Analysis

  • max time kernel
    114s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 07:41

General

  • Target

    Invoice#577595955858.pdf.exe

  • Size

    2.0MB

  • MD5

    a687593ca5cf9d3fee446f7925272818

  • SHA1

    d8ec9e79259cb12c088a668afe34c4305f187c61

  • SHA256

    cbda14adc5ddc1c7dcaab3718dd25805b8c0b720db8678715a754754a214e05f

  • SHA512

    55250b2019b4ee49b8eec2b83fa48d178f2395afd97744f806c795f56d26a39d2be03f61af38ebea73cf4e5c066709026ae4073bc95e3e37062cdc90f14a6be9

  • SSDEEP

    49152:PB0m0c8A4WdMLE8Q7P0A4iDruQzwXOhR0kLZFs7+:Z07c8r1E8rA4iDruQzwidi7+

Malware Config

Extracted

Family

redline

Botnet

Ijele

C2

45.87.63.164:15256

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice#577595955858.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice#577595955858.pdf.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\temp\trhg\dc crypt.exe
      "C:\Users\Admin\AppData\Local\temp\trhg\dc crypt.exe" 伊莎贝拉25美分硬币是1893年铸造的一种美国纪念币,由联邦国会应芝加哥哥伦布纪念博览会女士经理人董事会的请求授权发行。
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4644
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\System32\wscript.exe" Update-tj.v.vbe
        3⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Local\Temp\cica\tcqsmsla.exe
          "C:\Users\Admin\AppData\Local\Temp\cica\tcqsmsla.exe" ejmvi.xml
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:3440
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:3416
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\System32\wscript.exe" Update-so.i.vbe
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\trhg\sokxsghrqu.exe
        "C:\Users\Admin\AppData\Local\Temp\trhg\sokxsghrqu.exe" fwxsq.icm
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\cica\ejmvi.xml

    Filesize

    116.1MB

    MD5

    ef3f666a79511e575d4b335fe4aa2489

    SHA1

    664a9cb92fa93195d5a8fa88f5a1d1dddcfd38c8

    SHA256

    986c822cc70b61eeadb7ba968e79e5dafd4fa2f16155b61b1a67dde9eb1e8ef9

    SHA512

    5ff80adf045c7f546a4b90b5c0c29c123873bec7d32a693066ffee1fdc44f5e3da7712c1ac0b95a0d1b0d457b16e33b78376cad86eb9d304d910b7ef5d3f85cc

  • C:\Users\Admin\AppData\Local\Temp\cica\eulno.dll

    Filesize

    32KB

    MD5

    e86b6473b90a583bf6ee5c38b7238045

    SHA1

    e809fb1485345acf096947286a149197c133f433

    SHA256

    3fb7d5b273faeada616dc638385f28f67886297292919fd6c76c271cd0ea4cb4

    SHA512

    cf7b33fdccc891ca42c9dd5b8a41fd255ac49f90221f7aafbe03397d29a07f0b05e99eb87066abd75fe710fc001efd6788844dbfaec18151d2ec27d323e553ce

  • C:\Users\Admin\AppData\Local\Temp\cica\tcqsmsla.exe

    Filesize

    995KB

    MD5

    b1487180da402d46e06e1d02ef1340f6

    SHA1

    83dfd4d9e36951e9bd39bccc4c8a0aa6c8549400

    SHA256

    5731c376bef6eaac57fff80d13fff95af02a4c2db625bebde6394ab57ef3f4ea

    SHA512

    86b5f368bad0e8e0a14415c87d0ba15783c2f3ede10402c54875f64b8bb3ee924fbf357841b494fa38cc552e05b9b32a1817e5c0a4e739fb32598395b4200013

  • C:\Users\Admin\AppData\Local\Temp\cica\tcqsmsla.exe

    Filesize

    995KB

    MD5

    b1487180da402d46e06e1d02ef1340f6

    SHA1

    83dfd4d9e36951e9bd39bccc4c8a0aa6c8549400

    SHA256

    5731c376bef6eaac57fff80d13fff95af02a4c2db625bebde6394ab57ef3f4ea

    SHA512

    86b5f368bad0e8e0a14415c87d0ba15783c2f3ede10402c54875f64b8bb3ee924fbf357841b494fa38cc552e05b9b32a1817e5c0a4e739fb32598395b4200013

  • C:\Users\Admin\AppData\Local\Temp\cica\wfencdsb.ven

    Filesize

    946KB

    MD5

    af730bad6f08daed98f057702509532b

    SHA1

    ac5adc176b47a61c5cadb333c80c9fd8313ac78d

    SHA256

    4007af43cdd926f8ae085a8b29f5a55d45b26edc3c4600b7868c777c5b97f10e

    SHA512

    52b491f1afb53283cf78992cfdfd7c628b1187b0467f8bb79743b337a5d85419e8ae35125f1d9d5e669370a5e2c26f41ea9be5e958a2c884fb6d83be29aefba5

  • C:\Users\Admin\AppData\Local\Temp\tmp1832.tmp

    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp1857.tmp

    Filesize

    92KB

    MD5

    ec9dc2b3a8b24bcbda00502af0fedd51

    SHA1

    b555e8192e4aef3f0beb5f5381a7ad7095442e8d

    SHA256

    7378950f042c94b08cc138fd8c02e41f88b616cd17f23c0c06d4e3ca3e2937d2

    SHA512

    9040813d94956771ce06cdc1f524e0174c481cdc0e1d93cbf8a7d76dd321a641229e5a9dd1c085e92a9f66d92b6d7edc80b77cd54bb8905852c150234a190194

  • C:\Users\Admin\AppData\Local\Temp\tmp18C1.tmp

    Filesize

    48KB

    MD5

    349e6eb110e34a08924d92f6b334801d

    SHA1

    bdfb289daff51890cc71697b6322aa4b35ec9169

    SHA256

    c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

    SHA512

    2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

  • C:\Users\Admin\AppData\Local\Temp\tmp18E6.tmp

    Filesize

    112KB

    MD5

    780853cddeaee8de70f28a4b255a600b

    SHA1

    ad7a5da33f7ad12946153c497e990720b09005ed

    SHA256

    1055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3

    SHA512

    e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8

  • C:\Users\Admin\AppData\Local\Temp\tmp1930.tmp

    Filesize

    96KB

    MD5

    d367ddfda80fdcf578726bc3b0bc3e3c

    SHA1

    23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

    SHA256

    0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

    SHA512

    40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

  • C:\Users\Admin\AppData\Local\Temp\trhg\bepdbdqah.xml

    Filesize

    31KB

    MD5

    695fb78c59d16bd586cfbe22211b8b6c

    SHA1

    ee501a84cbd984d67bf9ac0ec2531edd87b71687

    SHA256

    19a4534d572d403d0f45a9f259f887378fc3c98714ff5056fd985a068724b27c

    SHA512

    794f915c4fce34153c64005ff96e3071df839fc4a0ae9945c71ec8cd0e5cbcab260e9ec2507e1245774b2b32c23843b8ea60f6534490522caab908b3fd57e895

  • C:\Users\Admin\AppData\Local\Temp\trhg\bwtu.ucp

    Filesize

    166KB

    MD5

    5d7781db353e6558585edddd657be403

    SHA1

    da7cf48541c6e4165420d5a943cbdf860d0bc779

    SHA256

    7476fbd0eadbcaf6f13032f376ea0aabaecc9516482e09c51fbf86be7191719d

    SHA512

    f45c969855a1db2c3993dc96db1bd4ceac3e96f8a8679e841c827329e2cac06a99be264fb7802fb782693b509a2fdca9b86b7fd08dd9bc97cb76a4d88ca649c0

  • C:\Users\Admin\AppData\Local\Temp\trhg\dc crypt.exe

    Filesize

    1.2MB

    MD5

    cf265d67b5354040f3389f142f2b05d6

    SHA1

    f339f7232465aa6aad2d9dd5388e29c9c6ed4cc9

    SHA256

    b778a6cae48d031fc25f8fde9fed1bc570157c6f63d38c69fff82eaa51badb08

    SHA512

    54ee16677bb83f13d7171104a10f16202b9affd614a6cc767fdfd421ba9b04176b7335555150d7a7c1a846d22181549f6027781b062b2512378d02a169b9cdb7

  • C:\Users\Admin\AppData\Local\Temp\trhg\dc crypt.exe

    Filesize

    1.2MB

    MD5

    cf265d67b5354040f3389f142f2b05d6

    SHA1

    f339f7232465aa6aad2d9dd5388e29c9c6ed4cc9

    SHA256

    b778a6cae48d031fc25f8fde9fed1bc570157c6f63d38c69fff82eaa51badb08

    SHA512

    54ee16677bb83f13d7171104a10f16202b9affd614a6cc767fdfd421ba9b04176b7335555150d7a7c1a846d22181549f6027781b062b2512378d02a169b9cdb7

  • C:\Users\Admin\AppData\Local\Temp\trhg\fwxsq.icm

    Filesize

    85.0MB

    MD5

    d80c7adcc499c3ae1e1633e8b2421728

    SHA1

    da3f2a17a78319f29344969b14810562278f33ef

    SHA256

    faf5a3d9eafda1a8014d32eeb70d714ed32a9bc2a6061d37d9c075dec9ac8ef9

    SHA512

    05ef24018988e69ea558b37be491a522245132c78babb70f865e00c987427ddf1f3c40b59b627c7a659911ba72fbc2459602fa54b3780617a5f6aea282967a58

  • C:\Users\Admin\AppData\Local\Temp\trhg\sokxsghrqu.exe

    Filesize

    995KB

    MD5

    fa25e573dcd18b3c056e5c55f9a61b2c

    SHA1

    e79c7666327bdf858ce0c50839b48236b65205a5

    SHA256

    9c6c73bf551611ec32e96d18e0f2e36c8b68ce3840f6e5e5b40cfd3a351ff8fd

    SHA512

    34ec811f62942c5a0c6d92e903375a6722490ad610a221041bb81e3fa5298a59e03d8006e9c77b8ce9d3cdeb06506dcda70dce080b39aad685cf2268e2432204

  • C:\Users\Admin\AppData\Local\Temp\trhg\sokxsghrqu.exe

    Filesize

    995KB

    MD5

    fa25e573dcd18b3c056e5c55f9a61b2c

    SHA1

    e79c7666327bdf858ce0c50839b48236b65205a5

    SHA256

    9c6c73bf551611ec32e96d18e0f2e36c8b68ce3840f6e5e5b40cfd3a351ff8fd

    SHA512

    34ec811f62942c5a0c6d92e903375a6722490ad610a221041bb81e3fa5298a59e03d8006e9c77b8ce9d3cdeb06506dcda70dce080b39aad685cf2268e2432204

  • C:\Users\Admin\AppData\Local\temp\cica\Update-tj.v.vbe

    Filesize

    49KB

    MD5

    be8316099e11ffbfcf93b32cd7c380b2

    SHA1

    1949e8324e26ec49532ba5f03adee3b3913c69ee

    SHA256

    6107f65051ce604f5d37817fc4bc3b27211203f46b2c866580018a2e0eaa1a43

    SHA512

    bcc2c94aa572867159e2c70830d2dd1540216e3d0eebd027b9af7a7148a5555dbad225138dfaa8365756a26a0d9648206eab3f2ede34bcd5ad266474bef49d41

  • C:\Users\Admin\AppData\Local\temp\trhg\Update-so.i.vbe

    Filesize

    77KB

    MD5

    5ed190801877967155ccf83aeb00795d

    SHA1

    7dd2de6b605a97c17d9d0e74e18602cfb67d9d4b

    SHA256

    6e4349189d6dae37815b94457f71998216090789574d898a46acc34196c9c20c

    SHA512

    740bfc09695f3f731d521ef32c5cbee731197c7341896d540c6eb60765e33128007cd95612a9e47dcf651e3794edfb68235ac5c4456ad7a9e8d883574a5af3cb

  • C:\Users\Admin\AppData\Local\temp\trhg\dc crypt.exe

    Filesize

    1.2MB

    MD5

    cf265d67b5354040f3389f142f2b05d6

    SHA1

    f339f7232465aa6aad2d9dd5388e29c9c6ed4cc9

    SHA256

    b778a6cae48d031fc25f8fde9fed1bc570157c6f63d38c69fff82eaa51badb08

    SHA512

    54ee16677bb83f13d7171104a10f16202b9affd614a6cc767fdfd421ba9b04176b7335555150d7a7c1a846d22181549f6027781b062b2512378d02a169b9cdb7

  • memory/1824-443-0x00000000071B0000-0x00000000076DC000-memory.dmp

    Filesize

    5.2MB

  • memory/1824-442-0x0000000006AB0000-0x0000000006C72000-memory.dmp

    Filesize

    1.8MB

  • memory/1824-433-0x0000000000C00000-0x0000000000C1E000-memory.dmp

    Filesize

    120KB

  • memory/1824-434-0x0000000005F00000-0x0000000006518000-memory.dmp

    Filesize

    6.1MB

  • memory/1824-435-0x0000000005870000-0x0000000005882000-memory.dmp

    Filesize

    72KB

  • memory/1824-436-0x00000000058E0000-0x000000000591C000-memory.dmp

    Filesize

    240KB

  • memory/1824-437-0x0000000005BA0000-0x0000000005CAA000-memory.dmp

    Filesize

    1.0MB

  • memory/1824-438-0x00000000058D0000-0x00000000058E0000-memory.dmp

    Filesize

    64KB

  • memory/1824-611-0x0000000007190000-0x00000000071AE000-memory.dmp

    Filesize

    120KB

  • memory/1824-610-0x00000000070B0000-0x0000000007126000-memory.dmp

    Filesize

    472KB

  • memory/1824-441-0x00000000058D0000-0x00000000058E0000-memory.dmp

    Filesize

    64KB

  • memory/1824-430-0x0000000000C00000-0x0000000001309000-memory.dmp

    Filesize

    7.0MB

  • memory/1824-476-0x0000000006DC0000-0x0000000006E26000-memory.dmp

    Filesize

    408KB

  • memory/1824-474-0x0000000007C90000-0x0000000008234000-memory.dmp

    Filesize

    5.6MB

  • memory/1824-475-0x0000000006D20000-0x0000000006DB2000-memory.dmp

    Filesize

    584KB

  • memory/3416-427-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/3416-419-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/3416-415-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/3416-439-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/3440-428-0x0000000000400000-0x00000000008ED000-memory.dmp

    Filesize

    4.9MB

  • memory/3440-422-0x0000000000400000-0x00000000008ED000-memory.dmp

    Filesize

    4.9MB

  • memory/3440-418-0x0000000000400000-0x00000000008ED000-memory.dmp

    Filesize

    4.9MB

  • memory/3440-440-0x0000000000400000-0x00000000008ED000-memory.dmp

    Filesize

    4.9MB