Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2024, 23:56

General

  • Target

    12f9806ad64e90f6276302e3c023fb71.exe

  • Size

    5KB

  • MD5

    12f9806ad64e90f6276302e3c023fb71

  • SHA1

    769b8bdcd4e87324fc7b05d07b600842ceba3aed

  • SHA256

    8a5b6b6a2d9cd640f59a4c7ed58ad3bbc54268205dd3899356f5cb99a9352a78

  • SHA512

    7700b9b3ddf0eae92daa73d098a1c081428b3cdd754293912217b20ef6086e227915d3dfe8cb86d15e00b3a39377bb67ca2c96172b628bff6389f7ec602927f1

  • SSDEEP

    48:6LaoejN+CAc+CJrjV6CIndMh0Dc7bVrricqDsKrQ7tieK8CNJjpfbNtm:QWNPAc+CJrR6a0Dclri3DADNizNt

Malware Config

Extracted

Family

redline

Botnet

7772121777

C2

87.120.127.223:42128

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 6 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\12f9806ad64e90f6276302e3c023fb71.exe
        "C:\Users\Admin\AppData\Local\Temp\12f9806ad64e90f6276302e3c023fb71.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Users\Admin\AppData\Local\Temp\tmpA3B2.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmpA3B2.tmp.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3264
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c ipconfig /release
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4740
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /release
              5⤵
              • System Location Discovery: System Language Discovery
              • Gathers network information
              PID:4852
          • C:\Users\Admin\AppData\Local\Temp\build.exe
            "C:\Users\Admin\AppData\Local\Temp\build.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:5404
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c ipconfig /renew
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5828
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /renew
              5⤵
              • System Location Discovery: System Language Discovery
              • Gathers network information
              PID:5848
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5556
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /release
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5364
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /release
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:5296
        • C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe
          "C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3892
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c ipconfig /release
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5492
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /release
              5⤵
              • System Location Discovery: System Language Discovery
              • Gathers network information
              PID:5104
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c ipconfig /renew
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3384
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /renew
              5⤵
              • System Location Discovery: System Language Discovery
              • Gathers network information
              PID:2120
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:6020
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        PID:3488
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe

      Filesize

      7KB

      MD5

      c3f3579faf5abfc023f4e282cff43313

      SHA1

      9ad2f1cc766b02b1f7e85d4024969c3079950d6a

      SHA256

      49b47081f5f4a706cd3b70421094b9ddf59a6c18fcbd177d5f6565fc14514ea1

      SHA512

      427c9ca6f2e78c5fd98e6ec4bd8daf916ca46290e8e1cdf935657bd1bd4ea8273c9cd4ee91bbb5176ee06abced7d238622dc697e2cb575041c515585f4072b00

    • C:\Users\Admin\AppData\Local\Temp\build.exe

      Filesize

      127KB

      MD5

      30f7aac5d8d65200c618c6a0a94c4065

      SHA1

      773f4aa04303897702a468134cf66b2b15665140

      SHA256

      9b7fc6c8743440fb3958135998d2e4a67143dbdb980d18790ce68ff2634e495d

      SHA512

      d7d91352d58ebcf44c3674366e3d76bebc4119a9b060f376166bb99b03b3a894592dc0a3263d0240727a1d8b7cca178e7719778ed8894300ad0b1e2c1d604053

    • C:\Users\Admin\AppData\Local\Temp\tmpA3B2.tmp.exe

      Filesize

      7KB

      MD5

      3a1085797ca3089008cb2b51d2fcdc84

      SHA1

      f5ea90ec6ad07f137c058ef2874dbd3a1b444f95

      SHA256

      8fc221b7c8e3f52f22841c866cf0d842f2a1266e79b472273766ce1704474499

      SHA512

      5e1cf172f3ad81c6bdc5bb3e75743a5a7ac4d4250012112888707a334f3336ba43b5aa71d4cf67f6aa3f8207e21460aa13d06524241e6d0ff9e4d9e7c05f0eac

    • memory/760-3313-0x00000000032A0000-0x00000000032A8000-memory.dmp

      Filesize

      32KB

    • memory/760-3312-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1268-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

      Filesize

      4KB

    • memory/1268-1-0x0000000000200000-0x0000000000208000-memory.dmp

      Filesize

      32KB

    • memory/1268-2-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/1268-16-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-31-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-1095-0x00000000064D0000-0x000000000653A000-memory.dmp

      Filesize

      424KB

    • memory/3264-27-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-37-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-69-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-83-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-79-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-77-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-75-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-73-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-67-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-65-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-63-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-62-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-59-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-57-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-56-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-53-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-51-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-49-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-47-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-45-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-43-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-41-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-40-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-81-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-71-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-35-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-34-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-19-0x0000000006220000-0x0000000006310000-memory.dmp

      Filesize

      960KB

    • memory/3264-30-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-25-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-24-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-21-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-1094-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-20-0x0000000006220000-0x000000000630B000-memory.dmp

      Filesize

      940KB

    • memory/3264-1096-0x0000000006540000-0x000000000658C000-memory.dmp

      Filesize

      304KB

    • memory/3264-1100-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-1101-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-1102-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-1104-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-1105-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-1116-0x00000000070E0000-0x0000000007684000-memory.dmp

      Filesize

      5.6MB

    • memory/3264-1117-0x0000000006660000-0x00000000066B4000-memory.dmp

      Filesize

      336KB

    • memory/3264-1127-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-2206-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-15-0x0000000000850000-0x0000000000858000-memory.dmp

      Filesize

      32KB

    • memory/3264-17-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3264-18-0x0000000074B40000-0x00000000752F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3488-2225-0x0000000000FB0000-0x0000000000FB8000-memory.dmp

      Filesize

      32KB

    • memory/3488-3316-0x0000000006D60000-0x0000000006D6A000-memory.dmp

      Filesize

      40KB

    • memory/3488-3315-0x0000000006C80000-0x0000000006D12000-memory.dmp

      Filesize

      584KB

    • memory/3488-3314-0x0000000006740000-0x000000000682C000-memory.dmp

      Filesize

      944KB

    • memory/3488-2227-0x0000000005050000-0x00000000050B6000-memory.dmp

      Filesize

      408KB

    • memory/3488-2224-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/3488-2226-0x0000000004E20000-0x0000000004EDC000-memory.dmp

      Filesize

      752KB

    • memory/3892-3303-0x00000000066C0000-0x0000000006772000-memory.dmp

      Filesize

      712KB

    • memory/3892-2228-0x0000000006310000-0x0000000006448000-memory.dmp

      Filesize

      1.2MB

    • memory/3892-2222-0x0000000000960000-0x0000000000968000-memory.dmp

      Filesize

      32KB

    • memory/5404-1122-0x00000000002C0000-0x00000000002DE000-memory.dmp

      Filesize

      120KB

    • memory/5404-1124-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/5404-1123-0x0000000005090000-0x00000000056A8000-memory.dmp

      Filesize

      6.1MB

    • memory/5404-1125-0x0000000004BB0000-0x0000000004BEC000-memory.dmp

      Filesize

      240KB

    • memory/5404-1128-0x0000000004E50000-0x0000000004F5A000-memory.dmp

      Filesize

      1.0MB

    • memory/5404-1126-0x0000000004BF0000-0x0000000004C3C000-memory.dmp

      Filesize

      304KB

    • memory/5556-2204-0x0000000005B10000-0x0000000005B18000-memory.dmp

      Filesize

      32KB

    • memory/5556-1129-0x0000000006160000-0x000000000629A000-memory.dmp

      Filesize

      1.2MB

    • memory/5556-1120-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/5556-2205-0x0000000006460000-0x0000000006514000-memory.dmp

      Filesize

      720KB