Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 16:23

General

  • Target

    2d1b096a33d1b673fd06db9f3e861761.rtf

  • Size

    604KB

  • MD5

    2d1b096a33d1b673fd06db9f3e861761

  • SHA1

    3c0a1d1bd1b54381df8769ecc173e8635fea366e

  • SHA256

    bf89362748b9e66c11aaa49ddf83b1665fe038d04225b36de4f26cffc11a0f3d

  • SHA512

    32156517472c8c4a6998e58bb90e0a684516a11c403d87524a8561f647901cdb9413dd71b55df4de52c88e5e522e06ee9565fc6dc653ec8f49ba5c58a3d5034e

  • SSDEEP

    6144:IwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAqtUn:+u

Malware Config

Extracted

Family

redline

Botnet

wordfile

C2

185.38.142.10:7474

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2d1b096a33d1b673fd06db9f3e861761.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1252
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Users\Admin\AppData\Roaming\notorious53209.exe
        "C:\Users\Admin\AppData\Roaming\notorious53209.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Roaming\notorious53209.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e6c8740f40e4f193d3094e41f9654601

      SHA1

      7c8328082b64bc55fb4cbe908a7f6cec06c0078c

      SHA256

      021cd690dd6ffeca6f476fcc56b16023603b0cf86abd863b9133a552384c3c0e

      SHA512

      774e7478b022668a4486eb8341b12fe6360d7c633ade27552f8920b7537a7b44555cbd21fab9e69d26f04320f1f75bfb8bf34207b1873dfc8bda822a3989b4ce

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      51f1e87c7ad34fd4c7b90b46ff589f0e

      SHA1

      ecfcdd5a43b735ad73007cdaad96f721087abd45

      SHA256

      3fc14393aa14849154cfdeaedb7d4ae8ff26fd967fc225bf4bb33e1113d61408

      SHA512

      ef45e75372cf9f310043ea3e69bbadc90f7ff8b79d5d6874804c8971bb2a50e3d77b1db4a03b94a6d6ad3df57e71747fca3bd563b1541f4745fb7a4ee2b2c142

    • C:\Users\Admin\AppData\Local\Temp\Cab8D51.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar8D74.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\tmp9D08.tmp

      Filesize

      46KB

      MD5

      02d2c46697e3714e49f46b680b9a6b83

      SHA1

      84f98b56d49f01e9b6b76a4e21accf64fd319140

      SHA256

      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

      SHA512

      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

    • C:\Users\Admin\AppData\Local\Temp\tmp9D2D.tmp

      Filesize

      92KB

      MD5

      9da83032394b54144d4c2a3ae7cdfbce

      SHA1

      b85d3a0ff5006c2c1d7270500d7849d373f597b7

      SHA256

      90708648aa3da58b81497a0bc395507906d89d39583d6ad8dcb4e0d417bdc084

      SHA512

      17cb5c7cf40433e75a6240c2eaffd22bd77f5076c1904041670dd8609769e9c970499f85fc18354782c548fc0739df954dc44a9e1ff40d427a5b4f0d278417f3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      a89bc2e98039be8dd6f5c6a859003cdf

      SHA1

      aabdf517b7a7bada6f6e76ff0a7bdae3091c6679

      SHA256

      b48c8950c55d0fd13f9c8864a554694378359b1160ecd42dfb68bf4d08375c14

      SHA512

      6fd65601cc0f1faf5ee0c2377dafd100d546dd0c341558a22a2add1f5756bbf8c56fc2de338c0979bc84a114cd063799bc6f772dddfbafdda25f7599adad4768

    • C:\Users\Admin\AppData\Roaming\notorious53209.exe

      Filesize

      629KB

      MD5

      901a623dbccaa22525373cd36195ee14

      SHA1

      9adb6dddb68cd7e116da9392e7ee63a8fa394495

      SHA256

      b5e250a95073b5dfe33f66c13cc89da0fc8d3af226e5efb06bb8fcfd9a4cd6ec

      SHA512

      eabeba0eb9ae7e39577a7e313e50807cee1b888f1c8ff0fa375e5de9451a66471c791c23ea4f4af85151f96b065d55e8c1320026d8503a048a3e5968f8effc1d

    • memory/2464-50-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2464-49-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2464-46-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2628-28-0x0000000004B30000-0x0000000004C97000-memory.dmp

      Filesize

      1.4MB

    • memory/2700-48-0x0000000000D80000-0x0000000000EE7000-memory.dmp

      Filesize

      1.4MB

    • memory/2700-29-0x0000000000D80000-0x0000000000EE7000-memory.dmp

      Filesize

      1.4MB

    • memory/2852-0-0x000000002F3E1000-0x000000002F3E2000-memory.dmp

      Filesize

      4KB

    • memory/2852-2-0x000000007173D000-0x0000000071748000-memory.dmp

      Filesize

      44KB

    • memory/2852-217-0x000000007173D000-0x0000000071748000-memory.dmp

      Filesize

      44KB

    • memory/2852-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2852-238-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB