Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 00:45

General

  • Target

    QuantumBuilder.exe

  • Size

    2.5MB

  • MD5

    03a4fcff58e8c316ee039f63920e884b

  • SHA1

    6b723644868f4820499a4c9cf254ef9add940f58

  • SHA256

    4736e79e75f24db2a63b318ab7f4119f115389f30064f692a11ae68508beb255

  • SHA512

    a97a68522a50430acdca7c8c6ee441e99e4be7c2b49f3df7cd4ad5801aae58e6603c46f50e026a5a234242325316119494a30aebcd7f5e1f5a40ef3ae6ee896a

  • SSDEEP

    49152:/Ryi81om8kG+WpI+A9GpOQ8y2xKK8Zn8PtgyuI9LS3j12Co:/8i8H8kG+B+A99b1lgyhhC

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

154.91.0.57:28105

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QuantumBuilder.exe
    "C:\Users\Admin\AppData\Local\Temp\QuantumBuilder.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Roaming\exvjkakpysajgwh.exe
      "C:\Users\Admin\AppData\Roaming\exvjkakpysajgwh.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2304
    • C:\Users\Admin\AppData\Roaming\mpr.exe
      "C:\Users\Admin\AppData\Roaming\mpr.exe"
      2⤵
      • Executes dropped EXE
      PID:4012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\exvjkakpysajgwh.exe

    Filesize

    871KB

    MD5

    6670d8dba2d02a2a779d089bda99a9e3

    SHA1

    cbf0a573db7fd7613f84178531fcea1210c1da78

    SHA256

    7b9be6b1276fc7fac3d04be2102f81c12eadcb8e09b62ab4aff147f170a0a6fe

    SHA512

    7b07b593581a8a578e07502c7c5398ad7a15758f20c7042064e13259ae83fcc3dab6ee2a35c30484e9666f181c76669d6cc9e0e93c9512312d36f2db9baf730e

  • C:\Users\Admin\AppData\Roaming\mpr.exe

    Filesize

    91KB

    MD5

    4cf83bb0950ea8f23e9f64ec606dd30e

    SHA1

    0da75437799fc00859460985551c814707dcadf9

    SHA256

    962f79e95d01a06ea9c646c4f935956251e58e7887caf284d06233d2a50c5b09

    SHA512

    28cc2a71b633d20b61f93cde9896b8db68f5f2e2e8a5d180299b3a0558b37bf2807c477fafbcceb8308b463237fbf58ffa8704ab3f2c91cb3f61961647af3766

  • memory/2032-0-0x0000000074DE2000-0x0000000074DE3000-memory.dmp

    Filesize

    4KB

  • memory/2032-1-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/2032-2-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/2032-19-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/2304-31-0x00007FFD9EAD3000-0x00007FFD9EAD5000-memory.dmp

    Filesize

    8KB

  • memory/2304-24-0x00007FFDBCE50000-0x00007FFDBD045000-memory.dmp

    Filesize

    2.0MB

  • memory/2304-21-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/2304-30-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/2304-29-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB

  • memory/2304-32-0x00000000025F0000-0x000000000260E000-memory.dmp

    Filesize

    120KB

  • memory/2304-33-0x0000000002620000-0x0000000002632000-memory.dmp

    Filesize

    72KB

  • memory/2304-35-0x00007FFD9EAD0000-0x00007FFD9F591000-memory.dmp

    Filesize

    10.8MB

  • memory/2304-36-0x00007FFD9EAD0000-0x00007FFD9F591000-memory.dmp

    Filesize

    10.8MB

  • memory/2304-34-0x0000000003A90000-0x0000000003ACC000-memory.dmp

    Filesize

    240KB

  • memory/2304-37-0x00007FFD9EAD0000-0x00007FFD9F591000-memory.dmp

    Filesize

    10.8MB

  • memory/2304-38-0x00007FFD9EAD0000-0x00007FFD9F591000-memory.dmp

    Filesize

    10.8MB

  • memory/2304-39-0x0000000000400000-0x00000000004F7000-memory.dmp

    Filesize

    988KB