Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
357b2371c981675051594d5851dc7ca8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
357b2371c981675051594d5851dc7ca8.exe
Resource
win10v2004-20240709-en
General
-
Target
357b2371c981675051594d5851dc7ca8.exe
-
Size
535KB
-
MD5
357b2371c981675051594d5851dc7ca8
-
SHA1
f2e766123692f906b589e9a63059ec938e6c81f6
-
SHA256
91146fa003f23bd4dae8f201f8941d7adc54474bd3215f6b4d3f9a783abc6805
-
SHA512
f6bb07430716f87a8ed0278b8dfabaa696c16d54e66b874c02809c15777d722f09d19702f27c3cc3c604b85aaac4f78ec42e212ac8ff9171630c2fb33d379603
-
SSDEEP
12288:uY5Q6QcCTSY+aZrwrxvNs+3pneL7wET6sRf9hovCSHvtW:UT/4rHsAO7wO6OjovFg
Malware Config
Extracted
redline
cheat
185.222.58.236:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2172-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2172-13-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2172-17-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2172-15-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2172-9-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2172-13-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2172-17-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2172-15-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
357b2371c981675051594d5851dc7ca8.exedescription pid process target process PID 3064 set thread context of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
357b2371c981675051594d5851dc7ca8.exe357b2371c981675051594d5851dc7ca8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357b2371c981675051594d5851dc7ca8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357b2371c981675051594d5851dc7ca8.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
357b2371c981675051594d5851dc7ca8.exe357b2371c981675051594d5851dc7ca8.exepid process 3064 357b2371c981675051594d5851dc7ca8.exe 3064 357b2371c981675051594d5851dc7ca8.exe 3064 357b2371c981675051594d5851dc7ca8.exe 3064 357b2371c981675051594d5851dc7ca8.exe 2172 357b2371c981675051594d5851dc7ca8.exe 2172 357b2371c981675051594d5851dc7ca8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
357b2371c981675051594d5851dc7ca8.exe357b2371c981675051594d5851dc7ca8.exedescription pid process Token: SeDebugPrivilege 3064 357b2371c981675051594d5851dc7ca8.exe Token: SeDebugPrivilege 2172 357b2371c981675051594d5851dc7ca8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
357b2371c981675051594d5851dc7ca8.exedescription pid process target process PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe PID 3064 wrote to memory of 2172 3064 357b2371c981675051594d5851dc7ca8.exe 357b2371c981675051594d5851dc7ca8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\357b2371c981675051594d5851dc7ca8.exe"C:\Users\Admin\AppData\Local\Temp\357b2371c981675051594d5851dc7ca8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\357b2371c981675051594d5851dc7ca8.exe"C:\Users\Admin\AppData\Local\Temp\357b2371c981675051594d5851dc7ca8.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp981D.tmpFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\tmp9843.tmpFilesize
92KB
MD5c61f0bee83c8a956f2cf4ceba90bebc9
SHA1f4f61f0e65b7669be468cacaf8e00b2f30cb46cc
SHA256601c578f842ad1a4c743f3bf049d691225697819abe9b75bfe156264412e28dc
SHA512e6949a72e8bc26fd2910339ae75f22a36a0ad0bf9579bb2a0ada2ee2b8fb3a1b3891756eec774d4a64263e937c6ae768249e64874c559bb2f1b69d2d38bfceaa
-
memory/2172-7-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2172-99-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/2172-20-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/2172-18-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/2172-8-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2172-10-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2172-9-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2172-13-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2172-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2172-17-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2172-15-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3064-5-0x00000000005B0000-0x00000000005BE000-memory.dmpFilesize
56KB
-
memory/3064-6-0x0000000000B10000-0x0000000000B70000-memory.dmpFilesize
384KB
-
memory/3064-19-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/3064-0-0x00000000743CE000-0x00000000743CF000-memory.dmpFilesize
4KB
-
memory/3064-4-0x0000000000470000-0x000000000047A000-memory.dmpFilesize
40KB
-
memory/3064-3-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/3064-2-0x0000000000220000-0x0000000000232000-memory.dmpFilesize
72KB
-
memory/3064-1-0x0000000000250000-0x00000000002DC000-memory.dmpFilesize
560KB