Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
14-11-2021 06:42
Static task
static1
Behavioral task
behavioral1
Sample
BB483E0CB23EAF8FAAA78E28B5899211.exe
Resource
win7-en-20211104
General
-
Target
BB483E0CB23EAF8FAAA78E28B5899211.exe
-
Size
2.5MB
-
MD5
bb483e0cb23eaf8faaa78e28b5899211
-
SHA1
80d17f4bb56fd99c557fbe72debe057bbf54c7f9
-
SHA256
4a0f711887436496355320a602ea4141f5fceed48cb960e638d9daaee70dd077
-
SHA512
be11b7de917665c1c9f993025e1960f95c3dd03c7ce8146bdc5b4038efbd9a52104780681fdaf6f3d70be8f7c717eeabafb964364b422ed15b4e9add79cc754f
Malware Config
Extracted
njrat
im523
HacKed
0.tcp.ngrok.io:11722
aadcb7aa3c0523a52c6ea2a71565f2d7
-
reg_key
aadcb7aa3c0523a52c6ea2a71565f2d7
-
splitter
|'|'|
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/files/0x000600000001264b-56.dat family_redline behavioral1/files/0x000600000001264b-57.dat family_redline behavioral1/files/0x000600000001264b-59.dat family_redline behavioral1/files/0x0005000000013067-69.dat family_redline behavioral1/files/0x0005000000013067-72.dat family_redline behavioral1/files/0x0005000000013067-71.dat family_redline -
Executes dropped EXE 4 IoCs
Processes:
1121.exe....exeCSGhost-v4.2.1.exeGifanio.exepid Process 900 1121.exe 1400 ....exe 1200 CSGhost-v4.2.1.exe 1776 Gifanio.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
Processes:
....exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aadcb7aa3c0523a52c6ea2a71565f2d7.exe ....exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aadcb7aa3c0523a52c6ea2a71565f2d7.exe ....exe -
Loads dropped DLL 5 IoCs
Processes:
BB483E0CB23EAF8FAAA78E28B5899211.exe1121.exepid Process 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 900 1121.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
....exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\aadcb7aa3c0523a52c6ea2a71565f2d7 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\....exe\" .." ....exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aadcb7aa3c0523a52c6ea2a71565f2d7 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\....exe\" .." ....exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid Process 692 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
Gifanio.exe....exedescription pid Process Token: SeDebugPrivilege 1776 Gifanio.exe Token: SeDebugPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe Token: 33 1400 ....exe Token: SeIncBasePriorityPrivilege 1400 ....exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
BB483E0CB23EAF8FAAA78E28B5899211.exe1121.exe....exedescription pid Process procid_target PID 1632 wrote to memory of 900 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 28 PID 1632 wrote to memory of 900 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 28 PID 1632 wrote to memory of 900 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 28 PID 1632 wrote to memory of 900 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 28 PID 1632 wrote to memory of 1400 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 29 PID 1632 wrote to memory of 1400 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 29 PID 1632 wrote to memory of 1400 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 29 PID 1632 wrote to memory of 1400 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 29 PID 1632 wrote to memory of 1200 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 31 PID 1632 wrote to memory of 1200 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 31 PID 1632 wrote to memory of 1200 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 31 PID 1632 wrote to memory of 1200 1632 BB483E0CB23EAF8FAAA78E28B5899211.exe 31 PID 900 wrote to memory of 692 900 1121.exe 30 PID 900 wrote to memory of 692 900 1121.exe 30 PID 900 wrote to memory of 692 900 1121.exe 30 PID 900 wrote to memory of 692 900 1121.exe 30 PID 900 wrote to memory of 692 900 1121.exe 30 PID 900 wrote to memory of 692 900 1121.exe 30 PID 900 wrote to memory of 692 900 1121.exe 30 PID 900 wrote to memory of 1776 900 1121.exe 32 PID 900 wrote to memory of 1776 900 1121.exe 32 PID 900 wrote to memory of 1776 900 1121.exe 32 PID 900 wrote to memory of 1776 900 1121.exe 32 PID 1400 wrote to memory of 2008 1400 ....exe 34 PID 1400 wrote to memory of 2008 1400 ....exe 34 PID 1400 wrote to memory of 2008 1400 ....exe 34 PID 1400 wrote to memory of 2008 1400 ....exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\BB483E0CB23EAF8FAAA78E28B5899211.exe"C:\Users\Admin\AppData\Local\Temp\BB483E0CB23EAF8FAAA78E28B5899211.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\1121.exe"C:\Users\Admin\AppData\Local\Temp\1121.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\katzecheats.dll3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\Gifanio.exe"C:\Users\Admin\AppData\Local\Temp\Gifanio.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Users\Admin\AppData\Local\Temp\....exe"C:\Users\Admin\AppData\Local\Temp\....exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\....exe" "....exe" ENABLE3⤵PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\CSGhost-v4.2.1.exe"C:\Users\Admin\AppData\Local\Temp\CSGhost-v4.2.1.exe"2⤵
- Executes dropped EXE
PID:1200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
fdde1d3516bc22013fbcbf2fe859b438
SHA1fe37d973f051ec3745116244ac335e6ba27344de
SHA256566706c985369de4895038a444f07b392cd2ac41453af442d99792258a1fd9db
SHA512b5e5930a0f3df61731230018aa69d925591cb349e92901e57d0b0a32642bd2e9b4b39efc40df3d4cdcb8327e6fc35c463de34c862d87abc0c72c29e2e1e2ae3d
-
MD5
fdde1d3516bc22013fbcbf2fe859b438
SHA1fe37d973f051ec3745116244ac335e6ba27344de
SHA256566706c985369de4895038a444f07b392cd2ac41453af442d99792258a1fd9db
SHA512b5e5930a0f3df61731230018aa69d925591cb349e92901e57d0b0a32642bd2e9b4b39efc40df3d4cdcb8327e6fc35c463de34c862d87abc0c72c29e2e1e2ae3d
-
MD5
2571fa1b3ef68ae3a8d31ecf9cc46cf5
SHA1287a43c137932c591a112bd2812f6a438807def6
SHA2568ec8670b61cc47c37d8efb97cf0b601aca8f9317d5e8d86a7fea2ef98d685c9e
SHA512362fd057a9fd94e8c5be3e3b9090bc7fb89758f9c6b151684ccbaf0d67f914743046da7a6e3209aef892590a6ec7e15ef087f883843005f4c55cf5ac1a8c2bdc
-
MD5
0b8c740f448c18aa9124a025c1e44faf
SHA1d854df7a1a799d575d2f35a26d4abd57129d7331
SHA256921665047eb9e62e9896ffe4e95aed16e4c5d47f6a059932bda6c76d7082cd2c
SHA51235e5ca3bd517150eb4525505d4807fd7118045fc069456fb3a3bb6c505e1f1fbef85c831500a0c9f0cb18fb2758f7fba4c2d1ab8166cdd20d47a3a0ad78adac8
-
MD5
12f9f08ac18aa9de5328082627a2411a
SHA105d0e5cdcbee308ea44db8dcc393d3c4362dac3b
SHA2569752828f298e3cb7cc5189540cbc103bc6ffe1441e59b94daa4f0ea1c815c197
SHA512e16c9fab45c6d52b20a795c1450045e26708655745faf3a2b008a8f7a779a3dcb6cdea89e07a3766befc3e5e3a8876f3ce5f35882aaddb5a9cb0d2f71c88aa55
-
MD5
12f9f08ac18aa9de5328082627a2411a
SHA105d0e5cdcbee308ea44db8dcc393d3c4362dac3b
SHA2569752828f298e3cb7cc5189540cbc103bc6ffe1441e59b94daa4f0ea1c815c197
SHA512e16c9fab45c6d52b20a795c1450045e26708655745faf3a2b008a8f7a779a3dcb6cdea89e07a3766befc3e5e3a8876f3ce5f35882aaddb5a9cb0d2f71c88aa55
-
MD5
fdde1d3516bc22013fbcbf2fe859b438
SHA1fe37d973f051ec3745116244ac335e6ba27344de
SHA256566706c985369de4895038a444f07b392cd2ac41453af442d99792258a1fd9db
SHA512b5e5930a0f3df61731230018aa69d925591cb349e92901e57d0b0a32642bd2e9b4b39efc40df3d4cdcb8327e6fc35c463de34c862d87abc0c72c29e2e1e2ae3d
-
MD5
2571fa1b3ef68ae3a8d31ecf9cc46cf5
SHA1287a43c137932c591a112bd2812f6a438807def6
SHA2568ec8670b61cc47c37d8efb97cf0b601aca8f9317d5e8d86a7fea2ef98d685c9e
SHA512362fd057a9fd94e8c5be3e3b9090bc7fb89758f9c6b151684ccbaf0d67f914743046da7a6e3209aef892590a6ec7e15ef087f883843005f4c55cf5ac1a8c2bdc
-
MD5
2571fa1b3ef68ae3a8d31ecf9cc46cf5
SHA1287a43c137932c591a112bd2812f6a438807def6
SHA2568ec8670b61cc47c37d8efb97cf0b601aca8f9317d5e8d86a7fea2ef98d685c9e
SHA512362fd057a9fd94e8c5be3e3b9090bc7fb89758f9c6b151684ccbaf0d67f914743046da7a6e3209aef892590a6ec7e15ef087f883843005f4c55cf5ac1a8c2bdc
-
MD5
0b8c740f448c18aa9124a025c1e44faf
SHA1d854df7a1a799d575d2f35a26d4abd57129d7331
SHA256921665047eb9e62e9896ffe4e95aed16e4c5d47f6a059932bda6c76d7082cd2c
SHA51235e5ca3bd517150eb4525505d4807fd7118045fc069456fb3a3bb6c505e1f1fbef85c831500a0c9f0cb18fb2758f7fba4c2d1ab8166cdd20d47a3a0ad78adac8
-
MD5
12f9f08ac18aa9de5328082627a2411a
SHA105d0e5cdcbee308ea44db8dcc393d3c4362dac3b
SHA2569752828f298e3cb7cc5189540cbc103bc6ffe1441e59b94daa4f0ea1c815c197
SHA512e16c9fab45c6d52b20a795c1450045e26708655745faf3a2b008a8f7a779a3dcb6cdea89e07a3766befc3e5e3a8876f3ce5f35882aaddb5a9cb0d2f71c88aa55