Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
Resource
win10v2004-20241007-en
General
-
Target
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
-
Size
7.2MB
-
MD5
7212e623e04d3427364e7f00a95bf932
-
SHA1
5f8e0384cf7c209d804d9b10e3d2281a9c391fe7
-
SHA256
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2
-
SHA512
3a2ac1111eaaf17475235ee233819286848c45bb2d69a42803fde15f4ae609f63120ca3a9f945b80af1a7c565941e81513ecb90ef9ea1320240c81f77091f7df
-
SSDEEP
196608:r+QDCeRpnhgR/BQ+/Svwj47kuTkGfxDlDlAs:s6MQ+/SvwOvY4
Malware Config
Extracted
redline
cheat
45.141.215.79:1639
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c90-7.dat family_redline behavioral2/memory/2220-36-0x0000000000690000-0x00000000006AE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c90-7.dat family_sectoprat behavioral2/memory/2220-36-0x0000000000690000-0x00000000006AE000-memory.dmp family_sectoprat -
Sectoprat family
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 2 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe -
Executes dropped EXE 3 IoCs
Processes:
Yxnjkmkmromsbf.exeNasuozapjtqwrg.exeNasuozapjtqwrg.exepid Process 2220 Yxnjkmkmromsbf.exe 3712 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe -
Loads dropped DLL 15 IoCs
Processes:
Nasuozapjtqwrg.exepid Process 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe 4456 Nasuozapjtqwrg.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c91-17.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Yxnjkmkmromsbf.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Yxnjkmkmromsbf.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 4708 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Yxnjkmkmromsbf.exedescription pid Process Token: SeDebugPrivilege 2220 Yxnjkmkmromsbf.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exeNasuozapjtqwrg.exeNasuozapjtqwrg.exenet.exenet.exenet.exedescription pid Process procid_target PID 1528 wrote to memory of 2220 1528 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 84 PID 1528 wrote to memory of 2220 1528 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 84 PID 1528 wrote to memory of 2220 1528 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 84 PID 1528 wrote to memory of 3712 1528 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 86 PID 1528 wrote to memory of 3712 1528 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 86 PID 3712 wrote to memory of 4456 3712 Nasuozapjtqwrg.exe 89 PID 3712 wrote to memory of 4456 3712 Nasuozapjtqwrg.exe 89 PID 4456 wrote to memory of 1120 4456 Nasuozapjtqwrg.exe 91 PID 4456 wrote to memory of 1120 4456 Nasuozapjtqwrg.exe 91 PID 1120 wrote to memory of 1432 1120 net.exe 92 PID 1120 wrote to memory of 1432 1120 net.exe 92 PID 4456 wrote to memory of 3144 4456 Nasuozapjtqwrg.exe 93 PID 4456 wrote to memory of 3144 4456 Nasuozapjtqwrg.exe 93 PID 3144 wrote to memory of 3440 3144 net.exe 94 PID 3144 wrote to memory of 3440 3144 net.exe 94 PID 4456 wrote to memory of 2732 4456 Nasuozapjtqwrg.exe 95 PID 4456 wrote to memory of 2732 4456 Nasuozapjtqwrg.exe 95 PID 2732 wrote to memory of 1680 2732 net.exe 96 PID 2732 wrote to memory of 1680 2732 net.exe 96 PID 4456 wrote to memory of 4708 4456 Nasuozapjtqwrg.exe 97 PID 4456 wrote to memory of 4708 4456 Nasuozapjtqwrg.exe 97 PID 4456 wrote to memory of 2136 4456 Nasuozapjtqwrg.exe 98 PID 4456 wrote to memory of 2136 4456 Nasuozapjtqwrg.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe"C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe"C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SYSTEM32\net.exenet user Alpha Corazon3145@ /add4⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Alpha Corazon3145@ /add5⤵PID:1432
-
-
-
C:\Windows\SYSTEM32\net.exenet localgroup "Remote Desktop Users" Alpha /add4⤵
- Remote Service Session Hijacking: RDP Hijacking
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" Alpha /add5⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:3440
-
-
-
C:\Windows\SYSTEM32\net.exenet localgroup Administrators Alpha /add4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators Alpha /add5⤵PID:1680
-
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig4⤵
- Gathers network information
PID:4708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2136
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.3MB
MD52073e77e93fc051dc7a179cea9015520
SHA15b0d44c2559431e40af1fd7247b83d27d4d4a2fc
SHA2560e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f
SHA5127f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819
-
Filesize
95KB
MD55d2d319a57180973471a07b00b9c9d08
SHA1481c355baf245d307b15ea653ddbe1c3282a0914
SHA25608f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1
SHA5123e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
82KB
MD5a8a37ba5e81d967433809bf14d34e81d
SHA1e4d9265449950b5c5a665e8163f7dda2badd5c41
SHA25650e21ce62f8d9bab92f6a7e9b39a86406c32d2df18408bb52ffb3d245c644c7b
SHA512b50f4334acb54a6fba776fc77ca07de4940810da4378468b3ca6f35d69c45121ff17e1f9c236752686d2e269bd0b7bce31d16506d3896b9328671049857ed979
-
Filesize
63KB
MD51c88b53c50b5f2bb687b554a2fc7685d
SHA1bfe6fdb8377498bbefcaad1e6b8805473a4ccbf3
SHA25619dd3b5ebb840885543974a4cb6c8ea4539d76e3672be0f390a3a82443391778
SHA512a312b11c85aaa325ab801c728397d5c7049b55fa00f24d30f32bf5cc0ad160678b40f354d9d5ec34384634950b5d6eda601e21934c929b4bc7f6ef50f16e3f59
-
Filesize
155KB
MD5bc07d7ac5fdc92db1e23395fde3420f2
SHA1e89479381beeba40992d8eb306850977d3b95806
SHA256ab822f7e846d4388b6f435d788a028942096ba1344297e0b7005c9d50814981b
SHA512b6105333bb15e65afea3cf976b3c2a8a4c0ebb09ce9a7898a94c41669e666ccfa7dc14106992502abf62f1deb057e926e1fd3368f2a2817bbf6845eada80803d
-
Filesize
31KB
MD5e0cc8c12f0b289ea87c436403bc357c1
SHA1e342a4a600ef9358b3072041e66f66096fae4da4
SHA2569517689d7d97816dee9e6c01ffd35844a3af6cde3ff98f3a709d52157b1abe03
SHA5124d93f23db10e8640cd33e860241e7ea6a533daf64c36c4184844e6cca7b9f4bd41db007164a549e30f5aa9f983345318ff02d72815d51271f38c2e8750df4d77
-
Filesize
77KB
MD5290dbf92268aebde8b9507b157bef602
SHA1bea7221d7abbbc48840b46a19049217b27d3d13a
SHA256e05c5342d55cb452e88e041061faba492d6dd9268a7f67614a8143540aca2bfe
SHA5129ae02b75e722a736b2d76cec9c456d20f341327f55245fa6c5f78200be47cc5885cb73dc3e42e302c6f251922ba7b997c6d032b12a4a988f39bc03719f21d1a5
-
Filesize
157KB
MD50a7eb5d67b14b983a38f82909472f380
SHA1596f94c4659a055d8c629bc21a719ce441d8b924
SHA2563bac94d8713a143095ef8e2f5d2b4a3765ebc530c8ca051080d415198cecf380
SHA5123b78fd4c03ee1b670e46822a7646e668fbaf1ef0f2d4cd53ccfcc4abc2399fcc74822f94e60af13b3cdcb522783c008096b0b265dc9588000b7a46c0ed5973e1
-
Filesize
1.7MB
MD5948430bbba768d83a37fc725d7d31fbb
SHA1e00d912fe85156f61fd8cd109d840d2d69b9629b
SHA25665ebc074b147d65841a467a49f30a5f2f54659a0cc5dc31411467263a37c02df
SHA512aad73403964228ed690ce3c5383e672b76690f776d4ff38792544c67e6d7b54eb56dd6653f4a89f7954752dae78ca35f738e000ffff07fdfb8ef2af708643186
-
Filesize
268KB
MD559a15f9a93dcdaa5bfca246b84fa936a
SHA17f295ea74fc7ed0af0e92be08071fb0b76c8509e
SHA2562c11c3ce08ffc40d390319c72bc10d4f908e9c634494d65ed2cbc550731fd524
SHA512746157a0fcedc67120c2a194a759fa8d8e1f84837e740f379566f260e41aa96b8d4ea18e967e3d1aa1d65d5de30453446d8a8c37c636c08c6a3741387483a7d7
-
Filesize
10KB
MD5fa50d9f8bce6bd13652f5090e7b82c4d
SHA1ee137da302a43c2f46d4323e98ffd46d92cf4bef
SHA256fff69928dea1432e0c7cb1225ab96f94fd38d5d852de9a6bb8bf30b7d2bedceb
SHA512341cec015e74348eab30d86ebb35c028519703006814a2ecd19b9fe5e6fcb05eda6dde0aaf4fe624d254b0d0180ec32adf3b93ee96295f8f0f4c9d4ed27a7c0c
-
Filesize
113KB
MD52d1f2ffd0fecf96a053043daad99a5df
SHA1b03d5f889e55e802d3802d0f0caa4d29c538406b
SHA256207bbae9ddf8bdd64e65a8d600fe1dd0465f2afcd6dc6e28d4d55887cd6cbd13
SHA5124f7d68f241a7f581e143a010c78113154072c63adff5f200ef67eb34d766d14ce872d53183eb2b96b1895aa9c8d4ca82ee5e61e1c5e655ff5be56970be9ebe3e
-
Filesize
3.3MB
MD580b72c24c74d59ae32ba2b0ea5e7dad2
SHA175f892e361619e51578b312605201571bfb67ff8
SHA256eb975c94e5f4292edd9a8207e356fe4ea0c66e802c1e9305323d37185f85ad6d
SHA51208014ee480b5646362c433b82393160edf9602e4654e12cd9b6d3c24e98c56b46add9bf447c2301a2b2e782f49c444cb8e37ee544f38330c944c87397bdd152a
-
Filesize
686KB
MD586f2d9cc8cc54bbb005b15cabf715e5d
SHA1396833cba6802cb83367f6313c6e3c67521c51ad
SHA256d98dd943517963fd0e790fde00965822aa4e4a48e8a479afad74abf14a300771
SHA5120013d487173b42e669a13752dc8a85b838c93524f976864d16ec0d9d7070d981d129577eda497d4fcf66fc6087366bd320cff92ead92ab79cfcaa946489ac6cb
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4
-
Filesize
29KB
MD54ac28414a1d101e94198ae0ac3bd1eb8
SHA1718fbf58ab92a2be2efdb84d26e4d37eb50ef825
SHA256b5d4d5b6da675376bd3b2824d9cda957b55fe3d8596d5675381922ef0e64a0f5
SHA5122ac15e6a178c69115065be9d52c60f8ad63c2a8749af0b43634fc56c20220afb9d2e71ebed76305d7b0dcf86895ed5cdfb7d744c3be49122286b63b5ebce20c2
-
Filesize
1.1MB
MD52ab7e66dff1893fea6f124971221a2a9
SHA13be5864bc4176c552282f9da5fbd70cc1593eb02
SHA256a5db7900ecd5ea5ab1c06a8f94b2885f00dd2e1adf34bcb50c8a71691a97804f
SHA512985480fffcc7e1a25c0070f44492744c3820334a35b9a72b9147898395ab60c7a73ea8bbc761de5cc3b6f8799d07a96c2880a7b56953249230b05dd59a1390ad