Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    23-06-2024 00:46

General

  • Target

    8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895.exe

  • Size

    508KB

  • MD5

    531cdd1ad3c8459531e4d4300b8df171

  • SHA1

    5bb607a26c03b9ee81dd1f5036dfe4f7960ef9c9

  • SHA256

    8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895

  • SHA512

    ff0c58321e87bea8e3e34c759b034548d6d8103cbc811707218af2a72d6eab07599d57838f4f415fc2861280e9d7ab472c145f39a89a2df334d361be2a6f3b05

  • SSDEEP

    12288:L8H5wYCWeWncJn5nS9vPRnYdBz7zUY/Ag/jZ1ynMAVMpkR:gSYC0ImvPszcYXl8/M0

Malware Config

Extracted

Family

redline

Botnet

Hanna

C2

185.216.70.15:65012

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895.exe
    "C:\Users\Admin\AppData\Local\Temp\8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2300
    • C:\Users\Admin\AppData\Local\Temp\8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895.exe
      "C:\Users\Admin\AppData\Local\Temp\8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895.exe"
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2088

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    cd4e328ceeb4187d572f9d04b47ee2f5

    SHA1

    21fa866b876ebd44dbaf9e95374cc4ba7fb64d22

    SHA256

    7901519df8a527441eb8835d018f5d778fcce483ece3f91846cbf6f8413ca5ab

    SHA512

    01699fdee9a135fffe6c1e54f0016c6c2294120a64e1e167afc7d3551c100eb5c09ff8d89f061fb230de6f531c1d5546a8011e7600f8a0fc966ad9cea522a592

  • C:\Users\Admin\AppData\Local\Temp\Cab8AA.tmp
    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Users\Admin\AppData\Local\Temp\Tar91E.tmp
    Filesize

    160KB

    MD5

    7186ad693b8ad9444401bd9bcd2217c2

    SHA1

    5c28ca10a650f6026b0df4737078fa4197f3bac1

    SHA256

    9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

    SHA512

    135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

  • C:\Users\Admin\AppData\Local\Temp\tmp537F.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp5395.tmp
    Filesize

    92KB

    MD5

    3a2feb999ad792e015e25e8c38908eab

    SHA1

    c85cc871fa901f173c9a47219cd637af24580916

    SHA256

    f82d27cccefad6d38fe3943e61f6f5dd926348adf6bba720e58a1b1f9b66ca6b

    SHA512

    b34ce1bd162fc8e9c61dbb92f3d208d1236bfff7b53cecf62b2fc581d09ab8e544687de95aeff2de7ef9e8896353c57238725069c0b6ee979146dd0e497dce16

  • memory/2088-87-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2088-88-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2088-94-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2088-96-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2088-89-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2088-86-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2088-92-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2088-90-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2516-85-0x0000000004E50000-0x0000000004EB0000-memory.dmp
    Filesize

    384KB

  • memory/2516-82-0x0000000000350000-0x0000000000362000-memory.dmp
    Filesize

    72KB

  • memory/2516-0-0x000000007491E000-0x000000007491F000-memory.dmp
    Filesize

    4KB

  • memory/2516-84-0x00000000006D0000-0x00000000006DC000-memory.dmp
    Filesize

    48KB

  • memory/2516-83-0x00000000006C0000-0x00000000006C8000-memory.dmp
    Filesize

    32KB

  • memory/2516-97-0x0000000074910000-0x0000000074FFE000-memory.dmp
    Filesize

    6.9MB

  • memory/2516-81-0x00000000056F0000-0x0000000005766000-memory.dmp
    Filesize

    472KB

  • memory/2516-2-0x0000000074910000-0x0000000074FFE000-memory.dmp
    Filesize

    6.9MB

  • memory/2516-1-0x0000000000F90000-0x0000000001012000-memory.dmp
    Filesize

    520KB