Analysis

  • max time kernel
    142s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 11:42

General

  • Target

    RFQ6689-TECHNO TOOLS.exe

  • Size

    313KB

  • MD5

    951cac4aa20d378ecc5587f21332703e

  • SHA1

    5b200fa24bcd7a985063360a8aef540355b43b75

  • SHA256

    3848bff1afa877296131976752c59b7040956b11cbeb04c6188bdf825eb6761d

  • SHA512

    b204e34590b04939cd17738ad18d0f6cb83b7d6c223cd8c041bc12998a3f85d41656ce9f8e753a612c0147e6363f8fcb674573ff7ba8dde891f840a355d50eaf

  • SSDEEP

    6144:ez+mAEWFiF6GPHuy+hMZCXcrIeuGCTfxBl:+7AEiiFPp+huCsr7uG8fxBl

Malware Config

Extracted

Family

redline

Botnet

WDD

C2

80.76.51.218:34640

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ6689-TECHNO TOOLS.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ6689-TECHNO TOOLS.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=ngen.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f954df9ea4bdb0955695217621938b75

    SHA1

    3b5c0df16eba20988dc5cc24a07fc46d3dec5cce

    SHA256

    ac67ee5af3ce7a8b0d307c910142a1f0c4f45ab1310d3bd4cedb3c490d310d50

    SHA512

    067cd00c7fb3f20637cf87ffa037c0e169bfef18641ee459fa769accd40bbdb235d8078c8f9c6c3d117790079afd51777616461528d55c3d349ae87513269a48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31a9c88f986c04c9192f03e20f406cd0

    SHA1

    2e7014d78b9902566198299486862de26b7f3a27

    SHA256

    3b56782545acda853039504ed43d0f4239df28f042febde277efc336df647e8f

    SHA512

    f5ad9db5fd084e9488a7e47fd6f99ef0130d2393316f31c22232e63e587213dd2a7778011aafbe4665b1ed7c6bbb1c449d639db74f3137060a64a240d1e9286a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92706e545484ae2aa024fead88fcc667

    SHA1

    331a5e4f8d930736611489f6911d351ad42b6668

    SHA256

    2d2db57c2bb7c2c7363e8688827d26de6b30eee8b5f2c60fbd2caf2a395f88ea

    SHA512

    b65f90f069b019ba1cea55cdfa7c6b6543f55a03d4fb438b67a265163c2064d500bf30feb28ca791d13b2fd22b15f706e2686107b874f03463a38b446e5e1b56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1381a88f4fde87c7bf978c60b5b0b3d

    SHA1

    b68c83737fa2f4d70da2fe84df599b9869fd58e0

    SHA256

    89879b1bf62770557dc36f512edf3829cf2a3e2ad17cbb9f9c4aefa2a72d7748

    SHA512

    e56e6a775f921eacc30a84385397b499e75b14f32b83146b5946cae7fa8ad0a551c9647fff69c8dbfbb947a470e43c67d54ac1e5ba611319692bb0b96f611ef5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02bbc768e83644fe5f2c9ecda2e76999

    SHA1

    397cfaba3ac117295f0f0f358213bf3ef539edb5

    SHA256

    0076e2428af22c08273d10b5c4bf89e8f2ccf531cbdf105f07d65c200390f025

    SHA512

    f55165a7b2fb4a11d40bd66b60d96bc75cfdf22dc70f4266ab4c742021f87a005ccd25c7a8e9c238ebe2aa8fa7117c698eab1789070ef7d67f9fc6c08e479ef1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a679e7b29042147acf88f07fde4976c

    SHA1

    7b78f4325dd295ad71ea39ad2c3e1c39da3a6425

    SHA256

    2c044afc7556ea8c7ede4cb6a0067ae49c7ac2e1b87c86d3d9731cb755821943

    SHA512

    59dce7c638544cebc1b899b1070d877c8edde27608ff1739e04a0229b2e5d7246f5c632fce0f6248ecfbcf941622b3dbe8f68b2785be09b29a0bfbb293b71099

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b59bbae945739a51472f6ecb51beb403

    SHA1

    f64e253c5f9c96cf7173c240ebd38b3ecdf95d91

    SHA256

    17cdd32be472b8c607a57b4a6e167bb22c63663c442105019a2e3848196e8352

    SHA512

    aa11c202bd721db7d8732f6e95fe3690423d15e7e45619562d2743b3ad2f1376330d9b28c1532f8f5470b0d4c37497009ea646ca15925f8600747e326303fd81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e734f725ae196c75e9f2b4a32958ec1

    SHA1

    47e0a33be1376af4439bb04fec59301e36374cca

    SHA256

    5719fa4f7a0fc5c0acd7b8cc4a0712967ac060d070f6c02c1365683bfd9f4482

    SHA512

    f84229548b6a6d2bfd0444db7a1fe8d674fda68b0072e70339548c8e97e6dbe08dba72675a3ac5698efebe9a623e4576a9b1f8731feac6ba73324ee36a23ccba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24cd80ef538f84a415d9db70a8d4a423

    SHA1

    5ccbe3b040d3a3ddafbd41388e22664ebc344373

    SHA256

    030cc7d2b02de00d0e791f8200c734b887be37e5cf2f0d5c33e4a44596b75ee1

    SHA512

    347d84efeead236d47558da79b78943c199b7a30936109d2e9859b5ee0e8699b98729f2be07144c5fa3fbc87e4602b2ef0f0d92ab0533bd0527004e4074f0688

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6045096dface9450e2dd8b493d33ee5

    SHA1

    8e9841089d4820df5590b730baea263390c8d648

    SHA256

    52bab7667cafade225dbfaa5c04dbff85b9690ed5f024ef9ee20350b8d6b24d3

    SHA512

    189167232897caee1863794bd07650ff855536644b2020642afe64a2576a310f726114f77ff820051b8e0470692bb2778ecc9dc8fc74eb104f1d069807af3e4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb40fd97afa4a134c9e7b17e4c8a64ca

    SHA1

    3158752584f89682b5403d9c6e1695b14c513afc

    SHA256

    e25c1f24a66b4b8c285ab497ff5f179cee2e1f841849a0868adb394ac6f00d44

    SHA512

    510d1f563b4ee1fb942204efbd219ecb803e92149d8678e4f5ef88cb66f6a44824d194eb3ed4bd9bb5608c4872f457bec06695914424ea15e8cfad66c5b07757

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0914af2b3078980263019ff6b4495dd5

    SHA1

    2c976e50fa502ebde4d6c9a28c886b6db1123cf0

    SHA256

    35f4928c5e2aae410448a08996908e7c32f9f010f345142ea84a0a932aeaa909

    SHA512

    6c976dc1d37983fb458f2f72a0b5ec155925a56b8a23e689d86d06cb4b565fd0a14ca66412bc3d53d794d6b1fdffc715e4830b004155fa1048009d7e16672063

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cccb290654032dd14fcf1bb1ac4fa0c5

    SHA1

    26b5ff7e62fdc52b8ba78622adfe52e3c6ab2a80

    SHA256

    af35d6b02926aaa398a7ca6ea95248e68ee07b53d5b6bd33550a7dc280395737

    SHA512

    116f045bc13a179b79bcafdfedcb17d011c4688f0eb048b7c8bd053bbee2e589af768118ccb3797ebf6414ce7ee523f96295c244e8d5a78236c8966ff61fddab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a72597c945d27e220396a1e8088927db

    SHA1

    066e3570e2ffaef3d5ce78fafeee95ed58dad667

    SHA256

    f03948792fe0aca32c65e615298fb462fd601073cebda0cf168aade04493cc46

    SHA512

    2d761a844bd64ec7ff8756b81aee3fc126f09ec52d169138ab418a900c90407f420826bf47f92d71a0fb8d1702406aa2ad538a7602b01d4d2f20c703faf289a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f329096491696b03f034b5c716c636e

    SHA1

    77a2c9aa79d7c75d396a2cf72fa5410e4d9be95b

    SHA256

    749fb7816bd0ae0349ce3a7a68d3316e9ccc0b168a255335b5de6572ae21cab1

    SHA512

    08803fbde1507fe89519b96fb5a1b6f18200f562ce9ef647c2e66a5bae08c872a57bb48903aac7fce6873646c54c90a2672ed2a58bf93d60fb5f308801259bc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f220d4292315938377bbba7de3ada545

    SHA1

    51131965510981cfdb57851266ca67693e88f3c9

    SHA256

    00cba7fde5ff768b2fded486185030c2ab78450f6d00ceb489d7f4c01386618f

    SHA512

    000b1957faa41230dd0592c1a382afea2084bbc3e1bfd8a66aa618dde1c79361badc328cb25f2d92d092f207413bbc9a7cda96a1a624376e34dc8fcd860dfa5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c590a2f1ea738a67ca72ccb5ca87be9

    SHA1

    e4d89300a755f4a5823262f6d7c3b576d90fb7fa

    SHA256

    aba977dfb70238e2b0627150c2535cf40198699cd169456b45f79358edaddc65

    SHA512

    f60e0579d5921811bf65f85b3e30232dc26a4439a92250c712de5fde22c5ff6b9b0b50f17f83d1d49fd0b4f0ac0d3c3da9be0420822d1d5ee23d1f710febfa9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40b81bab23e80031fa5d5c2daccc35ab

    SHA1

    7cf555f8784a1f742d30ec1489464658b7f9ecda

    SHA256

    47643e4a52956058460e5af23c50f22101759a3f1f3a60e952d3bd08596c2231

    SHA512

    b5d4c4e3747e52d8618146bab375653fce4e1d3825ac0f9b3e00722f8323f65a845191d46cb8541b54f62244e6fe9df2b6d71e8d33ff63077d188f32300b66f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e3380d044c0e2cbf1bbf85560c6df7c

    SHA1

    9fee1d60f8db10eac242b3fe891ab537da2f60a5

    SHA256

    7d72d7ca6b63c46b96dcaff677c4d0f128a6e7b20ea34a9bead8056e64fab3f7

    SHA512

    439e079dbf1977ebce37527c02ee3ccdaeab8019d6cb5f84c591a98aea3fe1b6f70635ed37db2672c3b31801e0a039fb44b67e9cd4114ee18fdf5897076b5461

  • C:\Users\Admin\AppData\Local\Temp\Cab69DD.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar6A7C.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2076-10-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2076-5-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2076-8-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2456-7-0x0000000074DD0000-0x00000000754BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2456-0-0x0000000074DD0000-0x00000000754BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2456-1-0x0000000001100000-0x0000000001154000-memory.dmp

    Filesize

    336KB

  • memory/2456-2-0x0000000004D20000-0x0000000004D60000-memory.dmp

    Filesize

    256KB

  • memory/2456-3-0x00000000002F0000-0x0000000000320000-memory.dmp

    Filesize

    192KB

  • memory/2456-4-0x0000000000420000-0x000000000043A000-memory.dmp

    Filesize

    104KB