Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
PRODUCT_LIST.exe
Resource
win7-20240708-en
General
-
Target
PRODUCT_LIST.exe
-
Size
2.6MB
-
MD5
084f6a5b75fd76808d1099394ca45c3e
-
SHA1
abf381b6ea5bd403aa9a873fb04698000d5061d9
-
SHA256
4a6276e3136c7a49fe5046b78966ad785e052c4266c4dd0b68cf9937e9b5777f
-
SHA512
6464afc06b47246fba6b83c60112da233f19f9468b73b7db1d901b45f2c7cc9337d7701fc910b5fac746055e38afc19fc8d184ad1f59ad45953f1f196c8926cb
-
SSDEEP
12288:pZvl4rkRkOuZ8opZz/mYCGG301f19Q8AypNpobtrlp8:o2k3V001lAypNyi
Malware Config
Extracted
redline
cetry
204.14.75.2:16383
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2352-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2352-11-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2352-14-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2352-16-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2352-18-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2352-9-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2352-11-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2352-14-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2352-16-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2352-18-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
PRODUCT_LIST.exedescription pid process target process PID 2408 set thread context of 2352 2408 PRODUCT_LIST.exe CasPol.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
CasPol.exepid process 2352 CasPol.exe 2352 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PRODUCT_LIST.exeCasPol.exedescription pid process Token: SeDebugPrivilege 2408 PRODUCT_LIST.exe Token: SeDebugPrivilege 2352 CasPol.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PRODUCT_LIST.exedescription pid process target process PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 2352 2408 PRODUCT_LIST.exe CasPol.exe PID 2408 wrote to memory of 1652 2408 PRODUCT_LIST.exe WerFault.exe PID 2408 wrote to memory of 1652 2408 PRODUCT_LIST.exe WerFault.exe PID 2408 wrote to memory of 1652 2408 PRODUCT_LIST.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PRODUCT_LIST.exe"C:\Users\Admin\AppData\Local\Temp\PRODUCT_LIST.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2408 -s 6162⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD52ea63f0be3b2e943a7f51d7079dcca06
SHA13f62664b4ac4bfa59f3668f31c3b82428acd29f4
SHA256f6ba5e425749ce8f310fc68a6294bf02c2b867454384f5311f39dbe3826d40eb
SHA5128b8d8f2642b74fd12604816d4fe8cc9449f9df38ee2f669cdd0ac740449ef63ce7e1bbefb2f62829677d8d40f4c4544d0a260e4a62e7ae4c18a3396b8c23f485