Analysis

  • max time kernel
    98s
  • max time network
    100s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-12-2024 18:07

General

  • Target

    Pure Crypter (1).zip

  • Size

    573KB

  • MD5

    daaf4e3e5063a7cfde66645f3773a074

  • SHA1

    46a4e53bed8a45c310acc126070ec55eded1a48c

  • SHA256

    e6ff503eac9d6fae82eeeeeddc60b922cf5ecc19097ce8740e5b758b6089eecd

  • SHA512

    88311cb920d2a27f8d97dc5d88170675fd5881851ccdb30924d4c3d46ea64b33af1382aad7b32fe92f6cd520140ba33db3e8e646defe38bc0038d182c548c38b

  • SSDEEP

    12288:mJ7f/zwebBE+hyCQAmNVxLZEr1J45WQMebBE+hyCQAmNVxLZEr1J45WQ1:mJ7jBPkCkNVx9Ef4cQLBPkCkNVx9Ef4D

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Pure Crypter (1).zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4016
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1008
    • C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe
      "C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4612
    • C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe
      "C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5104
    • C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe
      "C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2776
    • C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe
      "C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4980
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3576
    • C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter\Pure Crypter.exe
      "C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter\Pure Crypter.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:564
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter\MinGW Builder.bat" "
      1⤵
        PID:2952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zE0BF46087\Pure Crypter\Pure Crypter\Forms\FormChangeIcon.resx

        Filesize

        45KB

        MD5

        1cf45ba86c6825a3d79909a4797e873b

        SHA1

        f3e738fada6cdfb83b437ce964ddf1bdf7d1b9c4

        SHA256

        38a35e979d2a1611e925b21473e7a2210a4a4f72d1383412d2a38032a6d365d9

        SHA512

        519a37deac7d64dad6645fe2aabe656d9aafec7c6e69009adb45a312d5ede96137115e9c895d4336a1c6f26e0d181b26eb1ec1844d9ec9e2c17f808d5f7ffafe

      • C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter.exe

        Filesize

        506KB

        MD5

        e5fb57e8214483fd395bd431cb3d1c4b

        SHA1

        60e22fc9e0068c8156462f003760efdcac82766b

        SHA256

        e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684

        SHA512

        dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89

      • C:\Users\Admin\Desktop\Pure Crypter\Pure Crypter\MinGW Builder.bat

        Filesize

        1KB

        MD5

        4ea0e116a7da16745fe3d5cb811e8f42

        SHA1

        40d50a42a192196d4e93697369ea1801bbee5200

        SHA256

        fbcbaf354febeee36e5b290b46e747dcd94109687a5d6d5c8b16175c35de8716

        SHA512

        9f766bf079839cb1442c4cef7e7a96f926d4c0b09affc18bb8e8f289281ca173c33d52784b62f03957cfdb288c1333ea92ba8c88cd72ad3e2148176a951fda0e

      • memory/564-153-0x0000000001370000-0x00000000013C6000-memory.dmp

        Filesize

        344KB

      • memory/2776-128-0x0000000000720000-0x0000000000776000-memory.dmp

        Filesize

        344KB

      • memory/3576-145-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-146-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-139-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-147-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-148-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-149-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-150-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-144-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-138-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/3576-140-0x000001EB38DD0000-0x000001EB38DD1000-memory.dmp

        Filesize

        4KB

      • memory/4612-117-0x0000000005780000-0x0000000005792000-memory.dmp

        Filesize

        72KB

      • memory/4612-137-0x0000000074CF0000-0x00000000754A1000-memory.dmp

        Filesize

        7.7MB

      • memory/4612-131-0x0000000074CFE000-0x0000000074CFF000-memory.dmp

        Filesize

        4KB

      • memory/4612-120-0x0000000005850000-0x000000000589C000-memory.dmp

        Filesize

        304KB

      • memory/4612-119-0x00000000057E0000-0x000000000581C000-memory.dmp

        Filesize

        240KB

      • memory/4612-118-0x0000000005940000-0x0000000005A4A000-memory.dmp

        Filesize

        1.0MB

      • memory/4612-116-0x0000000005E50000-0x0000000006468000-memory.dmp

        Filesize

        6.1MB

      • memory/4612-115-0x0000000074CF0000-0x00000000754A1000-memory.dmp

        Filesize

        7.7MB

      • memory/4612-114-0x0000000074CFE000-0x0000000074CFF000-memory.dmp

        Filesize

        4KB

      • memory/4612-110-0x0000000001280000-0x00000000012D6000-memory.dmp

        Filesize

        344KB

      • memory/4980-133-0x0000000000730000-0x0000000000786000-memory.dmp

        Filesize

        344KB

      • memory/5104-123-0x0000000001400000-0x0000000001456000-memory.dmp

        Filesize

        344KB