Malware Analysis Report

2024-09-11 08:41

Sample ID 240501-gtq6gahf5y
Target TELECITY COMANY PURCHASE order LIST.exe
SHA256 4fc03c15ef9949cbeb27fadd3b9c65ff798141bcb30590c6e770e79bc8232737
Tags
redline sectoprat cheat infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4fc03c15ef9949cbeb27fadd3b9c65ff798141bcb30590c6e770e79bc8232737

Threat Level: Known bad

The file TELECITY COMANY PURCHASE order LIST.exe was found to be: Known bad.

Malicious Activity Summary

redline sectoprat cheat infostealer rat trojan

RedLine payload

SectopRAT payload

SectopRAT

RedLine

Loads dropped DLL

Executes dropped EXE

Checks computer location settings

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-01 06:06

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-01 06:06

Reported

2024-05-01 06:08

Platform

win7-20240215-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe"

Signatures

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2108 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2108 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2108 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2108 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2572 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2572 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2572 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2572 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 2572 wrote to memory of 2156 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

Processes

C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe

"C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

Network

N/A

Files

memory/2108-4-0x0000000002290000-0x00000000022A0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

MD5 5e1f47df7bc7d9b80fe2ea5c04855ef4
SHA1 dad41763607a024c3c161d6d1a48309d15017328
SHA256 589e3616ce7e091b3d4f38ffc5217154fbea5f46ec77f0e7dc3aa09e60ac096b
SHA512 8e4980b8b9ce6dfb38741267c01b8a7eaca2ae6512917aeb979f1fcff701e16b15d4bb8ad16c72ecec97b51924795f7aba20039f547172aa9744219711cf7e94

memory/2572-17-0x00000000003A0000-0x0000000000432000-memory.dmp

memory/2572-18-0x00000000743F0000-0x0000000074ADE000-memory.dmp

memory/2572-19-0x0000000004E90000-0x0000000004ED0000-memory.dmp

memory/2572-20-0x0000000000390000-0x00000000003A6000-memory.dmp

memory/2572-21-0x0000000000590000-0x00000000005A6000-memory.dmp

memory/2572-22-0x0000000004560000-0x00000000045C0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.jpg

MD5 e83ccb51ee74efd2a221be293d23c69a
SHA1 4365ca564f7cdd7337cf0f83ac5fd64317fb4c32
SHA256 da931852a19a707d01c3edf138622b8601056c42525f8ac40cb48af43a7410cc
SHA512 0252e629fbdafdb66ff63ef76d18f25d1ca46ac3eff019f012361db45ebd34d1a7a9ad35f7a2fc5830676c771997633f3abf1dc3224bd8f6bd55456b0a554a46

memory/2572-34-0x00000000743F0000-0x0000000074ADE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-01 06:06

Reported

2024-05-01 06:08

Platform

win10v2004-20240419-en

Max time kernel

129s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3440 set thread context of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4928 wrote to memory of 3440 N/A C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4928 wrote to memory of 3440 N/A C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 4928 wrote to memory of 3440 N/A C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 4536 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3440 wrote to memory of 4536 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3440 wrote to memory of 4536 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe
PID 3440 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

Processes

C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe

"C:\Users\Admin\AppData\Local\Temp\TELECITY COMANY PURCHASE order LIST.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
NL 45.137.22.186:55615 tcp
US 8.8.8.8:53 g.bing.com udp
NL 45.137.22.186:55615 tcp
NL 45.137.22.186:55615 tcp
NL 45.137.22.186:55615 tcp
NL 45.137.22.186:55615 tcp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.exe

MD5 5e1f47df7bc7d9b80fe2ea5c04855ef4
SHA1 dad41763607a024c3c161d6d1a48309d15017328
SHA256 589e3616ce7e091b3d4f38ffc5217154fbea5f46ec77f0e7dc3aa09e60ac096b
SHA512 8e4980b8b9ce6dfb38741267c01b8a7eaca2ae6512917aeb979f1fcff701e16b15d4bb8ad16c72ecec97b51924795f7aba20039f547172aa9744219711cf7e94

memory/3440-14-0x00000000004B0000-0x0000000000542000-memory.dmp

memory/3440-15-0x00000000746F0000-0x0000000074EA0000-memory.dmp

memory/3440-16-0x0000000005540000-0x0000000005AE4000-memory.dmp

memory/3440-17-0x0000000004F90000-0x0000000005022000-memory.dmp

memory/3440-18-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

memory/3440-19-0x0000000004F40000-0x0000000004F4A000-memory.dmp

memory/3440-20-0x0000000004F70000-0x0000000004F86000-memory.dmp

memory/3440-21-0x00000000051D0000-0x00000000051E6000-memory.dmp

memory/3440-22-0x00000000063F0000-0x0000000006450000-memory.dmp

memory/3440-23-0x0000000008AA0000-0x0000000008B3C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\PO.jpg

MD5 e83ccb51ee74efd2a221be293d23c69a
SHA1 4365ca564f7cdd7337cf0f83ac5fd64317fb4c32
SHA256 da931852a19a707d01c3edf138622b8601056c42525f8ac40cb48af43a7410cc
SHA512 0252e629fbdafdb66ff63ef76d18f25d1ca46ac3eff019f012361db45ebd34d1a7a9ad35f7a2fc5830676c771997633f3abf1dc3224bd8f6bd55456b0a554a46

memory/3704-25-0x0000000000400000-0x000000000041E000-memory.dmp

memory/4536-28-0x0000000002E30000-0x0000000002E66000-memory.dmp

memory/3440-29-0x00000000746F0000-0x0000000074EA0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO.exe.log

MD5 11eacbaf9bddbe05b02b6dc4cd9872ea
SHA1 6e57b21f23521bb174ff36b6e5c8d14924914e9e
SHA256 08e026372f53d74354b848cb6ef85b59a0612d67dd993fb77def1fa5355391f1
SHA512 99c057a53a0d69b093e359104dda834967e4132f76192e80e79512f465e6fca41325865eec92bca0f11ff4f00c98c185d2d183e56edee964377ea9d4a234961c

memory/4536-31-0x0000000005910000-0x0000000005F38000-memory.dmp

memory/3704-33-0x0000000005F50000-0x0000000006568000-memory.dmp

memory/4536-35-0x0000000006680000-0x00000000066E6000-memory.dmp

memory/3704-36-0x0000000005870000-0x0000000005882000-memory.dmp

memory/4536-34-0x0000000006610000-0x0000000006676000-memory.dmp

memory/4536-32-0x0000000006570000-0x0000000006592000-memory.dmp

memory/3704-42-0x00000000058D0000-0x000000000590C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dm4nodyz.o2w.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4536-47-0x00000000060C0000-0x0000000006414000-memory.dmp

memory/3704-48-0x0000000005930000-0x000000000597C000-memory.dmp

memory/4536-49-0x00000000067D0000-0x00000000067EE000-memory.dmp

memory/3704-50-0x0000000005B70000-0x0000000005C7A000-memory.dmp

memory/4536-51-0x00000000077A0000-0x00000000077D2000-memory.dmp

memory/4536-52-0x0000000070FB0000-0x0000000070FFC000-memory.dmp

memory/4536-62-0x0000000006DA0000-0x0000000006DBE000-memory.dmp

memory/4536-63-0x00000000079E0000-0x0000000007A83000-memory.dmp

memory/4536-64-0x0000000008140000-0x00000000087BA000-memory.dmp

memory/4536-65-0x0000000007B00000-0x0000000007B1A000-memory.dmp

memory/4536-66-0x0000000007B70000-0x0000000007B7A000-memory.dmp

memory/4536-67-0x0000000007D80000-0x0000000007E16000-memory.dmp

memory/4536-68-0x0000000007D00000-0x0000000007D11000-memory.dmp

memory/4536-69-0x0000000007D30000-0x0000000007D3E000-memory.dmp

memory/4536-70-0x0000000007D40000-0x0000000007D54000-memory.dmp

memory/4536-71-0x0000000007E40000-0x0000000007E5A000-memory.dmp

memory/4536-72-0x0000000007E20000-0x0000000007E28000-memory.dmp