Analysis

  • max time kernel
    51s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 07:37

General

  • Target

    7a17dfb69ed9236941b11eedf66a5a4f.exe

  • Size

    371KB

  • MD5

    7a17dfb69ed9236941b11eedf66a5a4f

  • SHA1

    5c66c69f6b2a90af84e216b794688ff49434ff9d

  • SHA256

    ed099ecee0b1d8eefe0d68febba8ceba3d19cf8e5599ca2dac87e25f85eb09f9

  • SHA512

    b2d46e3e0799e606739ec3b83e7e3a484fa6d0bb77b1939603c640d924e69bdf0b2d9a82819e84c519d8877732324a6b77adec1b156a2ad9a3d258d99b45a7ce

  • SSDEEP

    6144:HpSQUmpzZE6MEs7PN4slZ75nh+g1Z9Pj8/TCm:JLEGo75wgS/R

Malware Config

Extracted

Family

redline

Botnet

@kaaazzs

C2

185.230.143.48:14462

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a17dfb69ed9236941b11eedf66a5a4f.exe
    "C:\Users\Admin\AppData\Local\Temp\7a17dfb69ed9236941b11eedf66a5a4f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4000

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1816-14-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/1816-2-0x0000000005600000-0x0000000005610000-memory.dmp

            Filesize

            64KB

          • memory/1816-0-0x0000000000AD0000-0x0000000000B34000-memory.dmp

            Filesize

            400KB

          • memory/1816-3-0x0000000005BC0000-0x0000000006164000-memory.dmp

            Filesize

            5.6MB

          • memory/1816-4-0x00000000057F0000-0x0000000005882000-memory.dmp

            Filesize

            584KB

          • memory/1816-5-0x00000000057E0000-0x00000000057EA000-memory.dmp

            Filesize

            40KB

          • memory/1816-19-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/1816-15-0x0000000005600000-0x0000000005610000-memory.dmp

            Filesize

            64KB

          • memory/1816-1-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/4000-10-0x00000000050B0000-0x00000000051BA000-memory.dmp

            Filesize

            1.0MB

          • memory/4000-7-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/4000-11-0x00000000052D0000-0x00000000052E0000-memory.dmp

            Filesize

            64KB

          • memory/4000-12-0x0000000004FE0000-0x000000000501C000-memory.dmp

            Filesize

            240KB

          • memory/4000-13-0x0000000005020000-0x000000000506C000-memory.dmp

            Filesize

            304KB

          • memory/4000-8-0x0000000005510000-0x0000000005B28000-memory.dmp

            Filesize

            6.1MB

          • memory/4000-9-0x0000000004F80000-0x0000000004F92000-memory.dmp

            Filesize

            72KB

          • memory/4000-16-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/4000-17-0x00000000052D0000-0x00000000052E0000-memory.dmp

            Filesize

            64KB

          • memory/4000-6-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB