Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
CATALOGUE.exe
Resource
win7-20240705-en
General
-
Target
CATALOGUE.exe
-
Size
2.7MB
-
MD5
a3a55457b08e66b8246b3ab4f5afc5f8
-
SHA1
bcfbda193b0091361b4a9ddb06717e219a389351
-
SHA256
2c7c1638330a59ae2a7c7b549384b6cc6b915584c4c99c59256fdea1930437d7
-
SHA512
b61f2d8f84ee90fd08e057cbdb52df0881998b108f1affa156e0250458cef70007a954ae7913129883f46dcb29e5e697e17cbecef835e6c2378cca080a8d7743
-
SSDEEP
12288:mJZ7RmT35hppmYbhFD4IssrqUIb231sarW:mZA5hpZFFDtpIb23CarW
Malware Config
Extracted
redline
biss
172.81.131.198:16383
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-8-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2296-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2296-7-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2296-14-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2296-12-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-8-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2296-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2296-7-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2296-14-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2296-12-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
CATALOGUE.exedescription pid process target process PID 2548 set thread context of 2296 2548 CATALOGUE.exe regasm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regasm.exepid process 2296 regasm.exe 2296 regasm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
CATALOGUE.exeregasm.exedescription pid process Token: SeDebugPrivilege 2548 CATALOGUE.exe Token: SeDebugPrivilege 2296 regasm.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
CATALOGUE.exedescription pid process target process PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2296 2548 CATALOGUE.exe regasm.exe PID 2548 wrote to memory of 2008 2548 CATALOGUE.exe WerFault.exe PID 2548 wrote to memory of 2008 2548 CATALOGUE.exe WerFault.exe PID 2548 wrote to memory of 2008 2548 CATALOGUE.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CATALOGUE.exe"C:\Users\Admin\AppData\Local\Temp\CATALOGUE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2548 -s 6202⤵PID:2008