Resubmissions

29-05-2024 19:19

240529-x1mdvsff69 10

29-05-2024 15:30

240529-sxgxrabc59 10

Analysis

  • max time kernel
    66s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 15:30

General

  • Target

    3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe

  • Size

    523KB

  • MD5

    e336cd749eb4e599192906f8d61d0bb2

  • SHA1

    6d431812efb3c52e0bdd44d2602bca486eacc451

  • SHA256

    3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4

  • SHA512

    8e18ce1501dbf77ca2af6cf6d7c0813501b2e94c61e859878370e872c93b79d7019430391b4916296e7f62079d2408a37ff0cdab0260d67b437eb88310d1fb84

  • SSDEEP

    12288:5cO61A772/5RMH4Gj63oiwKeWq6GXiS+qdYYn86v:U+XQRMYGSFFq6G53nv

Malware Config

Extracted

Family

redline

Botnet

xxl

C2

2.56.59.101:17559

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe
    "C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe
      "C:\Users\Admin\AppData\Local\Temp\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3780
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3bd982f82a1b2f074b02fe7cc7413f1e083f19108ae2612b2b5a741a9858f7f4.exe.log

    Filesize

    1KB

    MD5

    e08f822522c617a40840c62e4b0fb45e

    SHA1

    ae516dca4da5234be6676d3f234c19ec55725be7

    SHA256

    bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7

    SHA512

    894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4

  • memory/3780-26-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/3780-34-0x0000000005B90000-0x0000000005C9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3780-33-0x0000000005930000-0x000000000597C000-memory.dmp

    Filesize

    304KB

  • memory/3780-32-0x00000000058F0000-0x000000000592C000-memory.dmp

    Filesize

    240KB

  • memory/3780-31-0x0000000005850000-0x0000000005862000-memory.dmp

    Filesize

    72KB

  • memory/3780-30-0x0000000005DF0000-0x0000000006408000-memory.dmp

    Filesize

    6.1MB

  • memory/4636-24-0x0000000007DB0000-0x0000000007E16000-memory.dmp

    Filesize

    408KB

  • memory/4636-5-0x00000000750F0000-0x00000000758A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4636-1-0x0000000000640000-0x00000000006C8000-memory.dmp

    Filesize

    544KB

  • memory/4636-2-0x00000000055F0000-0x0000000005B94000-memory.dmp

    Filesize

    5.6MB

  • memory/4636-3-0x00000000050E0000-0x0000000005172000-memory.dmp

    Filesize

    584KB

  • memory/4636-4-0x00000000050C0000-0x00000000050CA000-memory.dmp

    Filesize

    40KB

  • memory/4636-8-0x00000000750F0000-0x00000000758A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4636-0-0x00000000750FE000-0x00000000750FF000-memory.dmp

    Filesize

    4KB

  • memory/4636-6-0x00000000055D0000-0x00000000055E6000-memory.dmp

    Filesize

    88KB

  • memory/4636-29-0x00000000750F0000-0x00000000758A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4636-7-0x00000000750FE000-0x00000000750FF000-memory.dmp

    Filesize

    4KB

  • memory/4636-25-0x0000000007D40000-0x0000000007D5E000-memory.dmp

    Filesize

    120KB

  • memory/4636-22-0x0000000007B40000-0x0000000007BDC000-memory.dmp

    Filesize

    624KB

  • memory/4636-23-0x0000000007C60000-0x0000000007CDC000-memory.dmp

    Filesize

    496KB

  • memory/4952-20-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-15-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-16-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-17-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-18-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-19-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-21-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-10-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-11-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB

  • memory/4952-9-0x000002B539DC0000-0x000002B539DC1000-memory.dmp

    Filesize

    4KB