Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe
Resource
win10v2004-20241007-en
General
-
Target
d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe
-
Size
3.0MB
-
MD5
4b756d97b00380ddd9cc1c19ad3d7730
-
SHA1
583df398392809d685546545f3e487f16f27f694
-
SHA256
d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978
-
SHA512
84babd07d89c4d8aecf3c4c1e1be87558863b6cf08e6fcd2fbe3815e589d935ca286943a3801331ae4a3514098cd23857d12f2b70b50e44b22c03e339ddbb71b
-
SSDEEP
49152:+M8psQwnwYE2QoljwZaiqwu51wuDy/pM1NSnI5jI51+y8LSAYVu418GUOgX+D:+3sPwYl/9GaiPUy/pqNs751Ugu7WD
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ResolvedAssemblyFiles.vbs d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeID.vbs redline1.exe -
Executes dropped EXE 1 IoCs
pid Process 3164 redline1.exe -
Loads dropped DLL 5 IoCs
pid Process 6436 WerFault.exe 6436 WerFault.exe 6436 WerFault.exe 6436 WerFault.exe 6436 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6436 3164 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language redline1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 3164 redline1.exe 3164 redline1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe Token: SeDebugPrivilege 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe Token: SeDebugPrivilege 3164 redline1.exe Token: SeDebugPrivilege 3164 redline1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1520 wrote to memory of 3164 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 30 PID 1520 wrote to memory of 3164 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 30 PID 1520 wrote to memory of 3164 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 30 PID 1520 wrote to memory of 3164 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 30 PID 1520 wrote to memory of 3208 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 31 PID 1520 wrote to memory of 3208 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 31 PID 1520 wrote to memory of 3208 1520 d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe 31 PID 3164 wrote to memory of 6436 3164 redline1.exe 32 PID 3164 wrote to memory of 6436 3164 redline1.exe 32 PID 3164 wrote to memory of 6436 3164 redline1.exe 32 PID 3164 wrote to memory of 6436 3164 redline1.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe"C:\Users\Admin\AppData\Local\Temp\d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\redline1.exe"C:\Users\Admin\AppData\Local\Temp\redline1.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 6443⤵
- Loads dropped DLL
- Program crash
PID:6436
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1520 -s 9202⤵PID:3208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD532a11fd8c139b36ae55c211a1d823155
SHA127f1f853ae90a917cf7731410c7d488147721250
SHA25663dcc461f8b229a7ccc801cf99ecf7533342daf5dce849c709bd0be2c9a40e5b
SHA5121a33cffdcf89baeaa8b7de840dd9a3d6218c03fd0c19c1665be67e0c3cdfeabca445d675583c103c2f6623e6cfe0794ef7cbef2013e9345f71574f83388e496b