1c23daae885f851b9cf1fdaf8457.exe schtasks.exe PID 2632 wrote to memory of 2060 2632 114f1c23daae885f851b9cf1fdaf8457.exe schtasks.exe PID 2632 wrote to memory of 2060 2632 114f1c23daae885f851b9cf1fdaf8457.exe schtasks.exe PID 2632 wrote to memory of 2060 2632 114f1c23daae885f851b9cf1fdaf8457.exe schtasks.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe PID 2632 wrote to memory of 884 2632 114f1c23daae885f851b9cf1fdaf8457.exe 114f1c23daae885f851b9cf1fdaf8457.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\114f1c23daae885f851b9cf1fdaf8457.exe"C:\Users\Admin\AppData\Local\Temp\114f1c23daae885f851b9cf1fdaf8457.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\114f1c23daae885f851b9cf1fdaf8457.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vQYTRFwVF.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vQYTRFwVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC320.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\114f1c23daae885f851b9cf1fdaf8457.exe"C:\Users\Admin\AppData\Local\Temp\114f1c23daae885f851b9cf1fdaf8457.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC320.tmpFilesize
1KB
MD58058edbb8feaf4655a5d1496bf78de93
SHA1a15a476735b2d3af3682346159e33866f8c313e4
SHA2566bdc8357f1362f0809b158dced562b08e7344aebe48d40932e3f30c525153034
SHA5120bfcffe0093517e84f2055761107ae3927d4953d3420fc66dd7aa0a58db16123e518bc6bdc590224bdb14dcf1a9b595f869062f6a523b2ca47d8374d9e1e2a10
-
C:\Users\Admin\AppData\Local\Temp\tmpDE93.tmpFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\tmpDEA9.tmpFilesize
92KB
MD5de7d702f13db499233da2c87959d7696
SHA18d51283dc6b41cae89ac01928cd0460604ff1d3e
SHA25678e689d13f1ff71daeb36634831fa7457a8c90ea465a3e342aef921d8ca82b34
SHA512a57e198ff5e32453ac99d6aefb5ab71f9cb4c80006f2a75d3c3e0ef28a0ca00f387110788edc1df1e0a7ab9a2503571e82749e51acf7c67e654a586503754045
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD52c8eb4968282de8480a7fea29e3ad66c
SHA12ac1cb7be5d337baeeb8a5c797ab1185aad537cb
SHA256302279a8119c383ef2c6b47f05e960f004a7677ac0c978b1dd15aac04d873685
SHA512f24d10a40390f9eacf5b599c69413c71e2989bace5efc6892b40e9b4070c57f637217ef1a70c1641a304eb2770e68495447fba627f71cb8135d996a1711ee346
-
memory/884-30-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/884-21-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/884-29-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/884-23-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/884-25-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/884-19-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/884-28-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/884-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2632-3-0x00000000009C0000-0x00000000009DA000-memory.dmpFilesize
104KB
-
memory/2632-4-0x00000000006A0000-0x00000000006A8000-memory.dmpFilesize
32KB
-
memory/2632-5-0x0000000000970000-0x000000000097C000-memory.dmpFilesize
48KB
-
memory/2632-0-0x000000007433E000-0x000000007433F000-memory.dmpFilesize
4KB
-
memory/2632-6-0x0000000004490000-0x000000000452A000-memory.dmpFilesize
616KB
-
memory/2632-31-0x0000000074330000-0x0000000074A1E000-memory.dmpFilesize
6.9MB
-
memory/2632-2-0x0000000074330000-0x0000000074A1E000-memory.dmpFilesize
6.9MB
-
memory/2632-1-0x0000000000FC0000-0x000000000108A000-memory.dmpFilesize
808KB