Analysis
-
max time kernel
15s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
645433c9c0fa477360da405bba4e345d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
645433c9c0fa477360da405bba4e345d.exe
Resource
win10v2004-20240802-en
General
-
Target
645433c9c0fa477360da405bba4e345d.exe
-
Size
493KB
-
MD5
645433c9c0fa477360da405bba4e345d
-
SHA1
558ab8762a9fe2029ef5ddcf0e595466a721ba70
-
SHA256
ce6a0066d44738324884d1ff378833c80a71aa19dd03c939cf055878abae0083
-
SHA512
10b954838600f1e22cac0e1e51b26d7ca328972784f6b8c1c85313cf0d2df303d1965392ca0193db5a5de0fe49e024dcfdcac0a43239dc5321d6bdc52eaee8e1
-
SSDEEP
6144:mJ3qEH5K20tk5kRlFHOETP1uB2fQzaOIkHgo2TWAG16J:iqEH5KY8rddfQFHgo2aAG16
Malware Config
Extracted
asyncrat
0.5.8
Default
176.111.174.140:6606
176.111.174.140:7707
176.111.174.140:8808
Hp6kvaq9BCyI
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
redline
diamotrix
176.111.174.140:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000600000001951c-87.dat family_redline behavioral1/memory/2160-88-0x0000000000180000-0x00000000001D2000-memory.dmp family_redline -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000019259-80.dat family_asyncrat -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts relog.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{1E16069C44F0748140731}\\{1E16069C44F0748140731}.exe" 645433c9c0fa477360da405bba4e345d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Adobe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Service_Adobe.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Identities = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Service_Identities.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Macromedia = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Service_Macromedia.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Media Center Programs = "C:\\Users\\Admin\\AppData\\Roaming\\Media Center Programs\\Service_Media Center Programs.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Service_Microsoft.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Mozilla = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Service_Mozilla.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_{1E16069C44F0748140731} = "C:\\Users\\Admin\\AppData\\Roaming\\{1E16069C44F0748140731}\\Service_{1E16069C44F0748140731}.exe" relog.exe -
pid Process 1384 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 2052 1580 645433c9c0fa477360da405bba4e345d.exe 32 -
Delays execution with timeout.exe 1 IoCs
pid Process 1560 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2524 schtasks.exe 3028 schtasks.exe 2748 schtasks.exe 1760 schtasks.exe 1632 schtasks.exe 2376 schtasks.exe 2940 schtasks.exe 772 schtasks.exe 2796 schtasks.exe 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1580 645433c9c0fa477360da405bba4e345d.exe 1580 645433c9c0fa477360da405bba4e345d.exe 1580 645433c9c0fa477360da405bba4e345d.exe 1580 645433c9c0fa477360da405bba4e345d.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe 2052 relog.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeSecurityPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeTakeOwnershipPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeLoadDriverPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeSystemProfilePrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeSystemtimePrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeProfSingleProcessPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeIncBasePriorityPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeCreatePagefilePrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeBackupPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeRestorePrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeShutdownPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeDebugPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeSystemEnvironmentPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeRemoteShutdownPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeUndockPrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeManageVolumePrivilege 1580 645433c9c0fa477360da405bba4e345d.exe Token: 33 1580 645433c9c0fa477360da405bba4e345d.exe Token: 34 1580 645433c9c0fa477360da405bba4e345d.exe Token: 35 1580 645433c9c0fa477360da405bba4e345d.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe Token: SeDebugPrivilege 2052 relog.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1580 wrote to memory of 772 1580 645433c9c0fa477360da405bba4e345d.exe 30 PID 1580 wrote to memory of 772 1580 645433c9c0fa477360da405bba4e345d.exe 30 PID 1580 wrote to memory of 772 1580 645433c9c0fa477360da405bba4e345d.exe 30 PID 1580 wrote to memory of 2052 1580 645433c9c0fa477360da405bba4e345d.exe 32 PID 1580 wrote to memory of 2052 1580 645433c9c0fa477360da405bba4e345d.exe 32 PID 1580 wrote to memory of 2052 1580 645433c9c0fa477360da405bba4e345d.exe 32 PID 1580 wrote to memory of 2052 1580 645433c9c0fa477360da405bba4e345d.exe 32 PID 2052 wrote to memory of 3028 2052 relog.exe 35 PID 2052 wrote to memory of 3028 2052 relog.exe 35 PID 2052 wrote to memory of 3028 2052 relog.exe 35 PID 2052 wrote to memory of 2796 2052 relog.exe 37 PID 2052 wrote to memory of 2796 2052 relog.exe 37 PID 2052 wrote to memory of 2796 2052 relog.exe 37 PID 2052 wrote to memory of 2660 2052 relog.exe 39 PID 2052 wrote to memory of 2660 2052 relog.exe 39 PID 2052 wrote to memory of 2660 2052 relog.exe 39 PID 2052 wrote to memory of 2748 2052 relog.exe 41 PID 2052 wrote to memory of 2748 2052 relog.exe 41 PID 2052 wrote to memory of 2748 2052 relog.exe 41 PID 2052 wrote to memory of 1632 2052 relog.exe 43 PID 2052 wrote to memory of 1632 2052 relog.exe 43 PID 2052 wrote to memory of 1632 2052 relog.exe 43 PID 2052 wrote to memory of 1760 2052 relog.exe 45 PID 2052 wrote to memory of 1760 2052 relog.exe 45 PID 2052 wrote to memory of 1760 2052 relog.exe 45 PID 2052 wrote to memory of 2376 2052 relog.exe 47 PID 2052 wrote to memory of 2376 2052 relog.exe 47 PID 2052 wrote to memory of 2376 2052 relog.exe 47 PID 2052 wrote to memory of 1200 2052 relog.exe 21 PID 2052 wrote to memory of 1200 2052 relog.exe 21 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\645433c9c0fa477360da405bba4e345d.exe"C:\Users\Admin\AppData\Local\Temp\645433c9c0fa477360da405bba4e345d.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "SystemServicesTools" /tr "C:\Users\Admin\AppData\Roaming\{1E16069C44F0748140731}\{1E16069C44F0748140731}.exe" /sc onstart /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:772
-
-
C:\Windows\system32\relog.exeC:\Windows\system32\relog.exe3⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "NKYFacBBC4" /tr "C:\Users\Admin\AppData\Roaming\Adobe\Service_Adobe.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3028
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "NKYFacBBC4" /tr "C:\Users\Admin\AppData\Roaming\Identities\Service_Identities.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "NKYFacBBC4" /tr "C:\Users\Admin\AppData\Roaming\Macromedia\Service_Macromedia.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2660
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "NKYFacBBC4" /tr "C:\Users\Admin\AppData\Roaming\Media Center Programs\Service_Media Center Programs.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2748
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "NKYFacBBC4" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Service_Microsoft.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1632
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "NKYFacBBC4" /tr "C:\Users\Admin\AppData\Roaming\Mozilla\Service_Mozilla.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1760
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "NKYFacBBC4" /tr "C:\Users\Admin\AppData\Roaming\{1E16069C44F0748140731}\Service_{1E16069C44F0748140731}.exe" /sc onstart /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\204.tmp.nikmok1.exe"C:\Users\Admin\AppData\Local\Temp\204.tmp.nikmok1.exe"2⤵PID:804
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵PID:2452
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1729.tmp.bat""3⤵PID:1016
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1560
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵PID:1100
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ddbfjv.exe"' & exit5⤵PID:1784
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ddbfjv.exe"'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\ddbfjv.exe"C:\Users\Admin\AppData\Local\Temp\ddbfjv.exe"7⤵PID:1644
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "SystemServicesTools" /tr "" /sc onstart /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
C:\Windows\system32\relog.exeC:\Windows\system32\relog.exe8⤵PID:2888
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5AD.tmp.nikmok2.exe"C:\Users\Admin\AppData\Local\Temp\5AD.tmp.nikmok2.exe"2⤵PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD527058f6c310e29963251df57e752456a
SHA1747b0923209199b7e430e1a6896e9304eae02707
SHA256f0033f3778e39a3be78d3938a73c5e02301a85d138e2e4e3ec41be55996ceaa6
SHA512d6a9317d28580ada68c927bb7d0aa69a91e5868bdfa6dfb79f37fe9284e55ff35a96b10b69a2d342d5b8a5cb6019e31e17643460458e0f070084918266148eb2
-
Filesize
300KB
MD58d14c4ba7260c61ecde30d97fd3c124a
SHA1f60a7243a5160ff0dd60c37e1de43b81cead3549
SHA2566985ec7f67fabd26633c991be04ce5f899224a56bb078ba186b4be21f9e4714d
SHA512b068decea7ec68d2b4347493d9e4b8cc4fb0c3c5f5ecc2a52be6eb35d28e75d3de1636efe0b67cce825e8d08d3fb82d137b1d6eb1225662fb8c3dff9616dcc4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
151B
MD53b62b7cb1918ddff8aae463827c269ff
SHA142ea67dd26f723bb57f96c7c7fdbefa4747235a1
SHA256f1c4d5c0cf9e70f780a87bf5cb47e3a4bcb7a2c8850fc5d7544eb09da070cc23
SHA5122334aedd9343b7a587aa2fc4af1402891ba0ecad760d9b9beeba8757258fe5009b8bd3727ec3afdb31e001e9f6b64715e04ddc6c36faff15a16ab7595e0036f9
-
Filesize
322KB
MD5c1e4bbc07edcd498c3237c435a2479b8
SHA1a5724a7cff16711d8c1a3071f39abe4df392d560
SHA256410bbd43e9fe61cfd4dc8a903f016cb0b50e5efcd49cfba0bcc2a93fc9c50155
SHA51256446325ae45aa7e6ae09a87e877263a7bba944732d6f791dc1cd65c1edbcaf3fc247a3f0abee887ea974526a9caeacd585ed2b8b3c4434ec187806998bbdea9
-
Filesize
493KB
MD5645433c9c0fa477360da405bba4e345d
SHA1558ab8762a9fe2029ef5ddcf0e595466a721ba70
SHA256ce6a0066d44738324884d1ff378833c80a71aa19dd03c939cf055878abae0083
SHA51210b954838600f1e22cac0e1e51b26d7ca328972784f6b8c1c85313cf0d2df303d1965392ca0193db5a5de0fe49e024dcfdcac0a43239dc5321d6bdc52eaee8e1
-
Filesize
1KB
MD5ee9d791fd900430e4d594e5bde5c096a
SHA125dd0ac5926d1d02bf4c9fe60d5aff6b602c9b7d
SHA25674c6900b084deaf2ac76ee2113cfe73509e751c588707395fa2731e9bc154ccd
SHA512cd1c18139594002e96c7094ff731812d9afb45fb34735731fb65eaecbd7918c2379fa52b8eea551ac9c51589827619f898a9a0ac95ee1ad8c0e94b589403efeb