Analysis
-
max time kernel
103s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
Materials_Technical_Details_Order_BD298_N78W.exe
Resource
win10v2004-20250313-en
General
-
Target
Materials_Technical_Details_Order_BD298_N78W.exe
-
Size
1.6MB
-
MD5
f664590d422d04b09a429b5cccd3e43b
-
SHA1
13bbba67e66f84ed51cf58f921e99c0409cb08fd
-
SHA256
ccca9a72aa09a05d727e82e02dfd145f71e5c48e09b4b77c35995ca8ef162fb4
-
SHA512
0489adf9e6f44dfbb2a86e366fb184410844fc6a6fcc7f82637cb3407904e3b831728699d170a5c4efd65a44f84818d36e0c6573a2a54ba6a839052cecb23ee6
-
SSDEEP
49152:bu0c++OCvkGs9Fax9hsuaRaV5Db0uk+EmZN/srY:aB3vkJ9q1EiXGr
Malware Config
Extracted
Protocol: smtp- Host:
mail.dkplus.com.tr - Port:
587 - Username:
[email protected] - Password:
04rf710m29
Extracted
redline
success
204.10.161.147:7082
Extracted
agenttesla
Protocol: smtp- Host:
mail.dkplus.com.tr - Port:
587 - Username:
[email protected] - Password:
04rf710m29 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000243dd-74.dat family_redline behavioral1/memory/3128-82-0x0000000000FF0000-0x0000000001042000-memory.dmp family_redline -
Redline family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\porcelainization.vbs porcelainization.exe -
Executes dropped EXE 3 IoCs
pid Process 5564 porcelainization.exe 3128 build.exe 676 Cmartins.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0017000000023ef1-11.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5564 set thread context of 4684 5564 porcelainization.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 3120 5564 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Materials_Technical_Details_Order_BD298_N78W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language porcelainization.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmartins.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 676 Cmartins.exe 676 Cmartins.exe 3128 build.exe 3128 build.exe 3128 build.exe 3128 build.exe 3128 build.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5564 porcelainization.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4684 RegSvcs.exe Token: SeDebugPrivilege 676 Cmartins.exe Token: SeDebugPrivilege 3128 build.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4080 wrote to memory of 5564 4080 Materials_Technical_Details_Order_BD298_N78W.exe 88 PID 4080 wrote to memory of 5564 4080 Materials_Technical_Details_Order_BD298_N78W.exe 88 PID 4080 wrote to memory of 5564 4080 Materials_Technical_Details_Order_BD298_N78W.exe 88 PID 5564 wrote to memory of 4684 5564 porcelainization.exe 91 PID 5564 wrote to memory of 4684 5564 porcelainization.exe 91 PID 5564 wrote to memory of 4684 5564 porcelainization.exe 91 PID 5564 wrote to memory of 4684 5564 porcelainization.exe 91 PID 4684 wrote to memory of 3128 4684 RegSvcs.exe 97 PID 4684 wrote to memory of 3128 4684 RegSvcs.exe 97 PID 4684 wrote to memory of 3128 4684 RegSvcs.exe 97 PID 4684 wrote to memory of 676 4684 RegSvcs.exe 98 PID 4684 wrote to memory of 676 4684 RegSvcs.exe 98 PID 4684 wrote to memory of 676 4684 RegSvcs.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Materials_Technical_Details_Order_BD298_N78W.exe"C:\Users\Admin\AppData\Local\Temp\Materials_Technical_Details_Order_BD298_N78W.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Bohmerwald\porcelainization.exe"C:\Users\Admin\AppData\Local\Temp\Materials_Technical_Details_Order_BD298_N78W.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Materials_Technical_Details_Order_BD298_N78W.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\Cmartins.exe"C:\Users\Admin\AppData\Local\Temp\Cmartins.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 6883⤵
- Program crash
PID:3120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5564 -ip 55641⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5f664590d422d04b09a429b5cccd3e43b
SHA113bbba67e66f84ed51cf58f921e99c0409cb08fd
SHA256ccca9a72aa09a05d727e82e02dfd145f71e5c48e09b4b77c35995ca8ef162fb4
SHA5120489adf9e6f44dfbb2a86e366fb184410844fc6a6fcc7f82637cb3407904e3b831728699d170a5c4efd65a44f84818d36e0c6573a2a54ba6a839052cecb23ee6
-
Filesize
247KB
MD565b6608a990b2ccf94df5039f31a474d
SHA17e8478b76217639b63b10cedafdbc16a472da3a5
SHA2568a6ce01f31abcd7c369b2c89932ec966a8e275ed392965def516c65f94efbc95
SHA5127ece11b7c85bafcaaa71e58bfb405354588845dfa4c06e922ef852c40bf46261482d63f8b91c2614d8ed6fcbb7023f0f1c63db0e60f0152f4e858280d6894a75
-
Filesize
720KB
MD5d1913ebb8503347795e94361602d83a6
SHA166811e9678a955adf66806626df47a6d54863bd2
SHA2560d8587e94e04b12fddd91f62ea600e8b746b3711ea9625e7fe9ed9374b044086
SHA512ff008d1f11a03a94f3249e2819c4757ebb656e7960c2f37cd7a641fbeb9272b6987912e91a968dc6f38e3a874a76ca4795862d26faf2d105d1f85f6ab058ec03
-
Filesize
300KB
MD5209b15fade618af5831e6e2528a4fedc
SHA12efc49db01f3df2c1cd0a528c75e466a9478b698
SHA256f07a706c0554ed9363bd396dd49f788a0df232caf0af01161d831a12b95d964d
SHA5123431efa0cfe6c2262ed07a9fe084567d9548e586efcfa752e0cec455e07f8a3e6b3acacacef77317881a0682358cf92d37abad80730560c33cb1e2d564afa8be