Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe
Resource
win11-20240412-en
General
-
Target
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe
-
Size
196KB
-
MD5
edd7441051bbf509ef1052d9f2a02c8f
-
SHA1
7338ef9ddb0b59228b31c6b7931fae04ace344e8
-
SHA256
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30
-
SHA512
0aa4f2666213b571114cdd56c859200ab34a615cde57e67d142d4522369c74b8d4c37c9c95c97a76b93abbb0795ce698e4a888e646fdd2b05fe80f81da074f93
-
SSDEEP
3072:LhAMBSpVNwpB7/LaX6No7INoSXlb2Q4u3lriJYzr9B/erenNecMnq+ECqmIkk6:LaP+fvLW7IVXliQz3l//3Pyq+RqmI
Malware Config
Extracted
xworm
127.0.0.1:7000
91.92.252.220:7000
-
Install_directory
%Temp%
-
install_file
mstc.exe
-
telegram
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672
Extracted
redline
IDS
91.92.252.220:9078
Extracted
limerat
bc1q7p5qe345uqww9e4ut3nt08tu2lsgnvfsc40azt
-
aes_key
KILLER
-
antivm
false
-
c2_url
https://pastebin.com/raw/4EtQAvTV
-
delay
3
-
download_payload
false
-
install
true
-
install_name
browser.exe
-
main_folder
AppData
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\XClient.exe family_xworm behavioral1/memory/2988-21-0x0000000000E80000-0x0000000000E9C000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\build.exe family_redline behavioral1/memory/4928-28-0x0000000000200000-0x000000000021E000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\build.exe family_sectoprat behavioral1/memory/4928-28-0x0000000000200000-0x000000000021E000-memory.dmp family_sectoprat -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2988-110-0x000000001EFE0000-0x000000001F0FE000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exeXClient.exebrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation browser.exe -
Drops startup file 3 IoCs
Processes:
browser.exeXClient.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mstc.lnk browser.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mstc.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mstc.lnk XClient.exe -
Executes dropped EXE 5 IoCs
Processes:
XClient.exebuild.exebrowser.exemstc.exemstc.exepid process 2988 XClient.exe 4928 build.exe 2680 browser.exe 4492 mstc.exe 1640 mstc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
XClient.exebrowser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mstc.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mstc.exe" browser.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 32 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4032 schtasks.exe 4248 schtasks.exe 2180 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
XClient.exebrowser.exepid process 2988 XClient.exe 2680 browser.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeXClient.exepowershell.exepowershell.exepowershell.exepowershell.exebrowser.exepid process 2568 powershell.exe 2568 powershell.exe 2568 powershell.exe 4644 powershell.exe 4644 powershell.exe 4644 powershell.exe 3992 powershell.exe 3992 powershell.exe 3992 powershell.exe 4748 powershell.exe 4748 powershell.exe 4748 powershell.exe 2988 XClient.exe 2988 XClient.exe 1356 powershell.exe 1356 powershell.exe 1356 powershell.exe 2464 powershell.exe 2464 powershell.exe 2464 powershell.exe 3904 powershell.exe 3904 powershell.exe 3904 powershell.exe 3580 powershell.exe 3580 powershell.exe 3580 powershell.exe 2680 browser.exe 2680 browser.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
XClient.exebuild.exepowershell.exepowershell.exepowershell.exepowershell.exebrowser.exepowershell.exepowershell.exepowershell.exepowershell.exemstc.exemstc.exedescription pid process Token: SeDebugPrivilege 2988 XClient.exe Token: SeDebugPrivilege 4928 build.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 3992 powershell.exe Token: SeDebugPrivilege 4748 powershell.exe Token: SeDebugPrivilege 2988 XClient.exe Token: SeDebugPrivilege 2680 browser.exe Token: SeDebugPrivilege 1356 powershell.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 3904 powershell.exe Token: SeDebugPrivilege 3580 powershell.exe Token: SeDebugPrivilege 2680 browser.exe Token: SeDebugPrivilege 4492 mstc.exe Token: SeDebugPrivilege 1640 mstc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
XClient.exebrowser.exepid process 2988 XClient.exe 2680 browser.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exeXClient.exebrowser.exedescription pid process target process PID 2192 wrote to memory of 2988 2192 500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe XClient.exe PID 2192 wrote to memory of 2988 2192 500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe XClient.exe PID 2192 wrote to memory of 4928 2192 500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe build.exe PID 2192 wrote to memory of 4928 2192 500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe build.exe PID 2192 wrote to memory of 4928 2192 500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe build.exe PID 2988 wrote to memory of 2568 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 2568 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 4644 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 4644 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 3992 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 3992 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 4748 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 4748 2988 XClient.exe powershell.exe PID 2988 wrote to memory of 4032 2988 XClient.exe schtasks.exe PID 2988 wrote to memory of 4032 2988 XClient.exe schtasks.exe PID 2988 wrote to memory of 4248 2988 XClient.exe schtasks.exe PID 2988 wrote to memory of 4248 2988 XClient.exe schtasks.exe PID 2988 wrote to memory of 2680 2988 XClient.exe browser.exe PID 2988 wrote to memory of 2680 2988 XClient.exe browser.exe PID 2680 wrote to memory of 1356 2680 browser.exe powershell.exe PID 2680 wrote to memory of 1356 2680 browser.exe powershell.exe PID 2680 wrote to memory of 2464 2680 browser.exe powershell.exe PID 2680 wrote to memory of 2464 2680 browser.exe powershell.exe PID 2680 wrote to memory of 3904 2680 browser.exe powershell.exe PID 2680 wrote to memory of 3904 2680 browser.exe powershell.exe PID 2680 wrote to memory of 3580 2680 browser.exe powershell.exe PID 2680 wrote to memory of 3580 2680 browser.exe powershell.exe PID 2680 wrote to memory of 2180 2680 browser.exe schtasks.exe PID 2680 wrote to memory of 2180 2680 browser.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe"C:\Users\Admin\AppData\Local\Temp\500b51771f03e61f1c46fc29c2a786201c123ae5f0369bd1664992bd7c434a30.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\ProgramData\XClient.exe"C:\ProgramData\XClient.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\mstc.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mstc.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mstc" /tr "C:\Users\Admin\AppData\Local\Temp\mstc.exe"3⤵
- Creates scheduled task(s)
PID:4032
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\browser.exe'"3⤵
- Creates scheduled task(s)
PID:4248
-
-
C:\Users\Admin\AppData\Roaming\browser.exe"C:\Users\Admin\AppData\Roaming\browser.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\browser.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'browser.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\mstc.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mstc.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mstc" /tr "C:\Users\Admin\AppData\Local\Temp\mstc.exe"4⤵
- Creates scheduled task(s)
PID:2180
-
-
-
-
C:\ProgramData\build.exe"C:\ProgramData\build.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\mstc.exeC:\Users\Admin\AppData\Local\Temp\mstc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
C:\Users\Admin\AppData\Local\Temp\mstc.exeC:\Users\Admin\AppData\Local\Temp\mstc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD55b7ac9829cdca0b5e82604191dcc1d4e
SHA15e944b6afea5db67b4d272a7b02bdf5501ca213f
SHA256bc8306a6f60583de0b2a2818f1f9d1df8e80ef29dcf46b9471e4697f219e1251
SHA512505491b019e948b14500867e927c9ab48642571733b944afc054922ed46a25eebbfae1615500e4755b0f022e5993cc4bd5124cf27c218a118070812e92bc1b33
-
Filesize
95KB
MD5d32bddd3639f42733a78945885002128
SHA16dcfc09b8c86e79ac70a63132a5162d3616c6479
SHA25634dac9b900a3c810e466f9cac9ba5f0a062ff2be7719fc443cb23d0f8ac0390e
SHA512b28fc39e77245d5a52ae5d25ac363c95db8b20a960caabc7aa4f3339b2a8d27f7f92846e2a4173fd0f776be4034fbfe5e60b375eebb465dbe78017d8479ad511
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5440cb38dbee06645cc8b74d51f6e5f71
SHA1d7e61da91dc4502e9ae83281b88c1e48584edb7c
SHA2568ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe
SHA5123aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6
-
Filesize
944B
MD515dde0683cd1ca19785d7262f554ba93
SHA1d039c577e438546d10ac64837b05da480d06bf69
SHA256d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961
SHA51257c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672
-
Filesize
944B
MD5d7b8fb3b4eb9e5513fa1a273e613b817
SHA158273b4372810d70d1dc52f09907952d0ee28488
SHA256bc17d2fadb38424043681010c51e123738d2d3c9a6892d0fa91d96b9f8ffd194
SHA512c8402c01cb5521f8d826f80d7cba33431e8534818bb4e89af1c2c8e28104c46d234a1f66e4ec58a4b46e7391a81e9d1c1b73e5c85e20c06147adf488ac17a70c
-
Filesize
944B
MD534f595487e6bfd1d11c7de88ee50356a
SHA14caad088c15766cc0fa1f42009260e9a02f953bb
SHA2560f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d
SHA51210976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b
-
Filesize
944B
MD5e60eb305a7b2d9907488068b7065abd3
SHA11643dd7f915ac50c75bc01c53d68c5dafb9ce28d
SHA256ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135
SHA51295c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b
-
Filesize
944B
MD5e6b9e03dcde217fc7d1692b3d65233d7
SHA167367ef59dbc1661ff29d6fe5ce3ed3d39678044
SHA256790c142b39325b5bcf07c2d7b8afb8fb3b6f8c1e99a39ce5870b2ef043d8cfdd
SHA5128f34d037a97f1131ff9863c10ff7cf7f029c2973c5f32fcee1751cd47a5b7cfc3bf5b6c30ada08f3793918e600d4a45f8cb8d22502b693c6a9aeba9d0d504410
-
Filesize
944B
MD5dbb22d95851b93abf2afe8fb96a8e544
SHA1920ec5fdb323537bcf78f7e29a4fc274e657f7a4
SHA256e1ee9af6b9e3bfd41b7d2c980580bb7427883f1169ed3df4be11293ce7895465
SHA51216031134458bf312509044a3028be46034c544163c4ca956aee74d2075fbeb5873754d2254dc1d0b573ce1a644336ac4c8bd7147aba100bfdac8c504900ef3fc
-
Filesize
944B
MD5cae60f0ddddac635da71bba775a2c5b4
SHA1386f1a036af61345a7d303d45f5230e2df817477
SHA256b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16
SHA51228ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD56179671de71480eaf90e8264dd4482a1
SHA17d5168fa6bbf7e9e863da27e179f06c98da13007
SHA2561a7fc9d084a8a6677fca31479d507f6b4e6abb718b6d788cc647c0fa8144022f
SHA51247c0d6c94527ef5760080d493b411ca252d3591731a3b7835334457b6ecc5822cb7daee4e0e0a9647235f0ed4edc756da00ff869798c1fc4fcaeb02a835ace00