Analysis
-
max time kernel
1777s -
max time network
1795s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-12-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
xxSMTPxx.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
xxSMTPxx.rar
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
xxSMTPxx/Private Cracker/xxSMTPxx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
xxSMTPxx/Private Cracker/xxSMTPxx.exe
Resource
win11-20241007-en
General
-
Target
xxSMTPxx/Private Cracker/xxSMTPxx.exe
-
Size
4.6MB
-
MD5
9088655d2558fc34338e8b06e98cd403
-
SHA1
cfeb0f3d288ead6c9fd0aaa4e05dd53127696c22
-
SHA256
3e44ce378be97fc687a392f97abfe6ee0f9e4b1c15d88347668d7c384f7024ac
-
SHA512
49a8cccf8a8801c946fba88a0e6a68f19443dc5e5e01f9d0d09e6bc9cf9bc41932c939e975d63167adb6e73b62f2235fe3dd07dafbb6220467427eacede268a0
-
SSDEEP
98304:il9Goe+rmZQHPN6zkioyxx8zhSGw0g61nWYK6wgPI3:ils9+ro+N9DSTmnWYK6wYI
Malware Config
Extracted
redline
noname
148.163.89.57:42212
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral4/memory/5968-25-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" crypt.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 832 powershell.exe 5632 powershell.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AXIMTR~1.EXE -
Executes dropped EXE 2 IoCs
pid Process 5472 crypt.exe 6028 AXIMTR~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" xxSMTPxx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" crypt.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 AXIMTR~1.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5472 set thread context of 5968 5472 crypt.exe 81 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\checkwritepermissions.exe AXIMTR~1.EXE File created C:\Program Files\checkwritepermissions.exe AXIMTR~1.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AXIMTR~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AXIMTR~1.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS AXIMTR~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer AXIMTR~1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName AXIMTR~1.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5472 crypt.exe 832 powershell.exe 832 powershell.exe 5472 crypt.exe 5632 powershell.exe 5632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5472 crypt.exe Token: SeDebugPrivilege 832 powershell.exe Token: SeDebugPrivilege 5632 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 752 wrote to memory of 5472 752 xxSMTPxx.exe 77 PID 752 wrote to memory of 5472 752 xxSMTPxx.exe 77 PID 5472 wrote to memory of 832 5472 crypt.exe 78 PID 5472 wrote to memory of 832 5472 crypt.exe 78 PID 5472 wrote to memory of 5632 5472 crypt.exe 80 PID 5472 wrote to memory of 5632 5472 crypt.exe 80 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 5472 wrote to memory of 5968 5472 crypt.exe 81 PID 752 wrote to memory of 6028 752 xxSMTPxx.exe 83 PID 752 wrote to memory of 6028 752 xxSMTPxx.exe 83 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" crypt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xxSMTPxx\Private Cracker\xxSMTPxx.exe"C:\Users\Admin\AppData\Local\Temp\xxSMTPxx\Private Cracker\xxSMTPxx.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypt.exe2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypt.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AXIMTR~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AXIMTR~1.EXE2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
PID:6028
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
4.4MB
MD5b2d1a96a8acfb533024134a5c4a00415
SHA192b344a2fbba4fa4ab867dbaeba3c665049b58c0
SHA2563302d8e800fd5eedff91f8bd33ec2d2eec39a15a8e6ab6fa66d5e6ca9579a94c
SHA512d6b5983fbfc020c1682a553ba7bb661bcc5f0a66a2357922a5e41b82db3a8eb1499abaa0bae759a52bef70697da35f2ae4b3274f5ce50a1264c6d17072e5a2ad
-
Filesize
5.9MB
MD5ce884d815d7f0ae4aacdeea75d719bd4
SHA18b4909fa0a3a6165939828efcd32cf710100c2f2
SHA256f4b08e6a81b7ff4d6517ce9b0facd78857ff41f4e6a1ef725616cb5341522f82
SHA512f8ec9ba7430b57f9792b434878f1f85ec8c2fb28b0f0ea0e6eed0c35419e6ec3332b86802c4b0c2efd8007b03d0caa20c6d1bf49532932a6659edea7b5d6ad56
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82