Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 23:26

General

  • Target

    4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe

  • Size

    2.3MB

  • MD5

    aa25a6dbf0319ac7466e5e4c8b7ee4a3

  • SHA1

    f5cfc23ae0d2785f5aae32a07eaf15f9cfc4ac24

  • SHA256

    4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e

  • SHA512

    ccd6232ae5918110ef911fbd27de2619cc2a1cbf1b08029b4953166bdaaa2ba087d418726e612dc84afc803e1cc95229834e1b0c91696471b8b08e4c6ff080df

  • SSDEEP

    49152:J84+V9pjc8VJiy7jHrpb3KPyT5cRIdesz1E:JEV9Rv7jLpjKKVGIdZ1E

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

188.212.124.13/lYWcN6H7B1.php

Extracted

Family

redline

Botnet

ОШИБКА

C2

185.183.32.161:45391

Attributes
  • auth_value

    d18b47a36849f89352e431c80fc6cb5d

Extracted

Family

redline

Botnet

11/13

C2

94.103.9.133:1169

Attributes
  • auth_value

    b69e61a3d7a039daa16500dfdc1eaa12

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Arkei family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Redline family
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 25 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe
    "C:\Users\Admin\AppData\Local\Temp\4ef41d48509cbc289c46f9b252d780ea1abd83e849c42a47bf7b481b79fead7e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\MarsBuild_2021-11-14_11-20.exe
      "C:\Users\Admin\AppData\Local\Temp\MarsBuild_2021-11-14_11-20.exe"
      2⤵
      • Executes dropped EXE
      PID:2300
    • C:\Users\Admin\AppData\Local\Temp\clean.exe
      "C:\Users\Admin\AppData\Local\Temp\clean.exe"
      2⤵
      • Executes dropped EXE
      PID:2888
    • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
      "C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\makecab.exe
        makecab
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2736
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Duro.potx
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^JdynOpYGXnWkzSuDQWhFskbJYxaqZbxLWAnCRclynOJXkaaxpyDmJmtnSvAxQXHArlfSxDLxLiiDBmnGwYRUUVevcZJcVQgAupUqemqFzoNBaA$" Due.potx
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2644
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
            Forma.exe.com b
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com b
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:780
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1488
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3064
    • C:\Users\Admin\AppData\Local\Temp\clean.exe
      "C:\Users\Admin\AppData\Local\Temp\clean.exe"
      2⤵
      • Executes dropped EXE
      PID:2776
    • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
      "C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\SysWOW64\makecab.exe
        makecab
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2840
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Aggrava.accdt
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^ShpzYFLbYRfWJuFRXyNbzLysSxWtdBORrgKocLRwRlexRlxdHPIcxtdioSAEIHivrnSxvvvjgLGoIKmHZGvBSzvYYDqDljzlrGszaqTlaviIninbaTFelFEKwTcTvTew$" Pie.accdt
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2628
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
            Udi.exe.com k
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1164
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com k
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1516
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2148
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Due.potx

    Filesize

    872KB

    MD5

    6684f94034e10a93758e2c22c75f1613

    SHA1

    25b7d85449caa642beafcf488f1af1fb745ad0ca

    SHA256

    3e6fff185ac509106bed8e02969acc2c272f65300249e66b5a504c92d4a58d0e

    SHA512

    43141e2a5f1cd92cff9a63e1af68d9a1af458ae8f5f7b489172d06e21fe103793a045ed4ee613b4618b42665c5d644d058c0ac78d19d0ef55cf5936201cfd1fb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Duro.potx

    Filesize

    334B

    MD5

    32672958dfe282494f18f8be6b5daea8

    SHA1

    29eb8689b235ffc001286410039ff1399b9e3d33

    SHA256

    a9a4218d1a194894aaf6b487c502a24f0f84041a20e720a4a719201ffc31ae02

    SHA512

    05a7c2ee83b6284df5f072ba493a0b90e315e54c786ee22b159e3d1197335c72f8b637ddf2e1c7884c4275e0ebc553d68492ae2ed42b43d11c0010808e5dc5f4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Era.potx

    Filesize

    931KB

    MD5

    016c737a43c6e6e2cb7abf7d85c5057d

    SHA1

    e68f088fa89473aa3cc032429bcc62b4b0f61116

    SHA256

    b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b

    SHA512

    ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Aggrava.accdt

    Filesize

    343B

    MD5

    ea7b73c99c39a859e7e8b0a815570986

    SHA1

    bd74eb1f49d26a461060f131683021750889a65f

    SHA256

    edd2efdd14116825ff18d706aad2bd716382acbe678eda85c5057bd257b1a02e

    SHA512

    167288428c40eab8e1864bf7db8e70721790763bed0db598af1da860950839058255f58398a61070fbafeea575d9557ec7c6d5b9c424b217602968a40cdf34d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Migliore.accdt

    Filesize

    909KB

    MD5

    d9119aa074bfaff410bb7a4139146a19

    SHA1

    74ea5a967fcba2dde0b27de519dbaf1ef7028636

    SHA256

    797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7

    SHA512

    1187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pie.accdt

    Filesize

    872KB

    MD5

    a172c86dab6bebb6c82410c1f1c1567d

    SHA1

    56a171dfe8137793f45640fc31b3a159f5a84c7d

    SHA256

    d83dd02bf0531d87e4b1af3a68cd601b21d33e2a9e77bc7e8cf1753f77b10438

    SHA512

    107df456743e3e793ca75e2c5e7bfad1ee1801cae03636dec2539cd4c4995b601c3d79118ad0874c6caf8293d1812bf31d459549f7925cb814e30bad4fc30896

  • C:\Users\Admin\AppData\Local\Temp\MarsBuild_2021-11-14_11-20.exe

    Filesize

    263KB

    MD5

    3d58b1c286a8d5deb900c56210d19611

    SHA1

    f3a8e5a0fabe01268c9c99e981208e36d210900b

    SHA256

    19c5b1b8a2cdb858835234cebf962a73492f843b6e434b7e5c11d16ddcf09a62

    SHA512

    3ed1ed8756d3aee5cc271b4850905dd02e6f1e5b8ba0bb3df004636af5fcb49380ae594774bb0984f8de485e6bfa1307d981aedd7a65bb558598e971fdce1530

  • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe

    Filesize

    819KB

    MD5

    ae5b62f74b751690528b1158da869f4b

    SHA1

    9ba07ae06ba49b16fa32dfdd51df33ae771597f4

    SHA256

    9300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5

    SHA512

    ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2

  • C:\Users\Admin\AppData\Local\Temp\clean.exe

    Filesize

    309KB

    MD5

    374a47aa60ba4ef1c2306be2949f0849

    SHA1

    612fedf2475d75d3805d9801f00de1111591b7cc

    SHA256

    c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

    SHA512

    ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe

    Filesize

    63KB

    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • \Users\Admin\AppData\Local\Temp\QdUPABU.exe

    Filesize

    808KB

    MD5

    6a537efb426fe0de4d613615a82fa729

    SHA1

    ed5acfd81d01a5804df26cb259793e532992f07a

    SHA256

    0f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b

    SHA512

    bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5

  • memory/1488-137-0x00000000000B0000-0x00000000000E8000-memory.dmp

    Filesize

    224KB

  • memory/1488-135-0x00000000000B0000-0x00000000000E8000-memory.dmp

    Filesize

    224KB

  • memory/1488-136-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1488-141-0x00000000000B0000-0x00000000000E8000-memory.dmp

    Filesize

    224KB

  • memory/1488-140-0x00000000000B0000-0x00000000000E8000-memory.dmp

    Filesize

    224KB

  • memory/2148-127-0x0000000000090000-0x00000000000B0000-memory.dmp

    Filesize

    128KB

  • memory/2148-124-0x0000000000090000-0x00000000000B0000-memory.dmp

    Filesize

    128KB

  • memory/2148-128-0x0000000000090000-0x00000000000B0000-memory.dmp

    Filesize

    128KB

  • memory/2148-122-0x0000000000090000-0x00000000000B0000-memory.dmp

    Filesize

    128KB

  • memory/2148-123-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2300-116-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2300-117-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2776-57-0x0000000000250000-0x0000000000393000-memory.dmp

    Filesize

    1.3MB

  • memory/2776-61-0x0000000000250000-0x0000000000393000-memory.dmp

    Filesize

    1.3MB

  • memory/2888-46-0x0000000000250000-0x0000000000393000-memory.dmp

    Filesize

    1.3MB

  • memory/2888-59-0x0000000000250000-0x0000000000393000-memory.dmp

    Filesize

    1.3MB

  • memory/3020-44-0x00000000036A0000-0x00000000037E3000-memory.dmp

    Filesize

    1.3MB

  • memory/3020-45-0x00000000036A0000-0x00000000037E3000-memory.dmp

    Filesize

    1.3MB