Analysis

  • max time kernel
    133s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 16:13

General

  • Target

    3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe

  • Size

    7.2MB

  • MD5

    7212e623e04d3427364e7f00a95bf932

  • SHA1

    5f8e0384cf7c209d804d9b10e3d2281a9c391fe7

  • SHA256

    3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2

  • SHA512

    3a2ac1111eaaf17475235ee233819286848c45bb2d69a42803fde15f4ae609f63120ca3a9f945b80af1a7c565941e81513ecb90ef9ea1320240c81f77091f7df

  • SSDEEP

    196608:r+QDCeRpnhgR/BQ+/Svwj47kuTkGfxDlDlAs:s6MQ+/SvwOvY4

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.141.215.79:1639

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe
      "C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2504
    • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe
      "C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe
        "C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe

    Filesize

    95KB

    MD5

    5d2d319a57180973471a07b00b9c9d08

    SHA1

    481c355baf245d307b15ea653ddbe1c3282a0914

    SHA256

    08f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1

    SHA512

    3e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1

  • C:\Users\Admin\AppData\Local\Temp\_MEI28402\python311.dll

    Filesize

    5.5MB

    MD5

    1fe47c83669491bf38a949253d7d960f

    SHA1

    de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

    SHA256

    0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

    SHA512

    05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

  • \Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

    Filesize

    7.3MB

    MD5

    2073e77e93fc051dc7a179cea9015520

    SHA1

    5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

    SHA256

    0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

    SHA512

    7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

  • memory/2344-0-0x000007FEF6033000-0x000007FEF6034000-memory.dmp

    Filesize

    4KB

  • memory/2344-1-0x0000000001370000-0x0000000001AAA000-memory.dmp

    Filesize

    7.2MB

  • memory/2344-2-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2344-17-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2504-9-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/2504-12-0x0000000000050000-0x000000000006E000-memory.dmp

    Filesize

    120KB

  • memory/2504-40-0x00000000745E0000-0x0000000074CCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2504-57-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/2504-58-0x00000000745E0000-0x0000000074CCE000-memory.dmp

    Filesize

    6.9MB