Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20-09-2023 16:34
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe
Resource
win7-20230831-en
General
-
Target
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe
-
Size
6.9MB
-
MD5
56c197e493f74f9233a16cdefab3109f
-
SHA1
af35bd2fd5d884bdf6bea8aac695e98f5a00715a
-
SHA256
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01
-
SHA512
d2830cfebfaa859f5fca15e3c81799e99c3cb31f72b1075d8828f03a490bfe6196b34d35bbcaede32a6d63d5c2d9bc17bea009e1bd8787cb4397f6627328b086
-
SSDEEP
98304:ULop5mhzd71cBjG9Azp56BV8cM0AnwGSOnTXsYGeCW1zbiG54WeOVEMMRHGV7E:0op5mqU9KE8nNZnTXaexbZWsMGV7E
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2552-58-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2552-60-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2552-64-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2552-67-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2552-69-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2128-142-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
BestSoftware.exeBestSoftware.exepid Process 2688 BestSoftware.exe 2920 BestSoftware.exe -
Loads dropped DLL 2 IoCs
Processes:
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exepid Process 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe -
Processes:
resource yara_rule behavioral1/memory/1940-2-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect behavioral1/memory/1940-7-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect behavioral1/memory/1940-24-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect behavioral1/memory/2084-77-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect behavioral1/memory/2084-82-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect behavioral1/memory/2084-85-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect behavioral1/memory/2400-147-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect behavioral1/memory/2400-156-0x0000000000030000-0x0000000000AA0000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
BestSoftware.exeBestSoftware.exedescription pid Process procid_target PID 2688 set thread context of 2552 2688 BestSoftware.exe 32 PID 2920 set thread context of 2128 2920 BestSoftware.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exeRegSvcs.exeSecuriteInfo.com.Win32.BotX-gen.30049.24820.exeRegSvcs.exeSecuriteInfo.com.Win32.BotX-gen.30049.24820.exepid Process 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 2552 RegSvcs.exe 2552 RegSvcs.exe 2552 RegSvcs.exe 2084 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 2128 RegSvcs.exe 2128 RegSvcs.exe 2128 RegSvcs.exe 2400 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
BestSoftware.exeRegSvcs.exeBestSoftware.exeRegSvcs.exedescription pid Process Token: SeDebugPrivilege 2688 BestSoftware.exe Token: SeDebugPrivilege 2552 RegSvcs.exe Token: SeDebugPrivilege 2920 BestSoftware.exe Token: SeDebugPrivilege 2128 RegSvcs.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
SecuriteInfo.com.Win32.BotX-gen.30049.24820.exeBestSoftware.exetaskeng.exeBestSoftware.exedescription pid Process procid_target PID 1940 wrote to memory of 2660 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 28 PID 1940 wrote to memory of 2660 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 28 PID 1940 wrote to memory of 2660 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 28 PID 1940 wrote to memory of 2660 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 28 PID 1940 wrote to memory of 2688 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 30 PID 1940 wrote to memory of 2688 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 30 PID 1940 wrote to memory of 2688 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 30 PID 1940 wrote to memory of 2688 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 30 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 2688 wrote to memory of 2552 2688 BestSoftware.exe 32 PID 1316 wrote to memory of 2084 1316 taskeng.exe 37 PID 1316 wrote to memory of 2084 1316 taskeng.exe 37 PID 1316 wrote to memory of 2084 1316 taskeng.exe 37 PID 1316 wrote to memory of 2084 1316 taskeng.exe 37 PID 1316 wrote to memory of 2084 1316 taskeng.exe 37 PID 1316 wrote to memory of 2084 1316 taskeng.exe 37 PID 1316 wrote to memory of 2084 1316 taskeng.exe 37 PID 1940 wrote to memory of 2920 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 38 PID 1940 wrote to memory of 2920 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 38 PID 1940 wrote to memory of 2920 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 38 PID 1940 wrote to memory of 2920 1940 SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe 38 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 2920 wrote to memory of 2128 2920 BestSoftware.exe 39 PID 1316 wrote to memory of 2400 1316 taskeng.exe 41 PID 1316 wrote to memory of 2400 1316 taskeng.exe 41 PID 1316 wrote to memory of 2400 1316 taskeng.exe 41 PID 1316 wrote to memory of 2400 1316 taskeng.exe 41 PID 1316 wrote to memory of 2400 1316 taskeng.exe 41 PID 1316 wrote to memory of 2400 1316 taskeng.exe 41 PID 1316 wrote to memory of 2400 1316 taskeng.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe /TR "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe" /F2⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\BestSoftware.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\BestSoftware.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000068001\BestSoftware.exe"C:\Users\Admin\AppData\Local\Temp\1000068001\BestSoftware.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC4472E9-FA85-4393-8291-72416D45BFFA} S-1-5-21-686452656-3203474025-4140627569-1000:UUVOHKNL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.BotX-gen.30049.24820.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc