Analysis
-
max time kernel
196s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe
Resource
win7-20240221-en
General
-
Target
339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe
-
Size
442KB
-
MD5
34468074c946943518ab33be24c01ef9
-
SHA1
742cf7ff13dcab6a99b372dc99f362f45be3d69c
-
SHA256
339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99
-
SHA512
b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b
-
SSDEEP
6144:9qIH8p8GgMyYRhuPTMCGzlmJDZWgECsFjKdJtH3s5ZBjnA:9d8p8GgAWP4CYE4BCsmdJFij0
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
5.42.65.68:29093
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2460-52-0x0000000002750000-0x00000000027A8000-memory.dmp family_redline behavioral1/memory/2460-58-0x0000000005080000-0x00000000050C0000-memory.dmp family_redline behavioral1/memory/2460-59-0x0000000005080000-0x00000000050C0000-memory.dmp family_redline behavioral1/memory/2460-60-0x0000000002840000-0x0000000002896000-memory.dmp family_redline behavioral1/memory/2460-61-0x0000000005080000-0x00000000050C0000-memory.dmp family_redline -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 10 2500 rundll32.exe 13 992 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Dctooux.exenativecrypt6.exepid process 2996 Dctooux.exe 2460 nativecrypt6.exe -
Loads dropped DLL 17 IoCs
Processes:
339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exeDctooux.exerundll32.exerundll32.exerundll32.exepid process 2208 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe 2208 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe 2996 Dctooux.exe 2996 Dctooux.exe 2996 Dctooux.exe 1456 rundll32.exe 1456 rundll32.exe 1456 rundll32.exe 1456 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 992 rundll32.exe 992 rundll32.exe 992 rundll32.exe 992 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
nativecrypt6.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 nativecrypt6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 nativecrypt6.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
nativecrypt6.exerundll32.exepowershell.exepid process 2460 nativecrypt6.exe 2460 nativecrypt6.exe 2460 nativecrypt6.exe 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 3024 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
nativecrypt6.exepowershell.exedescription pid process Token: SeDebugPrivilege 2460 nativecrypt6.exe Token: SeDebugPrivilege 3024 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exepid process 2208 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exeDctooux.exerundll32.exerundll32.exedescription pid process target process PID 2208 wrote to memory of 2996 2208 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe Dctooux.exe PID 2208 wrote to memory of 2996 2208 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe Dctooux.exe PID 2208 wrote to memory of 2996 2208 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe Dctooux.exe PID 2208 wrote to memory of 2996 2208 339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe Dctooux.exe PID 2996 wrote to memory of 2432 2996 Dctooux.exe Dctooux.exe PID 2996 wrote to memory of 2432 2996 Dctooux.exe Dctooux.exe PID 2996 wrote to memory of 2432 2996 Dctooux.exe Dctooux.exe PID 2996 wrote to memory of 2432 2996 Dctooux.exe Dctooux.exe PID 2996 wrote to memory of 2460 2996 Dctooux.exe nativecrypt6.exe PID 2996 wrote to memory of 2460 2996 Dctooux.exe nativecrypt6.exe PID 2996 wrote to memory of 2460 2996 Dctooux.exe nativecrypt6.exe PID 2996 wrote to memory of 2460 2996 Dctooux.exe nativecrypt6.exe PID 2996 wrote to memory of 1456 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 1456 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 1456 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 1456 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 1456 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 1456 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 1456 2996 Dctooux.exe rundll32.exe PID 1456 wrote to memory of 2500 1456 rundll32.exe rundll32.exe PID 1456 wrote to memory of 2500 1456 rundll32.exe rundll32.exe PID 1456 wrote to memory of 2500 1456 rundll32.exe rundll32.exe PID 1456 wrote to memory of 2500 1456 rundll32.exe rundll32.exe PID 2500 wrote to memory of 2040 2500 rundll32.exe netsh.exe PID 2500 wrote to memory of 2040 2500 rundll32.exe netsh.exe PID 2500 wrote to memory of 2040 2500 rundll32.exe netsh.exe PID 2500 wrote to memory of 3024 2500 rundll32.exe powershell.exe PID 2500 wrote to memory of 3024 2500 rundll32.exe powershell.exe PID 2500 wrote to memory of 3024 2500 rundll32.exe powershell.exe PID 2996 wrote to memory of 992 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 992 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 992 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 992 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 992 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 992 2996 Dctooux.exe rundll32.exe PID 2996 wrote to memory of 992 2996 Dctooux.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe"C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"3⤵PID:2432
-
-
C:\Users\Admin\1000071002\nativecrypt6.exe"C:\Users\Admin\1000071002\nativecrypt6.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\780967622241_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD5ef4b0d33ed0eb8ec64c7073ea8409cad
SHA1b3c1b0b7e282a26bcc4ddb84cfac0437e3cff209
SHA25637c593afa2791249363f27cb2818fe560338c9abdfb2b270b26a88696a87c3e9
SHA51221076c222c0ee27ad88b682639bc82d8be50a0d369a5eec7a66023b0a8ced6cc9348b5b6cc7794c22269adc9b9faa38503276ba4b2d7e922beb1ce0e575a6228
-
Filesize
209KB
MD59dc9a30b108891bf4401c1228fbc2fd3
SHA1022fb1f2afa939a3dd23fbacc96680e49e52cf29
SHA256ae451a9151db8f679feee8190d7fb9ee7a87fc5772937a6c0ef1bbf3309d4f1e
SHA5125998fe9c9c63efdb6cd7fa9b404f4b5dad8f0fa9dc355c7b0badc3cb3e7dff503e8eae576e61a4ecdb7516fb89dc65e62b7c544ff5a58201164223d38748773f
-
Filesize
72KB
MD57e322a31725a194aeeb73782d65b6955
SHA1c9a938b4a9acb04f55eb83afd33ccfc989132275
SHA2562b64997c4a78ab462429480f47f7278cde1f1c5a6abb389da82c22f4fa63b6bb
SHA5124c1ca38122abcd8d3582e437791e71c91a23bf411ec4c55c9a3bd7d8078fd040e7bee4075bd65c5d48df5b9934ea5d477dc596be62bad042c10a634f3573e59e
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
109KB
MD5ca684dc5ebed4381701a39f1cc3a0fb2
SHA18c4a375aa583bd1c705597a7f45fd18934276770
SHA256b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2
SHA5128b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510
-
Filesize
1.2MB
MD54876ee75ce2712147c41ff1277cd2d30
SHA13733dc92318f0c6b92cb201e49151686281acda6
SHA256bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed
SHA5129bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9
-
Filesize
256KB
MD5f595ffdebbeaa59b0f3df799fc248304
SHA1fa73ec0145d4b8ebdcad4a547ccdb3aaf6d781cb
SHA2565bfda9d3d6c679202fcc1b0c4e0697fb5d799a0a0aced08a7852fd4c329a2a57
SHA5124d9f84aacaa87871a766ea8084bf894a69d295a06c0fa98ac8cb84c51cb95e9384dd08cb29d2db830e27cb210b19fc52699e0aca59b31caac7b04353f2359c15
-
Filesize
263KB
MD5e718c5d7462bb9b897f7b6777147f300
SHA11c8ea8a7848933c404bb2e290d91aeacf1e96f38
SHA256c6be0116cb1a332c8e17272eadb73ddcc253563197a2e440793dd20e956dfe10
SHA5120ed726d66305b66d1887f0756899f93b1bd8bf78555b6bb81c13f4ae7f96d2d9b6804fc3f1c5a57a70b8359cb1a68d3244d6afae098f040ae4e3b19ace879d01
-
Filesize
442KB
MD534468074c946943518ab33be24c01ef9
SHA1742cf7ff13dcab6a99b372dc99f362f45be3d69c
SHA256339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99
SHA512b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b