Analysis
-
max time kernel
63s -
max time network
69s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-11-2024 17:15
General
-
Target
download2-word-exe.zip
-
Size
41KB
-
MD5
c734b70ce564f87896ffbc39e00087ab
-
SHA1
403c99f1bed85af47bb77456dcef7fd4cd0d20d7
-
SHA256
ffd0597973e8343aa79f3a624105b7c4ae7cd6f24bb28447ef7f5bc6589036dc
-
SHA512
5baa90d732f0e300fd21653d6f1901002bb68704b866f8cc70e08bea22b080b956f5e16cb4d21dbe59c999862c73c06c9b012f9d0e148591afe01a1d7e25d4de
-
SSDEEP
768:oH3Eg69wSVZqH+7enNyfmgbGX0Zszw7nhbfVq06Wjc4zFUm3y2YeKjU6dzx:o76++7eeGss2fkuNzmm39R6d9
Malware Config
Extracted
redline
cheat
24.152.39.79:63387
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00280000000450f3-2.dat family_redline behavioral1/memory/1820-5-0x0000000000720000-0x000000000073E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x00280000000450f3-2.dat family_sectoprat behavioral1/memory/1820-5-0x0000000000720000-0x000000000073E000-memory.dmp family_sectoprat -
Sectoprat family
-
Executes dropped EXE 1 IoCs
pid Process 1820 download2-word.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download2-word.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 64 7zFM.exe Token: 35 64 7zFM.exe Token: SeSecurityPrivilege 64 7zFM.exe Token: SeDebugPrivilege 1820 download2-word.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 64 7zFM.exe 64 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\download2-word-exe.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:64
-
C:\Users\Admin\Desktop\download2-word.exe"C:\Users\Admin\Desktop\download2-word.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD59a5b81e5bb91e87a6e289dd7d2945603
SHA10ce2f5aa6e306736d80752ef912f7d48c43f04ee
SHA256bf5b34425d47de5b5adb0fcb0b34e01daa36999a1c8d66d422831ede5475bf8a
SHA512914a2848c67f98d29e615817045a527edc8259107d67a6eff95848d10a7b1d421d15fed8094fddc1e12ebd611c695245cd6c070261b48d99c5ed269d1c5168b2