Analysis

  • max time kernel
    63s
  • max time network
    69s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    26-11-2024 17:15

General

  • Target

    download2-word-exe.zip

  • Size

    41KB

  • MD5

    c734b70ce564f87896ffbc39e00087ab

  • SHA1

    403c99f1bed85af47bb77456dcef7fd4cd0d20d7

  • SHA256

    ffd0597973e8343aa79f3a624105b7c4ae7cd6f24bb28447ef7f5bc6589036dc

  • SHA512

    5baa90d732f0e300fd21653d6f1901002bb68704b866f8cc70e08bea22b080b956f5e16cb4d21dbe59c999862c73c06c9b012f9d0e148591afe01a1d7e25d4de

  • SSDEEP

    768:oH3Eg69wSVZqH+7enNyfmgbGX0Zszw7nhbfVq06Wjc4zFUm3y2YeKjU6dzx:o76++7eeGss2fkuNzmm39R6d9

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

24.152.39.79:63387

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\download2-word-exe.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:64
  • C:\Users\Admin\Desktop\download2-word.exe
    "C:\Users\Admin\Desktop\download2-word.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\download2-word.exe

    Filesize

    95KB

    MD5

    9a5b81e5bb91e87a6e289dd7d2945603

    SHA1

    0ce2f5aa6e306736d80752ef912f7d48c43f04ee

    SHA256

    bf5b34425d47de5b5adb0fcb0b34e01daa36999a1c8d66d422831ede5475bf8a

    SHA512

    914a2848c67f98d29e615817045a527edc8259107d67a6eff95848d10a7b1d421d15fed8094fddc1e12ebd611c695245cd6c070261b48d99c5ed269d1c5168b2

  • memory/1820-4-0x000000007482E000-0x000000007482F000-memory.dmp

    Filesize

    4KB

  • memory/1820-5-0x0000000000720000-0x000000000073E000-memory.dmp

    Filesize

    120KB

  • memory/1820-6-0x0000000005790000-0x0000000005DA8000-memory.dmp

    Filesize

    6.1MB

  • memory/1820-7-0x00000000050D0000-0x00000000050E2000-memory.dmp

    Filesize

    72KB

  • memory/1820-8-0x0000000005170000-0x00000000051AC000-memory.dmp

    Filesize

    240KB

  • memory/1820-9-0x00000000050F0000-0x000000000513C000-memory.dmp

    Filesize

    304KB

  • memory/1820-10-0x0000000074820000-0x0000000074FD1000-memory.dmp

    Filesize

    7.7MB

  • memory/1820-11-0x00000000053E0000-0x00000000054EA000-memory.dmp

    Filesize

    1.0MB

  • memory/1820-12-0x000000007482E000-0x000000007482F000-memory.dmp

    Filesize

    4KB

  • memory/1820-13-0x0000000074820000-0x0000000074FD1000-memory.dmp

    Filesize

    7.7MB