Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
INQ_NB64773898-STOCK-U78477363.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INQ_NB64773898-STOCK-U78477363.exe
Resource
win10v2004-20250314-en
General
-
Target
INQ_NB64773898-STOCK-U78477363.exe
-
Size
1.3MB
-
MD5
87c252fb664a71af9b62da1a7661d2e9
-
SHA1
a6df180a2d267faf3d7c08ca9b218ac9008f27ed
-
SHA256
a48800d7b18541d4375e24bfede8beb941e55bc2c5d996553425bc3c52c0f0a9
-
SHA512
ec9403c0c64513210957317b93c4d79d034f8d0dd7eb64c315d8e82d1e97892d6c20e4e024b480cfd1cad1ffd9fa7a2e3daf030103755361729a1c3152be270e
-
SSDEEP
24576:hu6J33O0c+JY5UZ+XC0kGso6FazOiI8GE7zFP6W2BjjnW2ckPWY:zu0c++OCvkGs9FazjnP6h5jWxY
Malware Config
Extracted
redline
success
204.10.161.147:7082
Extracted
agenttesla
Protocol: smtp- Host:
mail.dkplus.com.tr - Port:
587 - Username:
[email protected] - Password:
04rf710m29 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016d50-28.dat family_redline behavioral1/memory/2312-41-0x0000000000E10000-0x0000000000E62000-memory.dmp family_redline -
Redline family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\porcelainization.vbs porcelainization.exe -
Executes dropped EXE 3 IoCs
pid Process 2808 porcelainization.exe 2312 build.exe 2876 Cmartins.exe -
Loads dropped DLL 3 IoCs
pid Process 2620 INQ_NB64773898-STOCK-U78477363.exe 532 svchost.exe 532 svchost.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016d47-11.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 532 2808 porcelainization.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmartins.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INQ_NB64773898-STOCK-U78477363.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language porcelainization.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2876 Cmartins.exe 2876 Cmartins.exe 2312 build.exe 2312 build.exe 2312 build.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2808 porcelainization.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2876 Cmartins.exe Token: SeDebugPrivilege 2312 build.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2620 INQ_NB64773898-STOCK-U78477363.exe 2620 INQ_NB64773898-STOCK-U78477363.exe 2808 porcelainization.exe 2808 porcelainization.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2620 INQ_NB64773898-STOCK-U78477363.exe 2620 INQ_NB64773898-STOCK-U78477363.exe 2808 porcelainization.exe 2808 porcelainization.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2808 2620 INQ_NB64773898-STOCK-U78477363.exe 30 PID 2620 wrote to memory of 2808 2620 INQ_NB64773898-STOCK-U78477363.exe 30 PID 2620 wrote to memory of 2808 2620 INQ_NB64773898-STOCK-U78477363.exe 30 PID 2620 wrote to memory of 2808 2620 INQ_NB64773898-STOCK-U78477363.exe 30 PID 2808 wrote to memory of 532 2808 porcelainization.exe 31 PID 2808 wrote to memory of 532 2808 porcelainization.exe 31 PID 2808 wrote to memory of 532 2808 porcelainization.exe 31 PID 2808 wrote to memory of 532 2808 porcelainization.exe 31 PID 2808 wrote to memory of 532 2808 porcelainization.exe 31 PID 532 wrote to memory of 2312 532 svchost.exe 32 PID 532 wrote to memory of 2312 532 svchost.exe 32 PID 532 wrote to memory of 2312 532 svchost.exe 32 PID 532 wrote to memory of 2312 532 svchost.exe 32 PID 532 wrote to memory of 2876 532 svchost.exe 33 PID 532 wrote to memory of 2876 532 svchost.exe 33 PID 532 wrote to memory of 2876 532 svchost.exe 33 PID 532 wrote to memory of 2876 532 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\INQ_NB64773898-STOCK-U78477363.exe"C:\Users\Admin\AppData\Local\Temp\INQ_NB64773898-STOCK-U78477363.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\murkest\porcelainization.exe"C:\Users\Admin\AppData\Local\Temp\INQ_NB64773898-STOCK-U78477363.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\INQ_NB64773898-STOCK-U78477363.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\Cmartins.exe"C:\Users\Admin\AppData\Local\Temp\Cmartins.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD565b6608a990b2ccf94df5039f31a474d
SHA17e8478b76217639b63b10cedafdbc16a472da3a5
SHA2568a6ce01f31abcd7c369b2c89932ec966a8e275ed392965def516c65f94efbc95
SHA5127ece11b7c85bafcaaa71e58bfb405354588845dfa4c06e922ef852c40bf46261482d63f8b91c2614d8ed6fcbb7023f0f1c63db0e60f0152f4e858280d6894a75
-
Filesize
1.3MB
MD587c252fb664a71af9b62da1a7661d2e9
SHA1a6df180a2d267faf3d7c08ca9b218ac9008f27ed
SHA256a48800d7b18541d4375e24bfede8beb941e55bc2c5d996553425bc3c52c0f0a9
SHA512ec9403c0c64513210957317b93c4d79d034f8d0dd7eb64c315d8e82d1e97892d6c20e4e024b480cfd1cad1ffd9fa7a2e3daf030103755361729a1c3152be270e
-
Filesize
300KB
MD5209b15fade618af5831e6e2528a4fedc
SHA12efc49db01f3df2c1cd0a528c75e466a9478b698
SHA256f07a706c0554ed9363bd396dd49f788a0df232caf0af01161d831a12b95d964d
SHA5123431efa0cfe6c2262ed07a9fe084567d9548e586efcfa752e0cec455e07f8a3e6b3acacacef77317881a0682358cf92d37abad80730560c33cb1e2d564afa8be