Analysis Overview
SHA256
5bdfb1464ba0ca473a02e001d0478f85c051005c18ed24142b1a3dc1a0e707c3
Threat Level: Known bad
The file cca34ed59517003aa345928c18069494 was found to be: Known bad.
Malicious Activity Summary
SectopRAT payload
RedLine
RedLine payload
SectopRAT
Suspicious use of SetThreadContext
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-03-16 00:27
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-16 00:27
Reported
2024-03-16 00:30
Platform
win7-20240221-en
Max time kernel
138s
Max time network
150s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3020 set thread context of 2592 | N/A | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe
"C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe"
C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe
"C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe"
Network
| Country | Destination | Domain | Proto |
| RU | 45.93.4.12:80 | tcp | |
| RU | 45.93.4.12:80 | tcp | |
| RU | 45.93.4.12:80 | tcp | |
| RU | 45.93.4.12:80 | tcp | |
| RU | 45.93.4.12:80 | tcp |
Files
memory/3020-0-0x0000000000F10000-0x0000000000F42000-memory.dmp
memory/3020-1-0x0000000074830000-0x0000000074F1E000-memory.dmp
memory/3020-2-0x0000000004B40000-0x0000000004B80000-memory.dmp
memory/3020-3-0x0000000074830000-0x0000000074F1E000-memory.dmp
memory/3020-4-0x0000000004B40000-0x0000000004B80000-memory.dmp
memory/3020-5-0x0000000000390000-0x00000000003B2000-memory.dmp
memory/2592-6-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2592-7-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2592-8-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2592-9-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2592-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2592-12-0x0000000000400000-0x000000000041E000-memory.dmp
memory/3020-15-0x0000000074830000-0x0000000074F1E000-memory.dmp
memory/2592-17-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2592-14-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2592-18-0x0000000074140000-0x000000007482E000-memory.dmp
memory/2592-19-0x0000000000420000-0x0000000000460000-memory.dmp
memory/2592-20-0x0000000074140000-0x000000007482E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-16 00:27
Reported
2024-03-16 00:30
Platform
win10v2004-20240226-en
Max time kernel
140s
Max time network
154s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4072 set thread context of 2012 | N/A | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe
"C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3872 --field-trial-handle=2256,i,9172343514068348080,519219714517961765,262144 --variations-seed-version /prefetch:8
C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe
"C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe"
C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe
"C:\Users\Admin\AppData\Local\Temp\cca34ed59517003aa345928c18069494.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 13.107.246.64:443 | tcp | |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| RU | 45.93.4.12:80 | tcp | |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| RU | 45.93.4.12:80 | tcp | |
| RU | 45.93.4.12:80 | tcp | |
| RU | 45.93.4.12:80 | tcp | |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
Files
memory/4072-0-0x0000000074BC0000-0x0000000075370000-memory.dmp
memory/4072-1-0x0000000000150000-0x0000000000182000-memory.dmp
memory/4072-2-0x0000000005020000-0x00000000055C4000-memory.dmp
memory/4072-3-0x0000000004B70000-0x0000000004C02000-memory.dmp
memory/4072-4-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
memory/4072-5-0x0000000004C20000-0x0000000004C2A000-memory.dmp
memory/4072-6-0x0000000074BC0000-0x0000000075370000-memory.dmp
memory/4072-7-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
memory/4072-8-0x0000000004F30000-0x0000000004F52000-memory.dmp
memory/4072-9-0x00000000055D0000-0x0000000005646000-memory.dmp
memory/4072-10-0x0000000004FA0000-0x0000000004FBE000-memory.dmp
memory/2012-11-0x0000000000400000-0x000000000041E000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cca34ed59517003aa345928c18069494.exe.log
| MD5 | fb3264819f05b468156e37fecd7ca1e7 |
| SHA1 | 8461be627ec2c21766472ac5a9215204f6cd03d6 |
| SHA256 | 902e22368b4d29d67c78eb445d67c7e36001a79c7701a1e171a9c7af457a739c |
| SHA512 | ddcb2a199799dc30a5627d6bb2aff30aca350b52e15f574ecc9e9e9e4d388fd1fe808b5fd2a8ea7015c91e369a06f045be455bf070c6d20d8c3b1c06de8ef964 |
memory/4072-14-0x0000000074BC0000-0x0000000075370000-memory.dmp
memory/2012-15-0x0000000074BC0000-0x0000000075370000-memory.dmp
memory/2012-16-0x00000000055A0000-0x0000000005BB8000-memory.dmp
memory/2012-17-0x0000000005030000-0x0000000005042000-memory.dmp
memory/2012-18-0x0000000005090000-0x00000000050CC000-memory.dmp
memory/2012-19-0x0000000005080000-0x0000000005090000-memory.dmp
memory/2012-20-0x00000000050D0000-0x000000000511C000-memory.dmp
memory/2012-21-0x0000000005340000-0x000000000544A000-memory.dmp
memory/2012-22-0x0000000074BC0000-0x0000000075370000-memory.dmp
memory/2012-23-0x0000000005080000-0x0000000005090000-memory.dmp