Analysis
-
max time kernel
29s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
18a92c9d3249a89f84338ea4e7763440N.exe
Resource
win7-20240704-en
General
-
Target
18a92c9d3249a89f84338ea4e7763440N.exe
-
Size
501KB
-
MD5
18a92c9d3249a89f84338ea4e7763440
-
SHA1
d6f159cc377aa739ecb01220366e36d661508c96
-
SHA256
2b7e4816e73b4907e819fae68a7d8c896b5947075f73ca8fc9fd48533646ccdb
-
SHA512
25ff61385c554dcc0d9af48623a43e90df5ef265fe76e25cea7171fd20a7278a9638bf1d14a4845c9ccc98b632977635e156dcd0f2ecaaddec5a621d10ad1959
-
SSDEEP
12288:LxOhm/eOu0j4CwqOzTvsO333FfLxMyGl6S6qZ1AkR:LCmmOu08Ct0vl3FfljGl6S9Zd
Malware Config
Extracted
redline
cheat
185.222.57.153:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2264-27-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-24-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-22-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-28-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-30-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2264-27-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-24-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-22-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-28-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-30-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2832 powershell.exe 2104 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exedescription pid process target process PID 1944 set thread context of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exe18a92c9d3249a89f84338ea4e7763440N.exe18a92c9d3249a89f84338ea4e7763440N.exepowershell.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a92c9d3249a89f84338ea4e7763440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a92c9d3249a89f84338ea4e7763440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exepowershell.exepowershell.exepid process 1944 18a92c9d3249a89f84338ea4e7763440N.exe 1944 18a92c9d3249a89f84338ea4e7763440N.exe 1944 18a92c9d3249a89f84338ea4e7763440N.exe 2832 powershell.exe 1944 18a92c9d3249a89f84338ea4e7763440N.exe 2104 powershell.exe 1944 18a92c9d3249a89f84338ea4e7763440N.exe 1944 18a92c9d3249a89f84338ea4e7763440N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exepowershell.exepowershell.exe18a92c9d3249a89f84338ea4e7763440N.exedescription pid process Token: SeDebugPrivilege 1944 18a92c9d3249a89f84338ea4e7763440N.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeDebugPrivilege 2264 18a92c9d3249a89f84338ea4e7763440N.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
18a92c9d3249a89f84338ea4e7763440N.exedescription pid process target process PID 1944 wrote to memory of 2832 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2832 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2832 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2832 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2104 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2104 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2104 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2104 1944 18a92c9d3249a89f84338ea4e7763440N.exe powershell.exe PID 1944 wrote to memory of 2680 1944 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 1944 wrote to memory of 2680 1944 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 1944 wrote to memory of 2680 1944 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 1944 wrote to memory of 2680 1944 18a92c9d3249a89f84338ea4e7763440N.exe schtasks.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe PID 1944 wrote to memory of 2264 1944 18a92c9d3249a89f84338ea4e7763440N.exe 18a92c9d3249a89f84338ea4e7763440N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jrWrviEKDWTV.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jrWrviEKDWTV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp738B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"C:\Users\Admin\AppData\Local\Temp\18a92c9d3249a89f84338ea4e7763440N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp738B.tmpFilesize
1KB
MD5f0ab32deb4352b7d70ad8f87573221f2
SHA11f4936628b62da6a9c8229fb1e950b9e1e8b42af
SHA256deb5eaeb0b35e004acdef6105ab2f60819ea024235a1ae4008d2fb74d2c8fb55
SHA512cd5e86842cc63049340719dfed7c352858e7a1536d5a7cc34837cccf536bb6bd9e559a6e37301b12b3ed7604d9d8ffbb3c57e490c2f07dcf71f30a16a28b10dd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD52c83263d5de2273062379ae3c9727b75
SHA1d09b554ee9634eac69f4bf46c254a3ea9d455d1e
SHA25624cd91669e590b8a66c36c4d38beb3c4d512a715dd400901e3388b399db4aeb4
SHA51271e53be7747ac99b4e9d91655b44a1e8cc3a8d137597fdddce6133440290ffc628dbcc9d2163aaed5e60d108dfd7e4df6adaf7aa84691e7a6015a8a13362c6ec
-
memory/1944-31-0x0000000074770000-0x0000000074E5E000-memory.dmpFilesize
6.9MB
-
memory/1944-1-0x0000000000B60000-0x0000000000BDE000-memory.dmpFilesize
504KB
-
memory/1944-2-0x0000000074770000-0x0000000074E5E000-memory.dmpFilesize
6.9MB
-
memory/1944-3-0x0000000000450000-0x0000000000460000-memory.dmpFilesize
64KB
-
memory/1944-4-0x00000000004C0000-0x00000000004CE000-memory.dmpFilesize
56KB
-
memory/1944-5-0x00000000021A0000-0x0000000002200000-memory.dmpFilesize
384KB
-
memory/1944-0-0x000000007477E000-0x000000007477F000-memory.dmpFilesize
4KB
-
memory/2264-18-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2264-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2264-24-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2264-22-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2264-20-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2264-27-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2264-28-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2264-30-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB