Analysis
-
max time kernel
196s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 22:47
Static task
static1
Behavioral task
behavioral1
Sample
TORRENTOLD-1.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
TORRENTOLD-1.exe
Resource
win10v2004-20231025-en
General
-
Target
TORRENTOLD-1.exe
-
Size
1.3MB
-
MD5
984f8dd35c2ae61a310992832df6cedf
-
SHA1
2262fb9d4244a33d359140fdfd6d89779a887b41
-
SHA256
4b3369d4573807efe4bf8f571472ee2093e0b28c17eef94d73ba1ed63cf959aa
-
SHA512
509b94ffaee394f1c2d7e79a21cb966068a42cc5a774c765a2bd86b1f55982810840e61262581cbed879e8ec85f39fee7823467d1d81ee6a07599e709c5d6792
-
SSDEEP
24576:b2LBa1xIo0t29o0wu7osrgS4UTOHwnsXIScCfhJfmHCSjg:bk+xb049odAFksTLnsXz7mHj
Malware Config
Extracted
redline
TORRENTOLD
amrican-sport-live-stream.cc:4581
-
auth_value
74e1b58bf920611f04c0e3919954fe05
Signatures
-
Detect PureCrypter injector 34 IoCs
Processes:
resource yara_rule behavioral2/memory/1716-3-0x0000000005A70000-0x0000000005CF4000-memory.dmp family_purecrypter behavioral2/memory/1716-4-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-5-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-7-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-9-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-11-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-13-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-15-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-17-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-19-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-21-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-23-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-25-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-27-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-29-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-31-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-33-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-35-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-37-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-39-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-41-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-43-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-45-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-47-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-49-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-51-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-53-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-55-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-57-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-59-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-61-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-63-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-65-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-67-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter -
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/1716-3-0x0000000005A70000-0x0000000005CF4000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-4-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-5-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-7-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-9-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-11-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-13-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-15-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-17-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-19-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-21-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-23-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-25-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-27-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-29-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-31-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-33-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-35-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-37-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-39-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-41-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-43-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-45-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-47-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-49-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-51-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-53-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-55-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-57-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-59-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-61-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-63-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-65-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-67-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
TORRENTOLD-1.exedescription pid process target process PID 1716 set thread context of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
TORRENTOLD-1.exedescription pid process Token: SeDebugPrivilege 1716 TORRENTOLD-1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
TORRENTOLD-1.exedescription pid process target process PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TORRENTOLD-1.exe"C:\Users\Admin\AppData\Local\Temp\TORRENTOLD-1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1716-0-0x0000000000DE0000-0x0000000000F2C000-memory.dmpFilesize
1.3MB
-
memory/1716-1-0x0000000074D00000-0x00000000754B0000-memory.dmpFilesize
7.7MB
-
memory/1716-2-0x0000000005A60000-0x0000000005A70000-memory.dmpFilesize
64KB
-
memory/1716-3-0x0000000005A70000-0x0000000005CF4000-memory.dmpFilesize
2.5MB
-
memory/1716-4-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-5-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-7-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-9-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-11-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-13-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-15-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-17-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-19-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-21-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-23-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-25-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-27-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-29-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-31-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-33-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-35-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-37-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-39-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-41-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-43-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-45-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-47-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-49-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-51-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-53-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-55-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-57-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-59-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-61-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-63-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-65-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-67-0x0000000005A70000-0x0000000005CEF000-memory.dmpFilesize
2.5MB
-
memory/1716-355-0x0000000074D00000-0x00000000754B0000-memory.dmpFilesize
7.7MB
-
memory/1716-410-0x0000000005A60000-0x0000000005A70000-memory.dmpFilesize
64KB
-
memory/1716-10166-0x0000000001750000-0x0000000001772000-memory.dmpFilesize
136KB
-
memory/1716-10167-0x0000000005D20000-0x0000000006074000-memory.dmpFilesize
3.3MB
-
memory/1716-10168-0x0000000036960000-0x00000000369C6000-memory.dmpFilesize
408KB
-
memory/1716-10169-0x0000000036EB0000-0x0000000036F42000-memory.dmpFilesize
584KB
-
memory/1716-10170-0x0000000037500000-0x0000000037AA4000-memory.dmpFilesize
5.6MB
-
memory/1716-10171-0x0000000006180000-0x00000000061E0000-memory.dmpFilesize
384KB
-
memory/1716-10175-0x0000000074D00000-0x00000000754B0000-memory.dmpFilesize
7.7MB
-
memory/4904-10174-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/4904-10176-0x0000000074D00000-0x00000000754B0000-memory.dmpFilesize
7.7MB
-
memory/4904-10177-0x0000000005560000-0x0000000005566000-memory.dmpFilesize
24KB
-
memory/4904-10178-0x0000000005650000-0x0000000005660000-memory.dmpFilesize
64KB
-
memory/4904-10179-0x0000000005D80000-0x0000000006398000-memory.dmpFilesize
6.1MB
-
memory/4904-10180-0x0000000005870000-0x000000000597A000-memory.dmpFilesize
1.0MB
-
memory/4904-10181-0x0000000005780000-0x0000000005792000-memory.dmpFilesize
72KB
-
memory/4904-10182-0x00000000057E0000-0x000000000581C000-memory.dmpFilesize
240KB
-
memory/4904-10183-0x0000000005820000-0x000000000586C000-memory.dmpFilesize
304KB
-
memory/4904-10184-0x0000000074D00000-0x00000000754B0000-memory.dmpFilesize
7.7MB
-
memory/4904-10185-0x0000000005650000-0x0000000005660000-memory.dmpFilesize
64KB