Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2023 14:49

General

  • Target

    3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe

  • Size

    7.2MB

  • MD5

    7212e623e04d3427364e7f00a95bf932

  • SHA1

    5f8e0384cf7c209d804d9b10e3d2281a9c391fe7

  • SHA256

    3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2

  • SHA512

    3a2ac1111eaaf17475235ee233819286848c45bb2d69a42803fde15f4ae609f63120ca3a9f945b80af1a7c565941e81513ecb90ef9ea1320240c81f77091f7df

  • SSDEEP

    196608:r+QDCeRpnhgR/BQ+/Svwj47kuTkGfxDlDlAs:s6MQ+/SvwOvY4

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.141.215.79:1639

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Detects Pyinstaller 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe
      "C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:852
    • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe
      "C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe
        "C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

    Filesize

    7.3MB

    MD5

    2073e77e93fc051dc7a179cea9015520

    SHA1

    5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

    SHA256

    0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

    SHA512

    7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

  • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

    Filesize

    7.3MB

    MD5

    2073e77e93fc051dc7a179cea9015520

    SHA1

    5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

    SHA256

    0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

    SHA512

    7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

  • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

    Filesize

    7.3MB

    MD5

    2073e77e93fc051dc7a179cea9015520

    SHA1

    5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

    SHA256

    0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

    SHA512

    7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

  • C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe

    Filesize

    95KB

    MD5

    5d2d319a57180973471a07b00b9c9d08

    SHA1

    481c355baf245d307b15ea653ddbe1c3282a0914

    SHA256

    08f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1

    SHA512

    3e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1

  • C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe

    Filesize

    95KB

    MD5

    5d2d319a57180973471a07b00b9c9d08

    SHA1

    481c355baf245d307b15ea653ddbe1c3282a0914

    SHA256

    08f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1

    SHA512

    3e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1

  • C:\Users\Admin\AppData\Local\Temp\_MEI11602\python311.dll

    Filesize

    5.5MB

    MD5

    1fe47c83669491bf38a949253d7d960f

    SHA1

    de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

    SHA256

    0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

    SHA512

    05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

  • \Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

    Filesize

    7.3MB

    MD5

    2073e77e93fc051dc7a179cea9015520

    SHA1

    5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

    SHA256

    0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

    SHA512

    7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

  • \Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

    Filesize

    7.3MB

    MD5

    2073e77e93fc051dc7a179cea9015520

    SHA1

    5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

    SHA256

    0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

    SHA512

    7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

  • \Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

    Filesize

    7.3MB

    MD5

    2073e77e93fc051dc7a179cea9015520

    SHA1

    5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

    SHA256

    0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

    SHA512

    7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

  • \Users\Admin\AppData\Local\Temp\_MEI11602\python311.dll

    Filesize

    5.5MB

    MD5

    1fe47c83669491bf38a949253d7d960f

    SHA1

    de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

    SHA256

    0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

    SHA512

    05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

  • memory/316-54-0x00000000000B0000-0x00000000007EA000-memory.dmp

    Filesize

    7.2MB

  • memory/316-55-0x000000001B930000-0x000000001B9B0000-memory.dmp

    Filesize

    512KB

  • memory/852-68-0x0000000000910000-0x000000000092E000-memory.dmp

    Filesize

    120KB

  • memory/852-91-0x0000000004670000-0x00000000046B0000-memory.dmp

    Filesize

    256KB

  • memory/852-108-0x0000000004670000-0x00000000046B0000-memory.dmp

    Filesize

    256KB