Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 12:30
Behavioral task
behavioral1
Sample
2Bob_Download/Update.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2Bob_Download/Update.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2Bob_Download/d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
2Bob_Download/ffmpeg.dll
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
2Bob_Download/ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
2Bob_Download/start_bob.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
2Bob_Download/start_bob.exe
Resource
win10v2004-20241007-en
General
-
Target
2Bob_Download/Update.exe
-
Size
210KB
-
MD5
d412df3af3c10af259fd4cc58e68f00b
-
SHA1
2de05f08b05fb0abb4b24616db00d0ce1dec420e
-
SHA256
083f0f217bff41523e9faa49bb13e9e5d691a3c51341b12d0c4829d8cfc33292
-
SHA512
9bcf5dca3811bed78e59bca04ca934965a93b00c53769de477f33d465279ec10d6355a66e841cecf439d783721784378fd570c0a7ce6af00c3c16aa58a29d808
-
SSDEEP
3072:01hoF2jJ6wiPa1XzwIxJLp7tUE1NgBS5Bs//dm63NzzEfWw:01hnJ6D1IxPtUyNrsHdmqEf
Malware Config
Extracted
redline
Metin
duclog23.duckdns.org:37552
Extracted
xworm
duclog23.duckdns.org:7000
-
Install_directory
%AppData%
-
install_file
Chrome.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x00060000000191d2-8.dat family_xworm behavioral1/memory/1856-16-0x0000000000EA0000-0x0000000000EB4000-memory.dmp family_xworm behavioral1/memory/2208-47-0x00000000009E0000-0x00000000009F4000-memory.dmp family_xworm behavioral1/memory/2784-50-0x0000000000D30000-0x0000000000D44000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a0000000122ea-5.dat family_redline behavioral1/memory/2836-15-0x0000000000070000-0x000000000008E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000a0000000122ea-5.dat family_sectoprat behavioral1/memory/2836-15-0x0000000000070000-0x000000000008E000-memory.dmp family_sectoprat -
Sectoprat family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2888 powershell.exe 1988 powershell.exe 1552 powershell.exe 536 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk Metin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chrome.lnk Metin.exe -
Executes dropped EXE 4 IoCs
pid Process 2836 M2.exe 1856 Metin.exe 2208 Chrome.exe 2784 Chrome.exe -
Loads dropped DLL 2 IoCs
pid Process 1316 Update.exe 1316 Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\Chrome.exe" Metin.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M2.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1672 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2704 powershell.exe 2888 powershell.exe 1988 powershell.exe 1552 powershell.exe 536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 1856 Metin.exe Token: SeDebugPrivilege 2836 M2.exe Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeDebugPrivilege 1856 Metin.exe Token: SeDebugPrivilege 2208 Chrome.exe Token: SeDebugPrivilege 2784 Chrome.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2704 1316 Update.exe 30 PID 1316 wrote to memory of 2704 1316 Update.exe 30 PID 1316 wrote to memory of 2704 1316 Update.exe 30 PID 1316 wrote to memory of 2704 1316 Update.exe 30 PID 1316 wrote to memory of 2836 1316 Update.exe 32 PID 1316 wrote to memory of 2836 1316 Update.exe 32 PID 1316 wrote to memory of 2836 1316 Update.exe 32 PID 1316 wrote to memory of 2836 1316 Update.exe 32 PID 1316 wrote to memory of 1856 1316 Update.exe 34 PID 1316 wrote to memory of 1856 1316 Update.exe 34 PID 1316 wrote to memory of 1856 1316 Update.exe 34 PID 1316 wrote to memory of 1856 1316 Update.exe 34 PID 1856 wrote to memory of 2888 1856 Metin.exe 36 PID 1856 wrote to memory of 2888 1856 Metin.exe 36 PID 1856 wrote to memory of 2888 1856 Metin.exe 36 PID 1856 wrote to memory of 1988 1856 Metin.exe 38 PID 1856 wrote to memory of 1988 1856 Metin.exe 38 PID 1856 wrote to memory of 1988 1856 Metin.exe 38 PID 1856 wrote to memory of 1552 1856 Metin.exe 40 PID 1856 wrote to memory of 1552 1856 Metin.exe 40 PID 1856 wrote to memory of 1552 1856 Metin.exe 40 PID 1856 wrote to memory of 536 1856 Metin.exe 42 PID 1856 wrote to memory of 536 1856 Metin.exe 42 PID 1856 wrote to memory of 536 1856 Metin.exe 42 PID 1856 wrote to memory of 1672 1856 Metin.exe 44 PID 1856 wrote to memory of 1672 1856 Metin.exe 44 PID 1856 wrote to memory of 1672 1856 Metin.exe 44 PID 840 wrote to memory of 2208 840 taskeng.exe 47 PID 840 wrote to memory of 2208 840 taskeng.exe 47 PID 840 wrote to memory of 2208 840 taskeng.exe 47 PID 840 wrote to memory of 2784 840 taskeng.exe 48 PID 840 wrote to memory of 2784 840 taskeng.exe 48 PID 840 wrote to memory of 2784 840 taskeng.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2Bob_Download\Update.exe"C:\Users\Admin\AppData\Local\Temp\2Bob_Download\Update.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHcAYwB3ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AYgBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAYgB2ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHgAegB6ACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Users\Admin\AppData\Roaming\M2.exe"C:\Users\Admin\AppData\Roaming\M2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Roaming\Metin.exe"C:\Users\Admin\AppData\Roaming\Metin.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Metin.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Metin.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Chrome.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Chrome" /tr "C:\Users\Admin\AppData\Roaming\Chrome.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1672
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4FC14616-E797-40C4-B330-BE2A90E08D1E} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\Chrome.exeC:\Users\Admin\AppData\Roaming\Chrome.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Users\Admin\AppData\Roaming\Chrome.exeC:\Users\Admin\AppData\Roaming\Chrome.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD52598b5fee38d9c0979f009e77f94ea33
SHA19c2c0f0734fbf16853de911868024dfbed91e5ec
SHA25600a709baca231f15267526d7b5db11cd94b0089ed6cfd1667a1ff2ebd584c266
SHA512d6fa07fdfa6493c3abe95c650dca114b1737d8812fe86476ef8afbb1d34e50b537821a7958acdc243246484fc4f28dd208db4328663bbc22ec79ae34f3340c8e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZLMJ19OON8IDEP9BAM7K.temp
Filesize7KB
MD53a62e9706b804fbde6cf591d30a67e79
SHA1750e18acce513a5fafbb4a3e1c396e0ab54d0ac0
SHA256e628572110682055fc3ab76075f9d32bbcccc1e7ff4d4e20f81699aee8e8359d
SHA5129c01c26c906079f8c7d089bcc71aa5c83602fe0a9e793726918b95f58e6638faf131c25ede155c40617fd9ee351c22eb78852d5e4989ce13b226a291fb1619bc
-
Filesize
51KB
MD51d846637aa409d6dd4fd14f70a63f907
SHA1a0f494b321ef5bd5b95f60d4ee9e4ae836d73b8a
SHA25608a5ab51f8eee96d3837aaef4d74bf672d937056118003ecfa0e4df9dae49125
SHA512259bd4d63bd69cdfd9a29303dc5ef3174136353daad23747c4589ed5b760d9905285211850bf49fde37c0ba355f3e463df6633a518affb270cfeb9f24885508c