Overview
overview
10Static
static
3AlphaFS.dll
windows7-x64
1AlphaFS.dll
windows10-2004-x64
1Extreme.Net.dll
windows7-x64
1Extreme.Net.dll
windows10-2004-x64
1Metamask S...or.exe
windows7-x64
3Metamask S...or.exe
windows10-2004-x64
10Ookii.Dialogs.Wpf.dll
windows7-x64
1Ookii.Dialogs.Wpf.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
AlphaFS.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AlphaFS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Extreme.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Extreme.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Metamask Seed Generator.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Metamask Seed Generator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ookii.Dialogs.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Ookii.Dialogs.Wpf.dll
Resource
win10v2004-20241007-en
General
-
Target
Metamask Seed Generator.exe
-
Size
590KB
-
MD5
e883f34b766540694ea524e1f8be3958
-
SHA1
e4bc2c5cd58e2ecf9ec30768558baf29f73690d7
-
SHA256
8fa48d81788bbd2b1ad77fbb615a5cd3084ed94badc0b9f58797c6b09bd251be
-
SHA512
c046217c5f688eec693b4e5c91d5871c8b78887aa4a9f087a7469ae83b01169ecf3c17244b19f6b2e5d3e1aa231e6c164303bbdd9bb3723addbc0b5f86c95a17
-
SSDEEP
12288:eicwvLD0hg8gGXf55nA6Lpa1dlgfTgRVbusK7D+AaIG6z9o7TSaIva9s:eicMLD0K0bA60neTgZTSaO
Malware Config
Extracted
redline
Youtube
tecnotrendgame.ddns.net:62099
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral6/memory/1196-7-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral6/memory/1196-7-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3720 set thread context of 1196 3720 Metamask Seed Generator.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Metamask Seed Generator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Metamask Seed Generator.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe 3720 Metamask Seed Generator.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3720 Metamask Seed Generator.exe Token: SeDebugPrivilege 1196 Metamask Seed Generator.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3720 wrote to memory of 1776 3720 Metamask Seed Generator.exe 88 PID 3720 wrote to memory of 1776 3720 Metamask Seed Generator.exe 88 PID 3720 wrote to memory of 1776 3720 Metamask Seed Generator.exe 88 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89 PID 3720 wrote to memory of 1196 3720 Metamask Seed Generator.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"2⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"C:\Users\Admin\AppData\Local\Temp\Metamask Seed Generator.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1196
-