Analysis
-
max time kernel
279s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 21:15
Static task
static1
1 signatures
General
-
Target
HWID Spoofer.exe
-
Size
416KB
-
MD5
5de4c72bce14113d19cbfa33964b27b9
-
SHA1
f645ef666f062175e57c94a9b48e9a3fdef1c99d
-
SHA256
9b32c009b988670f78883b30f9a0bae23395192201f371f051e22951038ce266
-
SHA512
ce586245a154e7dad32fecbf5e2497e99361c80233bfdb2b39bd16c1abccc1eac0350d60a02a330503fab75b89948f913fdc6d85da0602e6affed4c5c544f261
-
SSDEEP
12288:aJcsKRRnIYVD0FiKvgjjsbyqgc8o/OvpOYl31LU:aJcX/V4CjsbyqF/OvgYFa
Malware Config
Extracted
Family
redline
Botnet
@bigkoss
C2
51.254.69.209:48987
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2448-13-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2448-13-0x0000000000400000-0x0000000000422000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HWID Spoofer.exedescription pid process target process PID 1092 set thread context of 2448 1092 HWID Spoofer.exe RegSvcs.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HWID Spoofer.exeRegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HWID Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
HWID Spoofer.exedescription pid process target process PID 1092 wrote to memory of 2448 1092 HWID Spoofer.exe RegSvcs.exe PID 1092 wrote to memory of 2448 1092 HWID Spoofer.exe RegSvcs.exe PID 1092 wrote to memory of 2448 1092 HWID Spoofer.exe RegSvcs.exe PID 1092 wrote to memory of 2448 1092 HWID Spoofer.exe RegSvcs.exe PID 1092 wrote to memory of 2448 1092 HWID Spoofer.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HWID Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\HWID Spoofer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2448