Analysis
-
max time kernel
115s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 15:52
Behavioral task
behavioral1
Sample
RedStar.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
General
-
Target
RedStar.exe
-
Size
45KB
-
MD5
b7e4200a8a35c06a5702cf96ae3cf113
-
SHA1
98acd37605ced37c29717181ab76650f26069d6a
-
SHA256
86b83b2e1ea05d9cc2f79c8d12b63ed4a9c47227943bbd0d1748c16b850e1b3a
-
SHA512
d1c75a593124a5c4ee0fb745d97046a54dd72bb5cb76a730a497070bbe4f9d6f0df40ade1c7b88bbc114eee1c5ef98de2d40770be13f60d2fb56382b5e8e5bf7
-
SSDEEP
768:/dhO/poiiUcjlJInJFH9Xqk5nWEZ5SbTDantWI7CPW5V:1w+jjgnXH9XqcnW85SbTEWId
Malware Config
Extracted
Family
xenorat
C2
krecgh.4cloud.click
Mutex
Xeno_rat_nd8912d
Attributes
-
delay
5000
-
install_path
nothingset
-
port
3398
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RedStar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe 5072 RedStar.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5072 RedStar.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4996 5072 RedStar.exe 91 PID 5072 wrote to memory of 4996 5072 RedStar.exe 91 PID 5072 wrote to memory of 4996 5072 RedStar.exe 91 PID 5072 wrote to memory of 928 5072 RedStar.exe 93 PID 5072 wrote to memory of 928 5072 RedStar.exe 93 PID 5072 wrote to memory of 928 5072 RedStar.exe 93 PID 928 wrote to memory of 4428 928 cmd.exe 95 PID 928 wrote to memory of 4428 928 cmd.exe 95 PID 928 wrote to memory of 4428 928 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\RedStar.exe"C:\Users\Admin\AppData\Local\Temp\RedStar.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query /v /fo csv2⤵PID:4996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RedStar.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:4428
-
-