Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 01:28

General

  • Target

    66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe

  • Size

    505KB

  • MD5

    47278783745b4d089155c06c75a660fb

  • SHA1

    d79a6323b88953da2a794e76cb80c855f6bbedc9

  • SHA256

    66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f

  • SHA512

    0d26598b717cac1b8de6432ed6c933b85b36da06cbaf2ddc06d52f7bb80dcb931850a18c6c87c02b173c024be60b4a9c83573c9368fea3ac482e2325f390c777

  • SSDEEP

    12288:zhMnv8pgJhX7ZspQ6Izq08jG5iBk8BJAzlHJkR:S7H7zq1jGUFBepU

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.70:55615

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe
    "C:\Users\Admin\AppData\Local\Temp\66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zrmQDTlZlh.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2480
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zrmQDTlZlh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB645.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2852
    • C:\Users\Admin\AppData\Local\Temp\66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe
      "C:\Users\Admin\AppData\Local\Temp\66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe"
      2⤵
        PID:2532
      • C:\Users\Admin\AppData\Local\Temp\66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe
        "C:\Users\Admin\AppData\Local\Temp\66fcfbb25cb0e50b4cd85852ef21ddbf36e4c19a36cffef9e5f3e22c04b4290f.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2548

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Persistence

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Defense Evasion

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      740cd779c38c45cf8b13e774298ef3fb

      SHA1

      65d251b755a3702e4033bddcd4c4a767997003a1

      SHA256

      4252ea487a450ea4fa3a404b121548e06b84e3440ae0e6d899ea4dc4d7a723e5

      SHA512

      15d0b96189cf549bb520b7c4c98f6ea3475ace7c319e4aa7f7f3e931faefa26d74edd253bb7fa9f584c8e3d8b6eff58a86050407febe49e67b7501edf1727012

    • C:\Users\Admin\AppData\Local\Temp\CabD819.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarD8F6.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\tmpB645.tmp
      Filesize

      1KB

      MD5

      7c7bb6c129d72ab0f36231f259129a23

      SHA1

      f797671185ac8592a33bd4c6f5477412ba0880e3

      SHA256

      364a01bd3a73efc9836fc969c1bb171ea746bb3d32ca8bbbdd7bacb76bd2cea8

      SHA512

      0f4f144c74833e1edf684c6ed3cd3776f8025d1013abdeb030ba75b1935b8a2ed047710a581f02975210242533e3145dd9fb856fc6b62c6f3178e4ce4eb2fe1c

    • C:\Users\Admin\AppData\Local\Temp\tmpDE7D.tmp
      Filesize

      46KB

      MD5

      02d2c46697e3714e49f46b680b9a6b83

      SHA1

      84f98b56d49f01e9b6b76a4e21accf64fd319140

      SHA256

      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

      SHA512

      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

    • C:\Users\Admin\AppData\Local\Temp\tmpDEC2.tmp
      Filesize

      92KB

      MD5

      9da83032394b54144d4c2a3ae7cdfbce

      SHA1

      b85d3a0ff5006c2c1d7270500d7849d373f597b7

      SHA256

      90708648aa3da58b81497a0bc395507906d89d39583d6ad8dcb4e0d417bdc084

      SHA512

      17cb5c7cf40433e75a6240c2eaffd22bd77f5076c1904041670dd8609769e9c970499f85fc18354782c548fc0739df954dc44a9e1ff40d427a5b4f0d278417f3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      cd246b70dcf3dabe547edd2f674bdce1

      SHA1

      5ec967880fac7673bd88e4fb229c774dbfa0e815

      SHA256

      7d1a1a0f69e0d3e93ccd7bd0771e80eea3ec02cd022af90bd5a97c9c6f82d6ed

      SHA512

      0dd341c970b87767aa35d6a2f29a193cb8070c50faa8b1cfe98dfefd32dbed1df8a0e652093140e7476b0bacfdc016ead5678057a23477b6e776bb7413a93ca0

    • memory/2200-33-0x0000000074510000-0x0000000074BFE000-memory.dmp
      Filesize

      6.9MB

    • memory/2200-0-0x000000007451E000-0x000000007451F000-memory.dmp
      Filesize

      4KB

    • memory/2200-6-0x00000000004B0000-0x00000000004BC000-memory.dmp
      Filesize

      48KB

    • memory/2200-1-0x0000000000890000-0x0000000000910000-memory.dmp
      Filesize

      512KB

    • memory/2200-2-0x0000000074510000-0x0000000074BFE000-memory.dmp
      Filesize

      6.9MB

    • memory/2200-7-0x00000000051A0000-0x0000000005200000-memory.dmp
      Filesize

      384KB

    • memory/2200-3-0x0000000000800000-0x0000000000876000-memory.dmp
      Filesize

      472KB

    • memory/2200-4-0x0000000000210000-0x0000000000222000-memory.dmp
      Filesize

      72KB

    • memory/2200-5-0x00000000004A0000-0x00000000004A8000-memory.dmp
      Filesize

      32KB

    • memory/2548-22-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2548-30-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2548-32-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2548-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2548-29-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2548-26-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2548-24-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2548-20-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB