Analysis

  • max time kernel
    118s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 01:13

General

  • Target

    3d41c549e3605066d3308fe88c6c4674840a2fae493f53ccd777f4c40744caf5.exe

  • Size

    137KB

  • MD5

    4ec07b8e03c6decbd6a69fd6205134cc

  • SHA1

    d7e39255e93b6b45e71accf53ae063973d317c79

  • SHA256

    3d41c549e3605066d3308fe88c6c4674840a2fae493f53ccd777f4c40744caf5

  • SHA512

    ecd9cb4b3ed871d31055d6670b9c7729c43f14015a310365de4b57493a56f8eaed290a74b01b81687747a3348da39c786783260076dbe4c43ec3d87cd18ba6e6

  • SSDEEP

    3072:bzWhTc8VndpIVANtDI0wMuedstt+R1ATIiQKRMs6x:byhTc8TpIVANtnwMuedTHAbRM

Malware Config

Extracted

Family

redline

Botnet

tst

C2

194.55.186.87:4483

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d41c549e3605066d3308fe88c6c4674840a2fae493f53ccd777f4c40744caf5.exe
    "C:\Users\Admin\AppData\Local\Temp\3d41c549e3605066d3308fe88c6c4674840a2fae493f53ccd777f4c40744caf5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      #by-unknown
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2216

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a024dcda477c7d6eacb1c50ad7319d06

    SHA1

    3973a6c045fda21a1fd32014457e6b5e527a6c18

    SHA256

    8116612eb4b27487c6f150f3f480f2003fea59c65037a7e6098f484880ce3f5f

    SHA512

    cde0d7d2226a2a3ddd2e13c5762eb07c0374ca34ffee99b30a3288c39e5ff2245b5cc47f624065f472e455705657cbb581f90bba8edab32ba3ead7696ff4dd76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    293149a8e301627b04c31455e652bb9a

    SHA1

    1e04e05ed46e2aa9b9edd65f160bbe05d24e5fa6

    SHA256

    08058db7fdad0a02cd14e18e18aca2feb86a51d2348aab137de4808398f1df3b

    SHA512

    92ff21d32e494b04f986165e3fabf0334b4bb9f4ab0a8e1e061b2bd94f94745c71b79fe7d07692ff912a1803c862fbf1d61e9fdfb9ecdab2bdafc6e46654d0db

  • C:\Users\Admin\AppData\Local\Temp\Tar3D63.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp4006.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp400C.tmp
    Filesize

    92KB

    MD5

    69b4e9248982ac94fa6ee1ea6528305f

    SHA1

    6fb0e765699dd0597b7a7c35af4b85eead942e5b

    SHA256

    53c5e056da67d60a3b2872f8d4bda857f687be398ed05ed17c102f4c4b942883

    SHA512

    5cb260ab12c8cf0f134c34ae9533ac06227a0c3bdb9ad30d925d3d7b96e6fae0825c63e7db3c78852dc2a053767bbcfdd16898531509ffadade2dd7149f6241d

  • memory/2212-1-0x0000000000B30000-0x0000000000B58000-memory.dmp
    Filesize

    160KB

  • memory/2212-0-0x000000007498E000-0x000000007498F000-memory.dmp
    Filesize

    4KB

  • memory/2216-5-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2216-11-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2216-9-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2216-4-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2216-2-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2216-3-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2216-6-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2216-7-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB