Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 19:06

General

  • Target

    568967433c84d1fd3068fae82d24d750.exe

  • Size

    504KB

  • MD5

    568967433c84d1fd3068fae82d24d750

  • SHA1

    030204e478cd66d7234850d9ef95f9b52a2dc476

  • SHA256

    35bc174139612d416a683cb302b450d21b1eb2a8cc23d0fb22d0152b35d585c6

  • SHA512

    13481aee6d2fdc5666f4febfa33a370c8590bb712be6f75bf7d212e4041f0c625b2068aad1f265254a62c4408c04070f911d378a5014061aaccf9f8c9114db75

  • SSDEEP

    12288:VX0AXmuz7sdJoJmrTNj/RQI1UrYNw9KlRVjd1z+n/Xfu+XHTmyDLNkR:ZIXx/RQIq1olRVBcRXhD0

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.79:55615

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\568967433c84d1fd3068fae82d24d750.exe
    "C:\Users\Admin\AppData\Local\Temp\568967433c84d1fd3068fae82d24d750.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\568967433c84d1fd3068fae82d24d750.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2684
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rPXxwx.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2740
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rPXxwx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6519.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2732
    • C:\Users\Admin\AppData\Local\Temp\568967433c84d1fd3068fae82d24d750.exe
      "C:\Users\Admin\AppData\Local\Temp\568967433c84d1fd3068fae82d24d750.exe"
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2492

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    dd0ff8bb420c536002c9befb83039f11

    SHA1

    5eb9821c8854f76bd1d3225dde612ae912509e1d

    SHA256

    eff1e3fce23224e0bff77241eed4c31714221deecbbb18bc64e47a90f9860d1c

    SHA512

    3bff17d63b65e674208f157bc1c0c5577a9ed441b2feae6d8332d5aec451045dbbd52fe64fc0ee970839e37fa1f743cd0faf993d036b9033db7786694e5a89b3

  • C:\Users\Admin\AppData\Local\Temp\Cab8893.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar8916.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp6519.tmp
    Filesize

    1KB

    MD5

    634a2376f7637a0fcef84b03c509ad08

    SHA1

    9a8bda834bc73a77ee9007f369f307dd904ce79b

    SHA256

    1bdcb0910fcbfe6797946de04ed3e49febe4631311b0a87d4db2f422b277311d

    SHA512

    f3b31e94793865d09cf4c6bf15499ee64858192c1ed2d4c25ae6a5b90e523018445ded65e5baa581f5c27a05e185d110328864a9936d0faee13678e93e698264

  • C:\Users\Admin\AppData\Local\Temp\tmp90D3.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp90D9.tmp
    Filesize

    92KB

    MD5

    5f914a013176785e26d70d07234c605c

    SHA1

    5336e9ed6aeb682b46a0472f4f80ec24c4504210

    SHA256

    72b56bbce7e5e07702bf46a002c75cb3a8994fd390b190b989628d387d21975b

    SHA512

    103eff502bec0df1a36bd19a97ca1d10cc34da2183480fe146434ec916020011c8af003b66ab5f6f4886e95b21749be8d8c3c3ebf3ae1b2e5c6db216e8b4e1b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    510e2ca405396c2914b0976fa2d6381d

    SHA1

    4b077193fdb95a1f62cee03e6442a2b0c2577dd6

    SHA256

    1ee29af118d53c2fa1002509f80edfc85b325a82a63b6e6a0af062f9431f0523

    SHA512

    7fa5320b79b2610e820aa66f1bfe6e9c2370cfe90c71b55a3e2c809f153d14ba903ba0d69c5892ab416bff3ea46ab9b280282867b2221edf21435333b64978a6

  • memory/1492-33-0x0000000074E20000-0x000000007550E000-memory.dmp
    Filesize

    6.9MB

  • memory/1492-0-0x0000000074E2E000-0x0000000074E2F000-memory.dmp
    Filesize

    4KB

  • memory/1492-1-0x0000000000140000-0x00000000001C0000-memory.dmp
    Filesize

    512KB

  • memory/1492-2-0x0000000074E20000-0x000000007550E000-memory.dmp
    Filesize

    6.9MB

  • memory/1492-3-0x0000000004E00000-0x0000000004E76000-memory.dmp
    Filesize

    472KB

  • memory/1492-7-0x0000000005130000-0x0000000005190000-memory.dmp
    Filesize

    384KB

  • memory/1492-4-0x0000000000430000-0x0000000000442000-memory.dmp
    Filesize

    72KB

  • memory/1492-5-0x0000000000650000-0x0000000000658000-memory.dmp
    Filesize

    32KB

  • memory/1492-6-0x0000000000660000-0x000000000066C000-memory.dmp
    Filesize

    48KB

  • memory/2492-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2492-32-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2492-30-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2492-22-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2492-24-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2492-29-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2492-26-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2492-20-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB