Analysis
-
max time kernel
196s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 22:47
Static task
static1
Behavioral task
behavioral1
Sample
TORRENTOLD-1.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
TORRENTOLD-1.exe
Resource
win10v2004-20231025-en
General
-
Target
TORRENTOLD-1.exe
-
Size
1.3MB
-
MD5
984f8dd35c2ae61a310992832df6cedf
-
SHA1
2262fb9d4244a33d359140fdfd6d89779a887b41
-
SHA256
4b3369d4573807efe4bf8f571472ee2093e0b28c17eef94d73ba1ed63cf959aa
-
SHA512
509b94ffaee394f1c2d7e79a21cb966068a42cc5a774c765a2bd86b1f55982810840e61262581cbed879e8ec85f39fee7823467d1d81ee6a07599e709c5d6792
-
SSDEEP
24576:b2LBa1xIo0t29o0wu7osrgS4UTOHwnsXIScCfhJfmHCSjg:bk+xb049odAFksTLnsXz7mHj
Malware Config
Extracted
redline
TORRENTOLD
amrican-sport-live-stream.cc:4581
-
auth_value
74e1b58bf920611f04c0e3919954fe05
Signatures
-
Detect PureCrypter injector 34 IoCs
resource yara_rule behavioral2/memory/1716-3-0x0000000005A70000-0x0000000005CF4000-memory.dmp family_purecrypter behavioral2/memory/1716-4-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-5-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-7-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-9-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-11-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-13-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-15-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-17-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-19-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-21-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-23-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-25-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-27-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-29-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-31-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-33-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-35-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-37-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-39-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-41-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-43-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-45-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-47-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-49-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-51-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-53-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-55-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-57-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-59-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-61-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-63-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-65-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter behavioral2/memory/1716-67-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_purecrypter -
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/1716-3-0x0000000005A70000-0x0000000005CF4000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-4-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-5-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-7-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-9-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-11-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-13-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-15-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-17-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-19-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-21-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-23-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-25-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-27-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-29-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-31-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-33-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-35-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-37-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-39-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-41-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-43-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-45-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-47-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-49-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-51-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-53-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-55-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-57-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-59-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-61-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-63-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-65-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 behavioral2/memory/1716-67-0x0000000005A70000-0x0000000005CEF000-memory.dmp family_zgrat_v1 -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1716 set thread context of 4904 1716 TORRENTOLD-1.exe 98 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 TORRENTOLD-1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98 PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98 PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98 PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98 PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98 PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98 PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98 PID 1716 wrote to memory of 4904 1716 TORRENTOLD-1.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\TORRENTOLD-1.exe"C:\Users\Admin\AppData\Local\Temp\TORRENTOLD-1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:4904
-