Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 14:27
Behavioral task
behavioral1
Sample
0x00080000000162ed-1051.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0x00080000000162ed-1051.exe
Resource
win10v2004-20240802-en
General
-
Target
0x00080000000162ed-1051.exe
-
Size
45KB
-
MD5
3b86abe4c79286ed06965c268968c03d
-
SHA1
64afe64ee719aa3526023a5f7edacd44db21bde4
-
SHA256
47a46de105177d826cbda74051f7f9d7bb95ed079c2e636743f9f04ad8c6c4a7
-
SHA512
68f108646437fd72622cd1f719b2092b095e67500502981c4b605c64acaa38c12f46a82e47318b405137e5112ff82ccb51bfbb953b67fd3d1e9a5de1c2874483
-
SSDEEP
768:juAKNTR4ydbWUnrGJmo2q7zL5P02FUFdxYkk8PIWzjbAgX3ih8QNd4sqyVUbGKZ9:juAKNTRZ22oLDmWBW3bnXSh8QN6sqEWh
Malware Config
Extracted
asyncrat
0.5.8
blue.o7lab.me:7777
server.underground-cheat.xyz:7777
dtDtRWyW1m1g
-
delay
3
-
install
false
-
install_file
$77WinUpdate.exe
-
install_folder
%AppData%
Extracted
redline
server.underground-cheat.xyz
server.underground-cheat.xyz:1337
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000016d07-1109.dat family_redline behavioral1/memory/4992-1112-0x0000000000B40000-0x0000000000B5E000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000016d07-1109.dat family_sectoprat behavioral1/memory/4992-1112-0x0000000000B40000-0x0000000000B5E000-memory.dmp family_sectoprat -
Executes dropped EXE 2 IoCs
pid Process 2732 vnmwez.exe 4992 zgvlid.exe -
Loads dropped DLL 2 IoCs
pid Process 2544 powershell.exe 4924 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Twhyp = "C:\\Users\\Admin\\AppData\\Local\\Twhyp.exe" vnmwez.exe -
pid Process 2544 powershell.exe 4924 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgvlid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0x00080000000162ed-1051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnmwez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4884 ipconfig.exe 2380 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1948 0x00080000000162ed-1051.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 4924 powershell.exe 1948 0x00080000000162ed-1051.exe 4924 powershell.exe 4924 powershell.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe 2732 vnmwez.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1948 0x00080000000162ed-1051.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2732 vnmwez.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 4992 zgvlid.exe Token: SeDebugPrivilege 2732 vnmwez.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2504 1948 0x00080000000162ed-1051.exe 31 PID 1948 wrote to memory of 2504 1948 0x00080000000162ed-1051.exe 31 PID 1948 wrote to memory of 2504 1948 0x00080000000162ed-1051.exe 31 PID 1948 wrote to memory of 2504 1948 0x00080000000162ed-1051.exe 31 PID 2504 wrote to memory of 2544 2504 cmd.exe 33 PID 2504 wrote to memory of 2544 2504 cmd.exe 33 PID 2504 wrote to memory of 2544 2504 cmd.exe 33 PID 2504 wrote to memory of 2544 2504 cmd.exe 33 PID 2544 wrote to memory of 2732 2544 powershell.exe 34 PID 2544 wrote to memory of 2732 2544 powershell.exe 34 PID 2544 wrote to memory of 2732 2544 powershell.exe 34 PID 2544 wrote to memory of 2732 2544 powershell.exe 34 PID 2732 wrote to memory of 4772 2732 vnmwez.exe 35 PID 2732 wrote to memory of 4772 2732 vnmwez.exe 35 PID 2732 wrote to memory of 4772 2732 vnmwez.exe 35 PID 2732 wrote to memory of 4772 2732 vnmwez.exe 35 PID 4772 wrote to memory of 4884 4772 cmd.exe 37 PID 4772 wrote to memory of 4884 4772 cmd.exe 37 PID 4772 wrote to memory of 4884 4772 cmd.exe 37 PID 4772 wrote to memory of 4884 4772 cmd.exe 37 PID 1948 wrote to memory of 4900 1948 0x00080000000162ed-1051.exe 38 PID 1948 wrote to memory of 4900 1948 0x00080000000162ed-1051.exe 38 PID 1948 wrote to memory of 4900 1948 0x00080000000162ed-1051.exe 38 PID 1948 wrote to memory of 4900 1948 0x00080000000162ed-1051.exe 38 PID 4900 wrote to memory of 4924 4900 cmd.exe 40 PID 4900 wrote to memory of 4924 4900 cmd.exe 40 PID 4900 wrote to memory of 4924 4900 cmd.exe 40 PID 4900 wrote to memory of 4924 4900 cmd.exe 40 PID 4924 wrote to memory of 4992 4924 powershell.exe 41 PID 4924 wrote to memory of 4992 4924 powershell.exe 41 PID 4924 wrote to memory of 4992 4924 powershell.exe 41 PID 4924 wrote to memory of 4992 4924 powershell.exe 41 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1556 2732 vnmwez.exe 43 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1060 2732 vnmwez.exe 44 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 1456 2732 vnmwez.exe 45 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46 PID 2732 wrote to memory of 2836 2732 vnmwez.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00080000000162ed-1051.exe"C:\Users\Admin\AppData\Local\Temp\0x00080000000162ed-1051.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vnmwez.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vnmwez.exe"'3⤵
- Loads dropped DLL
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\vnmwez.exe"C:\Users\Admin\AppData\Local\Temp\vnmwez.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4884
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:1556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:1060
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:1456
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:2520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:3084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:3300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:3980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:4460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew5⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2380
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\zgvlid.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\zgvlid.exe"'3⤵
- Loads dropped DLL
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\zgvlid.exe"C:\Users\Admin\AppData\Local\Temp\zgvlid.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.5MB
MD53ccc507ced5e51c1cf03a2f7e38ff18a
SHA1b121b76a0f425a029b49ba8e866818408a1395b9
SHA256b9c141bd767a6c2a5d4a539017840631f59563bf541c8e62b8b9718e076170d6
SHA5129a38d89659e2996b6a62ed0acdcedb532f1a073cd803c904305b39190e0b860a0dd50483845f288e35cb3c91a6ff499977f30d39d196b34800afc6ee38a5edbb
-
Filesize
95KB
MD5bcbcb79606c1833ccef6ca77a7535936
SHA10fcbf9cd7ad1963736afac84cc56069654df3d42
SHA256ce13808dad8149017d9dbc146681a99cd79aaa1288f890c9120a47c347c9db29
SHA51220a3aa8046c8e3c93a9a55aa3750088da247abb11444883f8463aef0d347520c697067b5a8491de204310660cdb632b828d58898e4f65fd385cb1ec2da752391
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fa090dd2367a8bec444bc2c6673951e1
SHA13c08f68e110ae6cfd3ab6232a454f1ede771abe5
SHA2562b4dae6ba408fa493f631ca00d582a722e872a4ecf70400673906653c92b7863
SHA512ba02430644deb0d75ab4a0ecd5008fc8d8490380e4b277eb2d6ded19b54589443858c30befa2838bb853f001f749ca4296c2036cc29b7abc1330ed627e0457be