Analysis
-
max time kernel
29s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
Payment slip.exe
Resource
win7-20240704-en
General
-
Target
Payment slip.exe
-
Size
504KB
-
MD5
c4b108f45b87751371fb6e78597772ae
-
SHA1
e60ae2b84d36714099a929b5af304e9a40857ba6
-
SHA256
ced3557310b98b8a1ede8c1c24c4997a2eb2e05e561dd0b6ca36627f0d987d14
-
SHA512
523ccc014c320c2371ed7ed75d67befa83b68b9f22f5e1b2a10c6343a4bf9ec711aa06cddb3631ef373980d3b6fb507bb514e71274e0f66d28e873624df66fbd
-
SSDEEP
12288:9C/ccUT6hn8ZISOD4CsfmADREaj3qLCaSnAmCwocAMee/c:eccEan8+vD4B76aa6AN4AMp/c
Malware Config
Extracted
redline
cheat
billred229102.duckdns.org:26546
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2668-29-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2668-28-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2668-27-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2668-25-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2668-23-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2668-29-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2668-28-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2668-27-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2668-25-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2668-23-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2748 powershell.exe 2764 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment slip.exedescription pid process target process PID 2508 set thread context of 2668 2508 Payment slip.exe Payment slip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Payment slip.exePayment slip.exepowershell.exepowershell.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment slip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment slip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Payment slip.exepowershell.exepowershell.exePayment slip.exepid process 2508 Payment slip.exe 2508 Payment slip.exe 2748 powershell.exe 2764 powershell.exe 2668 Payment slip.exe 2668 Payment slip.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Payment slip.exepowershell.exepowershell.exePayment slip.exedescription pid process Token: SeDebugPrivilege 2508 Payment slip.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2764 powershell.exe Token: SeDebugPrivilege 2668 Payment slip.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Payment slip.exedescription pid process target process PID 2508 wrote to memory of 2764 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2764 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2764 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2764 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2748 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2748 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2748 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2748 2508 Payment slip.exe powershell.exe PID 2508 wrote to memory of 2740 2508 Payment slip.exe schtasks.exe PID 2508 wrote to memory of 2740 2508 Payment slip.exe schtasks.exe PID 2508 wrote to memory of 2740 2508 Payment slip.exe schtasks.exe PID 2508 wrote to memory of 2740 2508 Payment slip.exe schtasks.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe PID 2508 wrote to memory of 2668 2508 Payment slip.exe Payment slip.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mueIOWjsOyku.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mueIOWjsOyku" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA380.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA380.tmpFilesize
1KB
MD5b2aaedc2b6285afdaaa250bd4e66698e
SHA135529104bbd54f59f8653cd66beca3c13501e802
SHA256416ed0d36cabef61cc1af5ad54f13b31e9a91000ffe97be565fa0a46e4d104a5
SHA512baaca16708d821d51b39a8b570f1629a579ec76fe270006999cd50cb742cc90ccff4ebaa8eca19e118e0d6fdd8ab158989c7e017dc066a5aca41b6a3b314496f
-
C:\Users\Admin\AppData\Local\Temp\tmpC45A.tmpFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\tmpC47F.tmpFilesize
92KB
MD5dd6944619a1cff7c63c0e49ed65368ca
SHA1a055ce9efa2206cdc35b924d43a5d06f453ce777
SHA25658ea6de2879649260c0a62b6e8e045e88c3311978e993f63a8dfcdb0dba9f05d
SHA512856d454cd202fc39bec08f7ea7fb9c631e5531c1d5ffc269d3ea4ef2cdd568b176da0f8e00ffd8c80eaad461cecbce213fa4cd46b142a7760fd32815261fddd7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FGHDQD44H5TL1K17JW5W.tempFilesize
7KB
MD5a318ec8999ab8b87246a4e7c98febc8e
SHA1d5bc502868130fa75be62c2da907bd29fab32d46
SHA256f8b02f6e0d97a4530dd4b6810dd89e021e10a0dd61bce446fd25a6f9b97f0d62
SHA512fe3f2b2f6e0405dbf58eb18407edef1ea93a672e39e5374f6d284a6f330042e73a42586eaccad63d3c9beb6581f5101c0d803638098655809dd268fb041f3578
-
memory/2508-1-0x0000000000890000-0x000000000090E000-memory.dmpFilesize
504KB
-
memory/2508-2-0x0000000073F80000-0x000000007466E000-memory.dmpFilesize
6.9MB
-
memory/2508-3-0x00000000004A0000-0x00000000004AE000-memory.dmpFilesize
56KB
-
memory/2508-4-0x00000000004E0000-0x00000000004EE000-memory.dmpFilesize
56KB
-
memory/2508-5-0x0000000002130000-0x0000000002190000-memory.dmpFilesize
384KB
-
memory/2508-0-0x0000000073F8E000-0x0000000073F8F000-memory.dmpFilesize
4KB
-
memory/2508-30-0x0000000073F80000-0x000000007466E000-memory.dmpFilesize
6.9MB
-
memory/2668-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2668-27-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2668-25-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2668-23-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2668-19-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2668-20-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2668-28-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2668-29-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB