Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe
Resource
win7-20240705-en
General
-
Target
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe
-
Size
1.9MB
-
MD5
03c597ac6fae7130833e04e289c1a707
-
SHA1
d0b60497f4b5143b81947c630654fb4cce438f4b
-
SHA256
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0
-
SHA512
6e962c318afc6c4b48b964dd6af4e64cea6d0f2f7f44b2d90ef573f8b5070261c00f3c27821512bf0fc55b98438abeb3ed30b8c7e2f072c8dc90eaf8a49ab928
-
SSDEEP
12288:6eRkAGag6meBQRgsPNFN8+uBdjyAPDHVtrM82QYm:6GPsTNydWgDVtrj
Malware Config
Extracted
redline
unk777
159.203.177.31:16383
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2776-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2776-11-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2752-22-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2752-26-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2752-24-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2776-9-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2776-11-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2752-22-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2752-26-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2752-24-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exedescription pid process target process PID 2816 set thread context of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regasm.exepid process 2752 regasm.exe 2752 regasm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exeregasm.exedescription pid process Token: SeDebugPrivilege 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe Token: SeDebugPrivilege 2752 regasm.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exedescription pid process target process PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2776 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe msbuild.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2752 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2724 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2724 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2724 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2724 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2724 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2724 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe PID 2816 wrote to memory of 2724 2816 c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe regasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe"C:\Users\Admin\AppData\Local\Temp\c5ad319799d36151e0d328dc73736af67d2ea201bb57c39573cffabf9e2792d0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵PID:2776
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5f4043b9b54cb32b738ca265397e3fa05
SHA10ee24b3f338b66b3a9f87d2fe4920759f1849cda
SHA256fdbc98007cc9a5c7497e088ffb8841c857d924fa4104bd77ecfff7e917342500
SHA5126b46b0faf55d927c0cfa46a05dc554036992c83e2a4ff47867f2b3dda16c7d4b184514532c88a7c3457de7d19712e07ed3b650de991871a13c0058be1d84496f