Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 07:33

General

  • Target

    CheckX-Cracked-VIP.exe

  • Size

    7KB

  • MD5

    3a1085797ca3089008cb2b51d2fcdc84

  • SHA1

    f5ea90ec6ad07f137c058ef2874dbd3a1b444f95

  • SHA256

    8fc221b7c8e3f52f22841c866cf0d842f2a1266e79b472273766ce1704474499

  • SHA512

    5e1cf172f3ad81c6bdc5bb3e75743a5a7ac4d4250012112888707a334f3336ba43b5aa71d4cf67f6aa3f8207e21460aa13d06524241e6d0ff9e4d9e7c05f0eac

  • SSDEEP

    96:/XE4Ok4l62wHEdMzsxPcVLpePDX6kNjNMhZrDXrFcAFrikDriSprimri4zNt:/XEdhvNlc526iNMhZrD7RFlLppN

Malware Config

Extracted

Family

redline

Botnet

7772121777

C2

87.120.127.223:42128

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 6 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\CheckX-Cracked-VIP.exe
        "C:\Users\Admin\AppData\Local\Temp\CheckX-Cracked-VIP.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /release
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /release
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:1468
        • C:\Users\Admin\AppData\Local\Temp\build.exe
          "C:\Users\Admin\AppData\Local\Temp\build.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2632
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4720
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:4616
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /release
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1512
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /release
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:1056
        • C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe
          "C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c ipconfig /release
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5624
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /release
              5⤵
              • System Location Discovery: System Language Discovery
              • Gathers network information
              PID:5712
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c ipconfig /renew
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:6112
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /renew
              5⤵
              • System Location Discovery: System Language Discovery
              • Gathers network information
              PID:2720
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:3176
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        PID:4052
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe

      Filesize

      7KB

      MD5

      c3f3579faf5abfc023f4e282cff43313

      SHA1

      9ad2f1cc766b02b1f7e85d4024969c3079950d6a

      SHA256

      49b47081f5f4a706cd3b70421094b9ddf59a6c18fcbd177d5f6565fc14514ea1

      SHA512

      427c9ca6f2e78c5fd98e6ec4bd8daf916ca46290e8e1cdf935657bd1bd4ea8273c9cd4ee91bbb5176ee06abced7d238622dc697e2cb575041c515585f4072b00

    • C:\Users\Admin\AppData\Local\Temp\build.exe

      Filesize

      127KB

      MD5

      30f7aac5d8d65200c618c6a0a94c4065

      SHA1

      773f4aa04303897702a468134cf66b2b15665140

      SHA256

      9b7fc6c8743440fb3958135998d2e4a67143dbdb980d18790ce68ff2634e495d

      SHA512

      d7d91352d58ebcf44c3674366e3d76bebc4119a9b060f376166bb99b03b3a894592dc0a3263d0240727a1d8b7cca178e7719778ed8894300ad0b1e2c1d604053

    • memory/2124-3289-0x00000000065B0000-0x0000000006662000-memory.dmp

      Filesize

      712KB

    • memory/2124-2212-0x00000000062B0000-0x00000000063E8000-memory.dmp

      Filesize

      1.2MB

    • memory/2124-2206-0x00000000008E0000-0x00000000008E8000-memory.dmp

      Filesize

      32KB

    • memory/2152-1078-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2152-1086-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2152-47-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-67-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-65-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-63-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-61-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-59-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-57-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-1085-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2152-53-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-51-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-49-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-45-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-41-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-39-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-43-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-37-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-33-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-31-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-29-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-27-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-25-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-19-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-17-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-15-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-11-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-9-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-7-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-5-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-35-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-13-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-4-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-21-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-1079-0x0000000006B90000-0x0000000006BFA000-memory.dmp

      Filesize

      424KB

    • memory/2152-1080-0x0000000006C00000-0x0000000006C4C000-memory.dmp

      Filesize

      304KB

    • memory/2152-23-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-1084-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2152-55-0x00000000068F0000-0x00000000069DB000-memory.dmp

      Filesize

      940KB

    • memory/2152-1097-0x00000000077C0000-0x0000000007D64000-memory.dmp

      Filesize

      5.6MB

    • memory/2152-1098-0x0000000006D20000-0x0000000006D74000-memory.dmp

      Filesize

      336KB

    • memory/2152-1104-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

      Filesize

      4KB

    • memory/2152-0-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

      Filesize

      4KB

    • memory/2152-1-0x0000000000F70000-0x0000000000F78000-memory.dmp

      Filesize

      32KB

    • memory/2152-2-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2152-3-0x00000000068F0000-0x00000000069E0000-memory.dmp

      Filesize

      960KB

    • memory/2152-1112-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2632-1110-0x00000000050D0000-0x000000000511C000-memory.dmp

      Filesize

      304KB

    • memory/2632-3290-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2632-1103-0x00000000007A0000-0x00000000007BE000-memory.dmp

      Filesize

      120KB

    • memory/2632-2854-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2632-1109-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2632-1113-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2632-1114-0x0000000005330000-0x000000000543A000-memory.dmp

      Filesize

      1.0MB

    • memory/2632-1106-0x0000000005030000-0x0000000005042000-memory.dmp

      Filesize

      72KB

    • memory/2632-1107-0x0000000005090000-0x00000000050CC000-memory.dmp

      Filesize

      240KB

    • memory/2632-1105-0x0000000005610000-0x0000000005C28000-memory.dmp

      Filesize

      6.1MB

    • memory/4052-3301-0x00000000063C0000-0x00000000064AC000-memory.dmp

      Filesize

      944KB

    • memory/4052-2209-0x00000000024E0000-0x00000000024E8000-memory.dmp

      Filesize

      32KB

    • memory/4052-3303-0x0000000006860000-0x000000000686A000-memory.dmp

      Filesize

      40KB

    • memory/4052-3302-0x0000000006900000-0x0000000006992000-memory.dmp

      Filesize

      584KB

    • memory/4052-2210-0x00000000049A0000-0x0000000004A5C000-memory.dmp

      Filesize

      752KB

    • memory/4052-2211-0x0000000004BD0000-0x0000000004C36000-memory.dmp

      Filesize

      408KB

    • memory/4052-2208-0x0000000000500000-0x0000000000576000-memory.dmp

      Filesize

      472KB

    • memory/4552-1111-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4552-3288-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4552-1108-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4552-1102-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/4552-1115-0x00000000064F0000-0x000000000662A000-memory.dmp

      Filesize

      1.2MB

    • memory/4552-2190-0x0000000005EA0000-0x0000000005EA8000-memory.dmp

      Filesize

      32KB

    • memory/4552-2191-0x00000000067E0000-0x0000000006894000-memory.dmp

      Filesize

      720KB

    • memory/5840-3296-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/5840-3297-0x0000000000AD0000-0x0000000000AD8000-memory.dmp

      Filesize

      32KB