Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
18a92c9d3249a89f84338ea4e7763440N.exe
Resource
win7-20240704-en
General
-
Target
18a92c9d3249a89f84338ea4e7763440N.exe
-
Size
501KB
-
MD5
18a92c9d3249a89f84338ea4e7763440
-
SHA1
d6f159cc377aa739ecb01220366e36d661508c96
-
SHA256
2b7e4816e73b4907e819fae68a7d8c896b5947075f73ca8fc9fd48533646ccdb
-
SHA512
25ff61385c554dcc0d9af48623a43e90df5ef265fe76e25cea7171fd20a7278a9638bf1d14a4845c9ccc98b632977635e156dcd0f2ecaaddec5a621d10ad1959
-
SSDEEP
12288:LxOhm/eOu0j4CwqOzTvsO333FfLxMyGl6S6qZ1AkR:LCmmOu08Ct0vl3FfljGl6S9Zd
Malware Config
Extracted
redline
cheat
185.222.57.153:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2496-23-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2496-28-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2496-25-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2496-29-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2496-31-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2496-23-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2496-28-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2496-25-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2496-29-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2496-31-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2804 powershell.exe 2788 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exedescription pid process target process PID 2304 set thread context of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
18a92c9d3249a89f84338ea4e7763440N.exe18a92c9d3249a89f84338ea4e7763440N.exepowershell.exepowershell.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a92c9d3249a89f84338ea4e7763440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a92c9d3249a89f84338ea4e7763440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exepowershell.exepowershell.exepid process 2304 18a92c9d3249a89f84338ea4e7763440N.exe 2304 18a92c9d3249a89f84338ea4e7763440N.exe 2304 18a92c9d3249a89f84338ea4e7763440N.exe 2304 18a92c9d3249a89f84338ea4e7763440N.exe 2788 powershell.exe 2304 18a92c9d3249a89f84338ea4e7763440N.exe 2804 powershell.exe 2304 18a92c9d3249a89f84338ea4e7763440N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exepowershell.exepowershell.exe18a92c9d3249a89f84338ea4e7763440N.exedescription pid process Token: SeDebugPrivilege 2304 18a92c9d3249a89f84338ea4e7763440N.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 2496 18a92c9d3249a89f84338ea4e7763440N.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exedescription pid process target process PID 2304 wrote to memory of 2788 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2788 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2788 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2788 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2804 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2804 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2804 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2804 2304 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 2304 wrote to memory of 2688 2304 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 2304 wrote to memory of 2688 2304 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 2304 wrote to memory of 2688 2304 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 2304 wrote to memory of 2688 2304 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 2304 wrote to memory of 2496 2304 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jrWrviEKDWTV.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jrWrviEKDWTV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp817F.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp817F.tmpFilesize
1KB
MD5f0ab32deb4352b7d70ad8f87573221f2
SHA11f4936628b62da6a9c8229fb1e950b9e1e8b42af
SHA256deb5eaeb0b35e004acdef6105ab2f60819ea024235a1ae4008d2fb74d2c8fb55
SHA512cd5e86842cc63049340719dfed7c352858e7a1536d5a7cc34837cccf536bb6bd9e559a6e37301b12b3ed7604d9d8ffbb3c57e490c2f07dcf71f30a16a28b10dd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD512cd583d59a96435745edd849e623358
SHA13cdd9a96b2bbb68eacf561a21f1623da2590a92d
SHA256a5c94693f528c17e9757be8ff1dc8e23503f431db20a9d5dd1d3a06748b28747
SHA512e18db91d84d2ede2316a2cedfbdd97d8de601feff118edb77addca5c0f6f13869761441e98a66d3ebbf47f13d14fd80e8385f2557cc36373945d6bdb523734be
-
memory/2304-14-0x000000007477E000-0x000000007477F000-memory.dmpFilesize
4KB
-
memory/2304-32-0x0000000074770000-0x0000000074E5E000-memory.dmpFilesize
6.9MB
-
memory/2304-4-0x00000000007A0000-0x00000000007AE000-memory.dmpFilesize
56KB
-
memory/2304-5-0x0000000005A50000-0x0000000005AB0000-memory.dmpFilesize
384KB
-
memory/2304-2-0x0000000074770000-0x0000000074E5E000-memory.dmpFilesize
6.9MB
-
memory/2304-1-0x0000000001180000-0x00000000011FE000-memory.dmpFilesize
504KB
-
memory/2304-0-0x000000007477E000-0x000000007477F000-memory.dmpFilesize
4KB
-
memory/2304-3-0x0000000000650000-0x0000000000660000-memory.dmpFilesize
64KB
-
memory/2496-19-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2496-28-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2496-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2496-25-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2496-21-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2496-29-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2496-31-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2496-23-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB