Analysis
-
max time kernel
129s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
GhostTool.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Leaf.xNet.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Siticone.UI.dll
Resource
win10v2004-20241007-en
General
-
Target
GhostTool.exe
-
Size
319KB
-
MD5
8ceeb2ef2e4ec57b587f2d17b7bfae47
-
SHA1
cbdcc2551e0e99a2429474a7aa41ffc15befea08
-
SHA256
5fadd2114a32e2c9cfafe9fc0ee4aec290c2dffda95eb91b40b3b926c26c40d2
-
SHA512
5cd19a3eb2b178641826c9a9874c53c539bb529e3938c8cca47865f2b3065f5909152bed135fbc7f551c2da867fd2772f8576c6c0ce199e233be5a3cc9651316
-
SSDEEP
3072:ZljFUfBV1GGsXIeyudr/rZ8LLaQdQ9lTz0Ls71EbL3yFWQIxtrcnSEYR9cz0h2mB:ZLI6LdrTZ8fwTwLs7kCsr4m9cgh2fK1
Malware Config
Extracted
redline
195.20.16.27:48665
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4744-1-0x00000000001C0000-0x00000000001FC000-memory.dmp family_redline behavioral1/memory/4744-5-0x0000000000400000-0x0000000000451000-memory.dmp family_redline behavioral1/memory/5052-19-0x0000000000400000-0x0000000000451000-memory.dmp family_redline behavioral1/memory/4548-24-0x0000000000400000-0x0000000000451000-memory.dmp family_redline behavioral1/memory/4308-30-0x0000000000530000-0x000000000056C000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GhostTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GhostTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GhostTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GhostTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GhostTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GhostTool.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4556 taskmgr.exe Token: SeSystemProfilePrivilege 4556 taskmgr.exe Token: SeCreateGlobalPrivilege 4556 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe 4556 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4744
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5052
-
C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4548
-
C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1180
-
C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4308
-
C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"C:\Users\Admin\AppData\Local\Temp\GhostTool.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3688
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4556
-
C:\Windows\System32\enb1sa.exe"C:\Windows\System32\enb1sa.exe"1⤵PID:2024
-
C:\Windows\System32\enb1sa.exe"C:\Windows\System32\enb1sa.exe"1⤵PID:2948