Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
0e2bc3bbb537be685839790e355fe7f5.exe
Resource
win7-20240903-en
General
-
Target
0e2bc3bbb537be685839790e355fe7f5.exe
-
Size
538KB
-
MD5
0e2bc3bbb537be685839790e355fe7f5
-
SHA1
ea521b538d2edda4663aa9a287c3a8eb04dfc943
-
SHA256
3a52334a83d46e6cb089b679a46ba9c139f784899f6f93866ebb92d74d3f7419
-
SHA512
d4c49c4a2ba2be93acc47a5ec1a34538b41e341452b1d98372f41079a739d0e8ebb6d2fd3cfce273bbc7a638530ec5889957a37425357b8cbc5cd7aa2f9d7dcf
-
SSDEEP
12288:hMfzu3uphyrk6J6/FmO9pmJI08L4lspyk1MlmV8kR:hsZyrkA6/MO9pmJCdpykiC
Malware Config
Extracted
redline
cheat
185.222.58.240:55615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2264-28-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-25-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-23-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-32-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2264-30-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2264-28-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-25-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-23-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-32-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2264-30-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2568 powershell.exe 2920 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e2bc3bbb537be685839790e355fe7f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e2bc3bbb537be685839790e355fe7f5.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2372 0e2bc3bbb537be685839790e355fe7f5.exe 2372 0e2bc3bbb537be685839790e355fe7f5.exe 2372 0e2bc3bbb537be685839790e355fe7f5.exe 2372 0e2bc3bbb537be685839790e355fe7f5.exe 2372 0e2bc3bbb537be685839790e355fe7f5.exe 2372 0e2bc3bbb537be685839790e355fe7f5.exe 2372 0e2bc3bbb537be685839790e355fe7f5.exe 2568 powershell.exe 2920 powershell.exe 2264 0e2bc3bbb537be685839790e355fe7f5.exe 2264 0e2bc3bbb537be685839790e355fe7f5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2372 0e2bc3bbb537be685839790e355fe7f5.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2264 0e2bc3bbb537be685839790e355fe7f5.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2920 2372 0e2bc3bbb537be685839790e355fe7f5.exe 30 PID 2372 wrote to memory of 2920 2372 0e2bc3bbb537be685839790e355fe7f5.exe 30 PID 2372 wrote to memory of 2920 2372 0e2bc3bbb537be685839790e355fe7f5.exe 30 PID 2372 wrote to memory of 2920 2372 0e2bc3bbb537be685839790e355fe7f5.exe 30 PID 2372 wrote to memory of 2568 2372 0e2bc3bbb537be685839790e355fe7f5.exe 32 PID 2372 wrote to memory of 2568 2372 0e2bc3bbb537be685839790e355fe7f5.exe 32 PID 2372 wrote to memory of 2568 2372 0e2bc3bbb537be685839790e355fe7f5.exe 32 PID 2372 wrote to memory of 2568 2372 0e2bc3bbb537be685839790e355fe7f5.exe 32 PID 2372 wrote to memory of 2684 2372 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2372 wrote to memory of 2684 2372 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2372 wrote to memory of 2684 2372 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2372 wrote to memory of 2684 2372 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36 PID 2372 wrote to memory of 2264 2372 0e2bc3bbb537be685839790e355fe7f5.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XEYnuaCLo.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XEYnuaCLo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9CFB.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53b664dd6b606c4cf2831a3d65a3d9a9a
SHA1ced9a99ca6d150b02ed3a48266b47866b37394cf
SHA256498a35f7bebbd0d1fca8149d014dfb4b30b31aa28de6e22ded35e13f8bdc9560
SHA512d0a09b44665c7bd57918e5e4fab16eae7cbcbbab7fd6a00fdf1ec1d04553862cd8c4b8c513c3da086409b316a0ec382ca4626171a75bd898089e0c47a9f832ae
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD56093b9b9effe107a1958b5e8775d196a
SHA1f86ede48007734aebe75f41954ea1ef64924b05e
SHA256a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0
SHA5122d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1CNECCBCBCYB6HMR5BHX.temp
Filesize7KB
MD5281c6234e5f94b23aecfc05e2b19056e
SHA171cf6ae32ff4a51bfa193b3e5df51a0cfee47ae5
SHA256113946388ba7e564e90433714801c4fe84b7e0f0d7b8cc272b4d448c2e4844a8
SHA51217ace3d95348d54658876c0656b1e93af3a0fd7fbc82c5035947f4a6df6d316e94cd65a176acf74804eb6f513add6b0b13e48535be1f0405fcb4274a7fc8d937