Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2024 22:29

General

  • Target

    file.exe

  • Size

    95KB

  • MD5

    57935225dcb95b6ed9894d5d5e8b46a8

  • SHA1

    1daf36a8db0b79be94a41d27183e4904a1340990

  • SHA256

    79d7b0f170471f44ed6c07ddb4c4c9bb20c97235aef23ac052e692cb558a156d

  • SHA512

    1b6362bdb7f6b177773357f5fe8e7d7ee44716fd8e63e663e446f4e204af581491d05345c12cd9cca91fd249383817da21ef2241011cdc251b7e299560ea48c0

  • SSDEEP

    1536:9qskXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2etmulgS6pY:rCgzWHY3+zi0ZbYe1g0ujyzdqY

Malware Config

Extracted

Family

redline

Botnet

Exodus

C2

93.123.39.68:1334

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

93.123.39.68:4449

Mutex

kszghixltbdczq

Attributes
  • delay

    1

  • install

    true

  • install_file

    chromeupdate.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Async RAT payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\adasda.exe
      "C:\Users\Admin\AppData\Local\Temp\adasda.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "chromeupdate" /tr '"C:\Users\Admin\AppData\Roaming\chromeupdate.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:564
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "chromeupdate" /tr '"C:\Users\Admin\AppData\Roaming\chromeupdate.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1620
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp934A.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:580
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:2248
        • C:\Users\Admin\AppData\Roaming\chromeupdate.exe
          "C:\Users\Admin\AppData\Roaming\chromeupdate.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1140

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f99c4d4613b87ab52c5575f9e6a01f43

    SHA1

    a5d6f30cc966e0463920544a909fdbd0a28999cf

    SHA256

    e5fee7eaffafdfdc4b0b65e513e1de546c8e418e45de25a80669d3f8d89d44dd

    SHA512

    2146c9fe2bff2b96844ea05c1359c95e6fbe3783275c2a13c2be8a730a04a1f73e1970466185281ae35fb8dc457418c195b7399b0e9a4f4c30fff707b9249c69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    ec9c0f6d1bd93c2b4e91bf7729c3c620

    SHA1

    8050b2ede9df5084f5e22fc2d4275bc659efb50b

    SHA256

    98a3c055d8b392bb219905ff9991225ff83840c5205ea1c010953a0e88a9f809

    SHA512

    c5bb9f0d5ececa1c08f2e7909527e8019882dd533b25612d87e64dd321d1f257432221511bc9f352fe063160a881a8b4c11da067e2b1215bc684cecfce3c4938

  • C:\Users\Admin\AppData\Local\Temp\Tar3A09.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\adasda.exe
    Filesize

    73KB

    MD5

    25b6389bbaa746df85d53714d4a6d477

    SHA1

    86e6443e902f180f32fb434e06ecf45d484582e3

    SHA256

    4b02692bf468a164e333bbfc961c5974d0a95009a72ea8bff2e9cb677eae4f56

    SHA512

    6ad22c119b548f0e8ed5adb6c9f48c33b356340a7309c8185bec817f2562ae99760ff79e131c89bce2be122b6385bee610704f37edb7f1656a1b9d4782a1fcf4

  • C:\Users\Admin\AppData\Local\Temp\tmp408E.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp40A3.tmp
    Filesize

    92KB

    MD5

    b9858d49711b377343dad7336af34a75

    SHA1

    807eee110edcaf45772bf902d32adfe72d7aa7e0

    SHA256

    29796e50a6e69754ef1bb64d0dd9ca2e657c8de2843e06d689c0b5125c9d3ce3

    SHA512

    9525413e6bf14f24f2dedccac36a153ddee2d88f3ee0ce87d8ac4cd3ea63d33fa439cf28d3e155e9e7be0d0856d0b01e2813dc67e890724c4cd71714490cff5d

  • C:\Users\Admin\AppData\Local\Temp\tmp934A.tmp.bat
    Filesize

    156B

    MD5

    ac205bb837084c12458969a094fa4bc7

    SHA1

    9180693c5492a9e29507b7e21e5662f982f976ee

    SHA256

    cf70c351594831a79b3fb69f82e5af3e20f9ae237696f8c93bdfa331109d8939

    SHA512

    828469c7e9e01a8f99cb25c2801baede6ce4c700e8b4024103871b54f4a4898adf5371b811b9bd0023a66a8d18179d239ff29a8ef520e33306dfd911377e9248

  • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf
    Filesize

    8B

    MD5

    cf759e4c5f14fe3eec41b87ed756cea8

    SHA1

    c27c796bb3c2fac929359563676f4ba1ffada1f5

    SHA256

    c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

    SHA512

    c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

  • memory/1072-143-0x0000000000890000-0x00000000008A8000-memory.dmp
    Filesize

    96KB

  • memory/1072-145-0x000007FEF5680000-0x000007FEF606C000-memory.dmp
    Filesize

    9.9MB

  • memory/1072-146-0x000000001A6F0000-0x000000001A770000-memory.dmp
    Filesize

    512KB

  • memory/1072-147-0x00000000774D0000-0x0000000077679000-memory.dmp
    Filesize

    1.7MB

  • memory/1072-157-0x000007FEF5680000-0x000007FEF606C000-memory.dmp
    Filesize

    9.9MB

  • memory/1072-158-0x00000000774D0000-0x0000000077679000-memory.dmp
    Filesize

    1.7MB

  • memory/1140-166-0x00000000774D0000-0x0000000077679000-memory.dmp
    Filesize

    1.7MB

  • memory/1140-162-0x0000000000210000-0x0000000000228000-memory.dmp
    Filesize

    96KB

  • memory/1140-164-0x000007FEF4C90000-0x000007FEF567C000-memory.dmp
    Filesize

    9.9MB

  • memory/1140-165-0x000000001AF30000-0x000000001AFB0000-memory.dmp
    Filesize

    512KB

  • memory/1140-249-0x000007FEF4C90000-0x000007FEF567C000-memory.dmp
    Filesize

    9.9MB

  • memory/1140-268-0x000000001AF30000-0x000000001AFB0000-memory.dmp
    Filesize

    512KB

  • memory/1140-287-0x00000000774D0000-0x0000000077679000-memory.dmp
    Filesize

    1.7MB

  • memory/2888-136-0x0000000004480000-0x00000000044C0000-memory.dmp
    Filesize

    256KB

  • memory/2888-0-0x00000000008B0000-0x00000000008CE000-memory.dmp
    Filesize

    120KB

  • memory/2888-135-0x00000000746D0000-0x0000000074DBE000-memory.dmp
    Filesize

    6.9MB

  • memory/2888-2-0x0000000004480000-0x00000000044C0000-memory.dmp
    Filesize

    256KB

  • memory/2888-1-0x00000000746D0000-0x0000000074DBE000-memory.dmp
    Filesize

    6.9MB

  • memory/2888-194-0x00000000746D0000-0x0000000074DBE000-memory.dmp
    Filesize

    6.9MB