Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 06:28

General

  • Target

    0C7129CC873A7AE0A20B38275F792EB8.exe

  • Size

    125KB

  • MD5

    0c7129cc873a7ae0a20b38275f792eb8

  • SHA1

    d182944e585357d572ff7f04f31ea8cd633f7f83

  • SHA256

    0ffabbcd65e9d16a98cfd6573e430faef64da2140408741e6ca69fa33ccd7e4c

  • SHA512

    9f5d5fb23d0efa317d321d6a37e24c6ee97005dd70ee8a2d7116ae94243e339a7fcbf5c41d7edda96bdda2042642a8ce03fdde53a6bf77c9dff358edb6109b16

  • SSDEEP

    3072:/6V/R6cUvnDmwPU9101LS8U5wUBeixhRk+XbXT9PsHP:CNR6JPDmwPUbi05wYeH+XbZP2

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.168.67.9:57395

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0C7129CC873A7AE0A20B38275F792EB8.exe
    "C:\Users\Admin\AppData\Local\Temp\0C7129CC873A7AE0A20B38275F792EB8.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '0C7129CC873A7AE0A20B38275F792EB8.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2580
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\0C7129CC873A7AE0A20B38275F792EB8.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2704

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    515ecadaeec6df213546c6768106423c

    SHA1

    1f8083f275a5744ad81851de7df4555b2639f911

    SHA256

    8fd3edfbc4b9d5d941665cc9d393c32204a2b94baa0fb0caace91b145757c20b

    SHA512

    aff4d989518a4e5384915861cd182e9876cfebec4339be7f187c29ca1d3d72249493390ab7bd5464527677d49349063e35d5646f559a7a9b1c83a74d2b87cc1e

  • C:\Users\Admin\AppData\Local\Temp\Cab5478.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar555A.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp5C2C.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp5C42.tmp
    Filesize

    92KB

    MD5

    cca646afddab881d02bb60864ff72e23

    SHA1

    25b462e62a0219857cc854f6433e8acea77e3dbc

    SHA256

    c7223e5de0b0db22b3e193b2d48215816c75472ccdf9330a0ab66d4731b2e49e

    SHA512

    c35da6cfe5e4a3f887a876b38b4e5b9e6d5c035cf8d6f20158f89ee14a196941fd6a29faa1f90f64cd253556536670773ec15cd358014d994483a8745c41587d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    ac0813d85fc300591ff5c8f2b268df17

    SHA1

    35ede1d45a2aff2949a363d2455bd5ffea4f24db

    SHA256

    6c3918f4a02e1312b16ee93bd5bb562ea080d29aaa21f5f81acb968fa0494ea5

    SHA512

    7f9a7467140c028fc7ea1ab4c9736951fb88e9915ce5d631e66d8e34d738ef66a60898b61fe1e325c0460a4f80b4fa9fbd99ce1ea015072db7b2c9b1d3677fe5

  • memory/1996-174-0x000007FEF56F0000-0x000007FEF60DC000-memory.dmp
    Filesize

    9.9MB

  • memory/1996-173-0x000007FEF56F3000-0x000007FEF56F4000-memory.dmp
    Filesize

    4KB

  • memory/1996-17-0x000000001AA50000-0x000000001AA6E000-memory.dmp
    Filesize

    120KB

  • memory/1996-0-0x000007FEF56F3000-0x000007FEF56F4000-memory.dmp
    Filesize

    4KB

  • memory/1996-2-0x000007FEF56F0000-0x000007FEF60DC000-memory.dmp
    Filesize

    9.9MB

  • memory/1996-1-0x0000000000AE0000-0x0000000000B06000-memory.dmp
    Filesize

    152KB

  • memory/2580-8-0x000000001B760000-0x000000001BA42000-memory.dmp
    Filesize

    2.9MB

  • memory/2580-9-0x0000000002250000-0x0000000002258000-memory.dmp
    Filesize

    32KB

  • memory/2580-7-0x0000000002920000-0x00000000029A0000-memory.dmp
    Filesize

    512KB

  • memory/2704-16-0x00000000026A0000-0x00000000026A8000-memory.dmp
    Filesize

    32KB

  • memory/2704-15-0x000000001B700000-0x000000001B9E2000-memory.dmp
    Filesize

    2.9MB