Analysis
-
max time kernel
114s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
Invoice#577595955858.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Invoice#577595955858.pdf.exe
Resource
win10v2004-20230220-en
General
-
Target
Invoice#577595955858.pdf.exe
-
Size
2.0MB
-
MD5
a687593ca5cf9d3fee446f7925272818
-
SHA1
d8ec9e79259cb12c088a668afe34c4305f187c61
-
SHA256
cbda14adc5ddc1c7dcaab3718dd25805b8c0b720db8678715a754754a214e05f
-
SHA512
55250b2019b4ee49b8eec2b83fa48d178f2395afd97744f806c795f56d26a39d2be03f61af38ebea73cf4e5c066709026ae4073bc95e3e37062cdc90f14a6be9
-
SSDEEP
49152:PB0m0c8A4WdMLE8Q7P0A4iDruQzwXOhR0kLZFs7+:Z07c8r1E8rA4iDruQzwidi7+
Malware Config
Extracted
redline
Ijele
45.87.63.164:15256
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/1824-430-0x0000000000C00000-0x0000000001309000-memory.dmp family_redline behavioral2/memory/1824-433-0x0000000000C00000-0x0000000000C1E000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/1824-430-0x0000000000C00000-0x0000000001309000-memory.dmp family_sectoprat behavioral2/memory/1824-433-0x0000000000C00000-0x0000000000C1E000-memory.dmp family_sectoprat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Invoice#577595955858.pdf.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation dc crypt.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 6 IoCs
pid Process 4644 dc crypt.exe 2560 tcqsmsla.exe 2184 sokxsghrqu.exe 3416 RegSvcs.exe 3440 RegSvcs.exe 1824 RegSvcs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run tcqsmsla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cica\\tcqsmsla.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\cica\\ejmvi.xml" tcqsmsla.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run sokxsghrqu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\trhg\\SOKXSG~1.EXE C:\\Users\\Admin\\AppData\\Local\\Temp\\trhg\\fwxsq.icm" sokxsghrqu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2560 set thread context of 3416 2560 tcqsmsla.exe 98 PID 2560 set thread context of 3440 2560 tcqsmsla.exe 97 PID 2184 set thread context of 1824 2184 sokxsghrqu.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wscript.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1824 RegSvcs.exe 1824 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3440 RegSvcs.exe 3416 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1824 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3416 RegSvcs.exe 3440 RegSvcs.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1308 wrote to memory of 4644 1308 Invoice#577595955858.pdf.exe 85 PID 1308 wrote to memory of 4644 1308 Invoice#577595955858.pdf.exe 85 PID 1308 wrote to memory of 4644 1308 Invoice#577595955858.pdf.exe 85 PID 1308 wrote to memory of 1504 1308 Invoice#577595955858.pdf.exe 87 PID 1308 wrote to memory of 1504 1308 Invoice#577595955858.pdf.exe 87 PID 1308 wrote to memory of 1504 1308 Invoice#577595955858.pdf.exe 87 PID 4644 wrote to memory of 2720 4644 dc crypt.exe 88 PID 4644 wrote to memory of 2720 4644 dc crypt.exe 88 PID 4644 wrote to memory of 2720 4644 dc crypt.exe 88 PID 2720 wrote to memory of 2560 2720 wscript.exe 94 PID 2720 wrote to memory of 2560 2720 wscript.exe 94 PID 2720 wrote to memory of 2560 2720 wscript.exe 94 PID 1504 wrote to memory of 2184 1504 wscript.exe 95 PID 1504 wrote to memory of 2184 1504 wscript.exe 95 PID 1504 wrote to memory of 2184 1504 wscript.exe 95 PID 2560 wrote to memory of 3440 2560 tcqsmsla.exe 97 PID 2560 wrote to memory of 3440 2560 tcqsmsla.exe 97 PID 2560 wrote to memory of 3440 2560 tcqsmsla.exe 97 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3416 2560 tcqsmsla.exe 98 PID 2560 wrote to memory of 3440 2560 tcqsmsla.exe 97 PID 2560 wrote to memory of 3440 2560 tcqsmsla.exe 97 PID 2184 wrote to memory of 1824 2184 sokxsghrqu.exe 100 PID 2184 wrote to memory of 1824 2184 sokxsghrqu.exe 100 PID 2184 wrote to memory of 1824 2184 sokxsghrqu.exe 100 PID 2184 wrote to memory of 1824 2184 sokxsghrqu.exe 100 PID 2184 wrote to memory of 1824 2184 sokxsghrqu.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice#577595955858.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Invoice#577595955858.pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\temp\trhg\dc crypt.exe"C:\Users\Admin\AppData\Local\temp\trhg\dc crypt.exe" 伊莎è´æ‹‰25美分硬å¸æ˜¯1893å¹´é“¸é€ çš„ä¸€ç§ç¾Žå›½çºªå¿µå¸ï¼Œç”±è”邦国会应èŠåŠ 哥哥伦布纪念åšè§ˆä¼šå¥³å£«ç»ç†äººè‘£äº‹ä¼šçš„请求授æƒå‘行。2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" Update-tj.v.vbe3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\cica\tcqsmsla.exe"C:\Users\Admin\AppData\Local\Temp\cica\tcqsmsla.exe" ejmvi.xml4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3416
-
-
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" Update-so.i.vbe2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\trhg\sokxsghrqu.exe"C:\Users\Admin\AppData\Local\Temp\trhg\sokxsghrqu.exe" fwxsq.icm3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
116.1MB
MD5ef3f666a79511e575d4b335fe4aa2489
SHA1664a9cb92fa93195d5a8fa88f5a1d1dddcfd38c8
SHA256986c822cc70b61eeadb7ba968e79e5dafd4fa2f16155b61b1a67dde9eb1e8ef9
SHA5125ff80adf045c7f546a4b90b5c0c29c123873bec7d32a693066ffee1fdc44f5e3da7712c1ac0b95a0d1b0d457b16e33b78376cad86eb9d304d910b7ef5d3f85cc
-
Filesize
32KB
MD5e86b6473b90a583bf6ee5c38b7238045
SHA1e809fb1485345acf096947286a149197c133f433
SHA2563fb7d5b273faeada616dc638385f28f67886297292919fd6c76c271cd0ea4cb4
SHA512cf7b33fdccc891ca42c9dd5b8a41fd255ac49f90221f7aafbe03397d29a07f0b05e99eb87066abd75fe710fc001efd6788844dbfaec18151d2ec27d323e553ce
-
Filesize
995KB
MD5b1487180da402d46e06e1d02ef1340f6
SHA183dfd4d9e36951e9bd39bccc4c8a0aa6c8549400
SHA2565731c376bef6eaac57fff80d13fff95af02a4c2db625bebde6394ab57ef3f4ea
SHA51286b5f368bad0e8e0a14415c87d0ba15783c2f3ede10402c54875f64b8bb3ee924fbf357841b494fa38cc552e05b9b32a1817e5c0a4e739fb32598395b4200013
-
Filesize
995KB
MD5b1487180da402d46e06e1d02ef1340f6
SHA183dfd4d9e36951e9bd39bccc4c8a0aa6c8549400
SHA2565731c376bef6eaac57fff80d13fff95af02a4c2db625bebde6394ab57ef3f4ea
SHA51286b5f368bad0e8e0a14415c87d0ba15783c2f3ede10402c54875f64b8bb3ee924fbf357841b494fa38cc552e05b9b32a1817e5c0a4e739fb32598395b4200013
-
Filesize
946KB
MD5af730bad6f08daed98f057702509532b
SHA1ac5adc176b47a61c5cadb333c80c9fd8313ac78d
SHA2564007af43cdd926f8ae085a8b29f5a55d45b26edc3c4600b7868c777c5b97f10e
SHA51252b491f1afb53283cf78992cfdfd7c628b1187b0467f8bb79743b337a5d85419e8ae35125f1d9d5e669370a5e2c26f41ea9be5e958a2c884fb6d83be29aefba5
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5ec9dc2b3a8b24bcbda00502af0fedd51
SHA1b555e8192e4aef3f0beb5f5381a7ad7095442e8d
SHA2567378950f042c94b08cc138fd8c02e41f88b616cd17f23c0c06d4e3ca3e2937d2
SHA5129040813d94956771ce06cdc1f524e0174c481cdc0e1d93cbf8a7d76dd321a641229e5a9dd1c085e92a9f66d92b6d7edc80b77cd54bb8905852c150234a190194
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
31KB
MD5695fb78c59d16bd586cfbe22211b8b6c
SHA1ee501a84cbd984d67bf9ac0ec2531edd87b71687
SHA25619a4534d572d403d0f45a9f259f887378fc3c98714ff5056fd985a068724b27c
SHA512794f915c4fce34153c64005ff96e3071df839fc4a0ae9945c71ec8cd0e5cbcab260e9ec2507e1245774b2b32c23843b8ea60f6534490522caab908b3fd57e895
-
Filesize
166KB
MD55d7781db353e6558585edddd657be403
SHA1da7cf48541c6e4165420d5a943cbdf860d0bc779
SHA2567476fbd0eadbcaf6f13032f376ea0aabaecc9516482e09c51fbf86be7191719d
SHA512f45c969855a1db2c3993dc96db1bd4ceac3e96f8a8679e841c827329e2cac06a99be264fb7802fb782693b509a2fdca9b86b7fd08dd9bc97cb76a4d88ca649c0
-
Filesize
1.2MB
MD5cf265d67b5354040f3389f142f2b05d6
SHA1f339f7232465aa6aad2d9dd5388e29c9c6ed4cc9
SHA256b778a6cae48d031fc25f8fde9fed1bc570157c6f63d38c69fff82eaa51badb08
SHA51254ee16677bb83f13d7171104a10f16202b9affd614a6cc767fdfd421ba9b04176b7335555150d7a7c1a846d22181549f6027781b062b2512378d02a169b9cdb7
-
Filesize
1.2MB
MD5cf265d67b5354040f3389f142f2b05d6
SHA1f339f7232465aa6aad2d9dd5388e29c9c6ed4cc9
SHA256b778a6cae48d031fc25f8fde9fed1bc570157c6f63d38c69fff82eaa51badb08
SHA51254ee16677bb83f13d7171104a10f16202b9affd614a6cc767fdfd421ba9b04176b7335555150d7a7c1a846d22181549f6027781b062b2512378d02a169b9cdb7
-
Filesize
85.0MB
MD5d80c7adcc499c3ae1e1633e8b2421728
SHA1da3f2a17a78319f29344969b14810562278f33ef
SHA256faf5a3d9eafda1a8014d32eeb70d714ed32a9bc2a6061d37d9c075dec9ac8ef9
SHA51205ef24018988e69ea558b37be491a522245132c78babb70f865e00c987427ddf1f3c40b59b627c7a659911ba72fbc2459602fa54b3780617a5f6aea282967a58
-
Filesize
995KB
MD5fa25e573dcd18b3c056e5c55f9a61b2c
SHA1e79c7666327bdf858ce0c50839b48236b65205a5
SHA2569c6c73bf551611ec32e96d18e0f2e36c8b68ce3840f6e5e5b40cfd3a351ff8fd
SHA51234ec811f62942c5a0c6d92e903375a6722490ad610a221041bb81e3fa5298a59e03d8006e9c77b8ce9d3cdeb06506dcda70dce080b39aad685cf2268e2432204
-
Filesize
995KB
MD5fa25e573dcd18b3c056e5c55f9a61b2c
SHA1e79c7666327bdf858ce0c50839b48236b65205a5
SHA2569c6c73bf551611ec32e96d18e0f2e36c8b68ce3840f6e5e5b40cfd3a351ff8fd
SHA51234ec811f62942c5a0c6d92e903375a6722490ad610a221041bb81e3fa5298a59e03d8006e9c77b8ce9d3cdeb06506dcda70dce080b39aad685cf2268e2432204
-
Filesize
49KB
MD5be8316099e11ffbfcf93b32cd7c380b2
SHA11949e8324e26ec49532ba5f03adee3b3913c69ee
SHA2566107f65051ce604f5d37817fc4bc3b27211203f46b2c866580018a2e0eaa1a43
SHA512bcc2c94aa572867159e2c70830d2dd1540216e3d0eebd027b9af7a7148a5555dbad225138dfaa8365756a26a0d9648206eab3f2ede34bcd5ad266474bef49d41
-
Filesize
77KB
MD55ed190801877967155ccf83aeb00795d
SHA17dd2de6b605a97c17d9d0e74e18602cfb67d9d4b
SHA2566e4349189d6dae37815b94457f71998216090789574d898a46acc34196c9c20c
SHA512740bfc09695f3f731d521ef32c5cbee731197c7341896d540c6eb60765e33128007cd95612a9e47dcf651e3794edfb68235ac5c4456ad7a9e8d883574a5af3cb
-
Filesize
1.2MB
MD5cf265d67b5354040f3389f142f2b05d6
SHA1f339f7232465aa6aad2d9dd5388e29c9c6ed4cc9
SHA256b778a6cae48d031fc25f8fde9fed1bc570157c6f63d38c69fff82eaa51badb08
SHA51254ee16677bb83f13d7171104a10f16202b9affd614a6cc767fdfd421ba9b04176b7335555150d7a7c1a846d22181549f6027781b062b2512378d02a169b9cdb7