Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 16:13

General

  • Target

    3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe

  • Size

    7.2MB

  • MD5

    7212e623e04d3427364e7f00a95bf932

  • SHA1

    5f8e0384cf7c209d804d9b10e3d2281a9c391fe7

  • SHA256

    3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2

  • SHA512

    3a2ac1111eaaf17475235ee233819286848c45bb2d69a42803fde15f4ae609f63120ca3a9f945b80af1a7c565941e81513ecb90ef9ea1320240c81f77091f7df

  • SSDEEP

    196608:r+QDCeRpnhgR/BQ+/Svwj47kuTkGfxDlDlAs:s6MQ+/SvwOvY4

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.141.215.79:1639

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Remote Service Session Hijacking: RDP Hijacking 1 TTPs 2 IoCs

    Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 15 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe
      "C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2220
    • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe
      "C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3712
      • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe
        "C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4456
        • C:\Windows\SYSTEM32\net.exe
          net user Alpha Corazon3145@ /add
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 user Alpha Corazon3145@ /add
            5⤵
              PID:1432
          • C:\Windows\SYSTEM32\net.exe
            net localgroup "Remote Desktop Users" Alpha /add
            4⤵
            • Remote Service Session Hijacking: RDP Hijacking
            • Suspicious use of WriteProcessMemory
            PID:3144
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup "Remote Desktop Users" Alpha /add
              5⤵
              • Remote Service Session Hijacking: RDP Hijacking
              PID:3440
          • C:\Windows\SYSTEM32\net.exe
            net localgroup Administrators Alpha /add
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup Administrators Alpha /add
              5⤵
                PID:1680
            • C:\Windows\SYSTEM32\ipconfig.exe
              ipconfig
              4⤵
              • Gathers network information
              PID:4708
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              4⤵
                PID:2136

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe

          Filesize

          7.3MB

          MD5

          2073e77e93fc051dc7a179cea9015520

          SHA1

          5b0d44c2559431e40af1fd7247b83d27d4d4a2fc

          SHA256

          0e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f

          SHA512

          7f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819

        • C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe

          Filesize

          95KB

          MD5

          5d2d319a57180973471a07b00b9c9d08

          SHA1

          481c355baf245d307b15ea653ddbe1c3282a0914

          SHA256

          08f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1

          SHA512

          3e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\VCRUNTIME140.dll

          Filesize

          106KB

          MD5

          870fea4e961e2fbd00110d3783e529be

          SHA1

          a948e65c6f73d7da4ffde4e8533c098a00cc7311

          SHA256

          76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

          SHA512

          0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\_bz2.pyd

          Filesize

          82KB

          MD5

          a8a37ba5e81d967433809bf14d34e81d

          SHA1

          e4d9265449950b5c5a665e8163f7dda2badd5c41

          SHA256

          50e21ce62f8d9bab92f6a7e9b39a86406c32d2df18408bb52ffb3d245c644c7b

          SHA512

          b50f4334acb54a6fba776fc77ca07de4940810da4378468b3ca6f35d69c45121ff17e1f9c236752686d2e269bd0b7bce31d16506d3896b9328671049857ed979

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\_hashlib.pyd

          Filesize

          63KB

          MD5

          1c88b53c50b5f2bb687b554a2fc7685d

          SHA1

          bfe6fdb8377498bbefcaad1e6b8805473a4ccbf3

          SHA256

          19dd3b5ebb840885543974a4cb6c8ea4539d76e3672be0f390a3a82443391778

          SHA512

          a312b11c85aaa325ab801c728397d5c7049b55fa00f24d30f32bf5cc0ad160678b40f354d9d5ec34384634950b5d6eda601e21934c929b4bc7f6ef50f16e3f59

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\_lzma.pyd

          Filesize

          155KB

          MD5

          bc07d7ac5fdc92db1e23395fde3420f2

          SHA1

          e89479381beeba40992d8eb306850977d3b95806

          SHA256

          ab822f7e846d4388b6f435d788a028942096ba1344297e0b7005c9d50814981b

          SHA512

          b6105333bb15e65afea3cf976b3c2a8a4c0ebb09ce9a7898a94c41669e666ccfa7dc14106992502abf62f1deb057e926e1fd3368f2a2817bbf6845eada80803d

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\_queue.pyd

          Filesize

          31KB

          MD5

          e0cc8c12f0b289ea87c436403bc357c1

          SHA1

          e342a4a600ef9358b3072041e66f66096fae4da4

          SHA256

          9517689d7d97816dee9e6c01ffd35844a3af6cde3ff98f3a709d52157b1abe03

          SHA512

          4d93f23db10e8640cd33e860241e7ea6a533daf64c36c4184844e6cca7b9f4bd41db007164a549e30f5aa9f983345318ff02d72815d51271f38c2e8750df4d77

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\_socket.pyd

          Filesize

          77KB

          MD5

          290dbf92268aebde8b9507b157bef602

          SHA1

          bea7221d7abbbc48840b46a19049217b27d3d13a

          SHA256

          e05c5342d55cb452e88e041061faba492d6dd9268a7f67614a8143540aca2bfe

          SHA512

          9ae02b75e722a736b2d76cec9c456d20f341327f55245fa6c5f78200be47cc5885cb73dc3e42e302c6f251922ba7b997c6d032b12a4a988f39bc03719f21d1a5

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\_ssl.pyd

          Filesize

          157KB

          MD5

          0a7eb5d67b14b983a38f82909472f380

          SHA1

          596f94c4659a055d8c629bc21a719ce441d8b924

          SHA256

          3bac94d8713a143095ef8e2f5d2b4a3765ebc530c8ca051080d415198cecf380

          SHA512

          3b78fd4c03ee1b670e46822a7646e668fbaf1ef0f2d4cd53ccfcc4abc2399fcc74822f94e60af13b3cdcb522783c008096b0b265dc9588000b7a46c0ed5973e1

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\base_library.zip

          Filesize

          1.7MB

          MD5

          948430bbba768d83a37fc725d7d31fbb

          SHA1

          e00d912fe85156f61fd8cd109d840d2d69b9629b

          SHA256

          65ebc074b147d65841a467a49f30a5f2f54659a0cc5dc31411467263a37c02df

          SHA512

          aad73403964228ed690ce3c5383e672b76690f776d4ff38792544c67e6d7b54eb56dd6653f4a89f7954752dae78ca35f738e000ffff07fdfb8ef2af708643186

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\certifi\cacert.pem

          Filesize

          268KB

          MD5

          59a15f9a93dcdaa5bfca246b84fa936a

          SHA1

          7f295ea74fc7ed0af0e92be08071fb0b76c8509e

          SHA256

          2c11c3ce08ffc40d390319c72bc10d4f908e9c634494d65ed2cbc550731fd524

          SHA512

          746157a0fcedc67120c2a194a759fa8d8e1f84837e740f379566f260e41aa96b8d4ea18e967e3d1aa1d65d5de30453446d8a8c37c636c08c6a3741387483a7d7

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\charset_normalizer\md.cp311-win_amd64.pyd

          Filesize

          10KB

          MD5

          fa50d9f8bce6bd13652f5090e7b82c4d

          SHA1

          ee137da302a43c2f46d4323e98ffd46d92cf4bef

          SHA256

          fff69928dea1432e0c7cb1225ab96f94fd38d5d852de9a6bb8bf30b7d2bedceb

          SHA512

          341cec015e74348eab30d86ebb35c028519703006814a2ecd19b9fe5e6fcb05eda6dde0aaf4fe624d254b0d0180ec32adf3b93ee96295f8f0f4c9d4ed27a7c0c

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

          Filesize

          113KB

          MD5

          2d1f2ffd0fecf96a053043daad99a5df

          SHA1

          b03d5f889e55e802d3802d0f0caa4d29c538406b

          SHA256

          207bbae9ddf8bdd64e65a8d600fe1dd0465f2afcd6dc6e28d4d55887cd6cbd13

          SHA512

          4f7d68f241a7f581e143a010c78113154072c63adff5f200ef67eb34d766d14ce872d53183eb2b96b1895aa9c8d4ca82ee5e61e1c5e655ff5be56970be9ebe3e

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\libcrypto-1_1.dll

          Filesize

          3.3MB

          MD5

          80b72c24c74d59ae32ba2b0ea5e7dad2

          SHA1

          75f892e361619e51578b312605201571bfb67ff8

          SHA256

          eb975c94e5f4292edd9a8207e356fe4ea0c66e802c1e9305323d37185f85ad6d

          SHA512

          08014ee480b5646362c433b82393160edf9602e4654e12cd9b6d3c24e98c56b46add9bf447c2301a2b2e782f49c444cb8e37ee544f38330c944c87397bdd152a

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\libssl-1_1.dll

          Filesize

          686KB

          MD5

          86f2d9cc8cc54bbb005b15cabf715e5d

          SHA1

          396833cba6802cb83367f6313c6e3c67521c51ad

          SHA256

          d98dd943517963fd0e790fde00965822aa4e4a48e8a479afad74abf14a300771

          SHA512

          0013d487173b42e669a13752dc8a85b838c93524f976864d16ec0d9d7070d981d129577eda497d4fcf66fc6087366bd320cff92ead92ab79cfcaa946489ac6cb

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\python311.dll

          Filesize

          5.5MB

          MD5

          1fe47c83669491bf38a949253d7d960f

          SHA1

          de5cc181c0e26cbcb31309fe00d9f2f5264d2b25

          SHA256

          0a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae

          SHA512

          05cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\select.pyd

          Filesize

          29KB

          MD5

          4ac28414a1d101e94198ae0ac3bd1eb8

          SHA1

          718fbf58ab92a2be2efdb84d26e4d37eb50ef825

          SHA256

          b5d4d5b6da675376bd3b2824d9cda957b55fe3d8596d5675381922ef0e64a0f5

          SHA512

          2ac15e6a178c69115065be9d52c60f8ad63c2a8749af0b43634fc56c20220afb9d2e71ebed76305d7b0dcf86895ed5cdfb7d744c3be49122286b63b5ebce20c2

        • C:\Users\Admin\AppData\Local\Temp\_MEI37122\unicodedata.pyd

          Filesize

          1.1MB

          MD5

          2ab7e66dff1893fea6f124971221a2a9

          SHA1

          3be5864bc4176c552282f9da5fbd70cc1593eb02

          SHA256

          a5db7900ecd5ea5ab1c06a8f94b2885f00dd2e1adf34bcb50c8a71691a97804f

          SHA512

          985480fffcc7e1a25c0070f44492744c3820334a35b9a72b9147898395ab60c7a73ea8bbc761de5cc3b6f8799d07a96c2880a7b56953249230b05dd59a1390ad

        • memory/1528-21-0x000000001BC00000-0x000000001BDA9000-memory.dmp

          Filesize

          1.7MB

        • memory/1528-1-0x0000000000690000-0x0000000000DCA000-memory.dmp

          Filesize

          7.2MB

        • memory/1528-2-0x00007FFFD1D30000-0x00007FFFD27F1000-memory.dmp

          Filesize

          10.8MB

        • memory/1528-0-0x00007FFFD1D33000-0x00007FFFD1D35000-memory.dmp

          Filesize

          8KB

        • memory/1528-23-0x00007FFFD1D30000-0x00007FFFD27F1000-memory.dmp

          Filesize

          10.8MB

        • memory/2220-36-0x0000000000690000-0x00000000006AE000-memory.dmp

          Filesize

          120KB

        • memory/2220-79-0x0000000074EF0000-0x00000000756A0000-memory.dmp

          Filesize

          7.7MB

        • memory/2220-24-0x0000000074EFE000-0x0000000074EFF000-memory.dmp

          Filesize

          4KB

        • memory/2220-63-0x0000000004FB0000-0x0000000004FFC000-memory.dmp

          Filesize

          304KB

        • memory/2220-39-0x0000000005680000-0x0000000005C98000-memory.dmp

          Filesize

          6.1MB

        • memory/2220-40-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/2220-48-0x0000000004F70000-0x0000000004FAC000-memory.dmp

          Filesize

          240KB

        • memory/2220-81-0x0000000005220000-0x000000000532A000-memory.dmp

          Filesize

          1.0MB

        • memory/2220-83-0x0000000074EFE000-0x0000000074EFF000-memory.dmp

          Filesize

          4KB

        • memory/2220-84-0x0000000074EF0000-0x00000000756A0000-memory.dmp

          Filesize

          7.7MB