Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 20:19
Static task
static1
Behavioral task
behavioral1
Sample
CrunchyrollCheckerbyxRisky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CrunchyrollCheckerbyxRisky.exe
Resource
win10v2004-20241007-en
General
-
Target
CrunchyrollCheckerbyxRisky.exe
-
Size
2.2MB
-
MD5
c1569f6f8a566286be9c1462a45439f0
-
SHA1
495666664562a811021e044228917b25a8a9c0b6
-
SHA256
34c5044ae9b4eaea508f2444a2bdc861b5baef9839950e7f0ac8f478119b7923
-
SHA512
0fb49a006c99c59bb5b55df40a108bdff3cbe01830af5ce051c61fff1a631ea8fdb8153aa7bb0739415fe97fbf67830c3c3228f901e8b2c9f0c39f2cda1e135f
-
SSDEEP
49152:gRArNHv39/gvqDZEsLXN4c1ILuo2iue915Y:4uNHvt/lEe0uo21e9
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2660-51-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2660-46-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2660-48-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2660-53-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2660-52-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2660-51-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2660-46-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2660-48-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2660-53-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2660-52-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Executes dropped EXE 2 IoCs
pid Process 2876 Ultimate-Crack-Pack.exe 2972 Crunchyroll Checker by xRisky.exe -
Loads dropped DLL 5 IoCs
pid Process 2972 Crunchyroll Checker by xRisky.exe 2972 Crunchyroll Checker by xRisky.exe 2972 Crunchyroll Checker by xRisky.exe 2972 Crunchyroll Checker by xRisky.exe 2972 Crunchyroll Checker by xRisky.exe -
Obfuscated with Agile.Net obfuscator 4 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2972-17-0x0000000004D00000-0x0000000004E58000-memory.dmp agile_net behavioral1/memory/2972-26-0x0000000004D00000-0x0000000004E52000-memory.dmp agile_net behavioral1/memory/2972-24-0x0000000004D00000-0x0000000004E52000-memory.dmp agile_net behavioral1/memory/2972-22-0x0000000004D00000-0x0000000004E52000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\msconfig.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\\System Configuration\\msconfig.exe.exe" powershell.exe -
pid Process 2604 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2876 set thread context of 2660 2876 Ultimate-Crack-Pack.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate-Crack-Pack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crunchyroll Checker by xRisky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: SeDebugPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2660 RegAsm.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe Token: 33 2972 Crunchyroll Checker by xRisky.exe Token: SeIncBasePriorityPrivilege 2972 Crunchyroll Checker by xRisky.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2876 2820 CrunchyrollCheckerbyxRisky.exe 30 PID 2820 wrote to memory of 2876 2820 CrunchyrollCheckerbyxRisky.exe 30 PID 2820 wrote to memory of 2876 2820 CrunchyrollCheckerbyxRisky.exe 30 PID 2820 wrote to memory of 2876 2820 CrunchyrollCheckerbyxRisky.exe 30 PID 2820 wrote to memory of 2972 2820 CrunchyrollCheckerbyxRisky.exe 31 PID 2820 wrote to memory of 2972 2820 CrunchyrollCheckerbyxRisky.exe 31 PID 2820 wrote to memory of 2972 2820 CrunchyrollCheckerbyxRisky.exe 31 PID 2820 wrote to memory of 2972 2820 CrunchyrollCheckerbyxRisky.exe 31 PID 2876 wrote to memory of 2604 2876 Ultimate-Crack-Pack.exe 32 PID 2876 wrote to memory of 2604 2876 Ultimate-Crack-Pack.exe 32 PID 2876 wrote to memory of 2604 2876 Ultimate-Crack-Pack.exe 32 PID 2876 wrote to memory of 2604 2876 Ultimate-Crack-Pack.exe 32 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34 PID 2876 wrote to memory of 2660 2876 Ultimate-Crack-Pack.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrunchyrollCheckerbyxRisky.exe"C:\Users\Admin\AppData\Local\Temp\CrunchyrollCheckerbyxRisky.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate-Crack-Pack.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'msconfig.exe' -Value '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration\msconfig.exe.exe"' -PropertyType 'String'3⤵
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Crunchyroll Checker by xRisky.exe"C:\Users\Admin\AppData\Local\Temp\Crunchyroll Checker by xRisky.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD508b38d8dfed76440354393c3a83a06e2
SHA128fb407cf185284a3c7e3616e15caa7c03d37ae3
SHA256fd8b6add3cf06c7941cd85cd8741d7e639fced8b4ec2fcb96d58e7bbab334185
SHA5124f7417b3b047f21e9ffe620bf9891a8ea6f46780515ff6d7e558b5bd7f0716797e056afbe44ac68c754fb8551d02d995474b39275d7841ce6cc664c9222120ab
-
Filesize
115KB
MD542cf916df4ea1d300201ec9559b7bef3
SHA1f58abe0ad5f3e033a9dbebcebd02692c5d35936d
SHA256939c8980bcb9bd9a2279714f6086714229e7af194ec4e32677c5a4ed96db5edd
SHA5122d03d21b369b9784329573e8219553f4c6b3cae66515ebe7409154c7457e3cfb95f8dfac5bae57820ade2a5219dd7d10ce34d72ec8971b2fbb7024a5a23cc1ed
-
Filesize
305KB
MD50d30a398cec0ff006b6ea2b52d11e744
SHA14ceebd9c6180a321c4d4f3cfb5cfc3952bf72b45
SHA2568604bf2a1fe2e94dc1ea1fbd0cf54e77303493b93994df48479dc683580aa654
SHA5128e06ff131a81e73b1ff5de78262701a11ecc2bcdaf41011f4e96f11c5372742478e70b6a0901b61953c21c95725532af8d785654405ec5066ad157e2143467cc
-
Filesize
115KB
MD5dc6f230a993249cbe632aea3edbbd63e
SHA1ee67ed14eb647918d0d7ffd11ba7b665eeb19c27
SHA256a6c001e47fd68b6c97fa484c5c98f918eed5d231bd8f1a4e4ad65af20788118b
SHA5127e9b46e5d8e8fa609c839d570cf6cf80c7464de553f094e02b6f86e96dc81ce65a1f5f071acd6fadec9d1f4690f48972d4425a7dc2bb0bab7d0588eae81fa5e2