Overview
overview
10Static
static
3ttcopy.exe
windows10-2004-x64
10ttcopy.exe
windows10-2004-x64
10ttcopy.exe
windows10-ltsc_2021-x64
10ttcopy.exe
windows11-21h2-x64
10ttcopy.exe
android-10-x64
ttcopy.exe
android-13-x64
ttcopy.exe
macos-10.15-amd64
ttcopy.exe
ubuntu-18.04-amd64
ttcopy.exe
debian-9-armhf
ttcopy.exe
debian-9-mips
ttcopy.exe
debian-9-mipsel
Analysis
-
max time kernel
108s -
max time network
119s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
ttcopy.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
ttcopy.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
ttcopy.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
ttcopy.exe
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
ttcopy.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
ttcopy.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral7
Sample
ttcopy.exe
Resource
macos-20241101-en
Behavioral task
behavioral8
Sample
ttcopy.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral9
Sample
ttcopy.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral10
Sample
ttcopy.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral11
Sample
ttcopy.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
ttcopy.exe
-
Size
1.4MB
-
MD5
eace0039dd2f8fb2a963b0cf8208b8ed
-
SHA1
3c9095b0e6b423b17abb966bc2dce7092a05fe70
-
SHA256
3e66d72e6cb4fab3bf03a7a1ba048e661b9669928a021140d4d0cde12ced097f
-
SHA512
eaf1ffb532deda9424cbfb3655dbe423f6e0ec289dd7eeec02714eef516e068c0fa15c914fc69f146d5d9a3839b6a34d2a81925953c66b4b0252ae28c7345135
-
SSDEEP
12288:p2hhDcnbPxuhAjGSJTRQ2b+pth7BmwE5Td3o:MEbPAhAiSJTRQ2bSthtmwEp6
Malware Config
Extracted
redline
cheat
103.168.67.29:6677
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral3/memory/4804-17-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral3/memory/4804-17-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000\Control Panel\International\Geo\Nation ttcopy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 4804 2432 ttcopy.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttcopy.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4652 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4804 ttcopy.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2432 wrote to memory of 4652 2432 ttcopy.exe 89 PID 2432 wrote to memory of 4652 2432 ttcopy.exe 89 PID 2432 wrote to memory of 4652 2432 ttcopy.exe 89 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91 PID 2432 wrote to memory of 4804 2432 ttcopy.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ttcopy.exeC:\Users\Admin\AppData\Local\Temp\ttcopy.exe bcdedit /c set shutdown /r readonly /f force /t 21⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LvfcqXStYW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE61A.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\ttcopy.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c8849e1d2d560284d0c77c1c2dd7032b
SHA14cc4060df98bca9d9b7a9ebdd53ac7e5cf2bfa0c
SHA25649455db2409bd28406518ddf4fdaf4329dc26d56c790a806f2f96f57f038750a
SHA51224a61e4917f062477e1e821072008a4880053ab9c8468c449a8f7445a2d6b9293dbccaa1072f4933ce2f78a689ab8a705ba143ae1dd363de7fc9e93fda392d35
-
Filesize
1KB
MD5a7934f37a037afc3063f3d6e48ccbefe
SHA1a1437ed812c6b63e4c5de75e2a37ac987d9ff5f1
SHA2560305bee95a2981ab9e3475995aa2d0e0b7ee0a05607121502a6a4306b035b1a9
SHA512217aec6416d3fd4985d2a38874836a008858c4f0141f1f33a03cb7eaeb321578eefda43f8897c6b0d1cb20922b1c57d752ec24a963c68995e1c4055a3bf81433