Analysis
-
max time kernel
72s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 02:34
Static task
static1
General
-
Target
RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe
-
Size
1.4MB
-
MD5
90dc7c1dea8a6e2c03fedc9db60a1b5a
-
SHA1
1add1bc885460dd045c7241e3385af2aa1d2c521
-
SHA256
a52110ba312a9500399c954fdb31a54288e2ab7b1f44b77adcb6864575460d8f
-
SHA512
834d34798067448ba3d5683625eb0c01cd170a6decbfcbccf470795af45cade6eb1924a3929e64bf7d5c60eab53dc8694d66cce1e405e770e812d257266ad8a4
-
SSDEEP
24576:8u6J33O0c+JY5UZ+XC0kGso6Fa7KOf3sGJtaRd/7zXgQKFKncbTEPVbxxgWY:mu0c++OCvkGs9Fa7KUEDjLkRbTAVbxhY
Malware Config
Extracted
xworm
5.0
204.10.161.147:7081
XoFHv1TT4hWErxRo
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
redline
success
204.10.161.147:7082
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
204.10.161.147:5009
ihdiqhrlparelebtcw
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000400000001dab1-75.dat family_xworm behavioral1/memory/2444-78-0x0000000000B20000-0x0000000000B30000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1604-77-0x0000000000D70000-0x0000000000DC2000-memory.dmp family_redline behavioral1/files/0x000500000001daa3-67.dat family_redline -
Redline family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2444-143-0x000000001D3D0000-0x000000001D3E8000-memory.dmp family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 540 powershell.exe 2384 powershell.exe 1512 powershell.exe 1296 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\conged.vbs conged.exe -
Executes dropped EXE 4 IoCs
pid Process 4588 conged.exe 1604 build.exe 2444 XClient.exe 112 XClient.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000001e498-11.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4588 set thread context of 1368 4588 conged.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conged.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2444 XClient.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 540 powershell.exe 540 powershell.exe 2384 powershell.exe 2384 powershell.exe 1512 powershell.exe 1512 powershell.exe 1296 powershell.exe 1296 powershell.exe 2444 XClient.exe 1604 build.exe 1604 build.exe 1604 build.exe 1604 build.exe 1604 build.exe 2444 XClient.exe 2444 XClient.exe 2444 XClient.exe 2444 XClient.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4588 conged.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1368 svchost.exe Token: SeDebugPrivilege 2444 XClient.exe Token: SeDebugPrivilege 540 powershell.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeDebugPrivilege 112 XClient.exe Token: SeDebugPrivilege 1604 build.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2444 XClient.exe 2444 XClient.exe 2444 XClient.exe 2444 XClient.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4588 2196 RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe 91 PID 2196 wrote to memory of 4588 2196 RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe 91 PID 2196 wrote to memory of 4588 2196 RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe 91 PID 4588 wrote to memory of 1368 4588 conged.exe 92 PID 4588 wrote to memory of 1368 4588 conged.exe 92 PID 4588 wrote to memory of 1368 4588 conged.exe 92 PID 4588 wrote to memory of 1368 4588 conged.exe 92 PID 1368 wrote to memory of 1604 1368 svchost.exe 93 PID 1368 wrote to memory of 1604 1368 svchost.exe 93 PID 1368 wrote to memory of 1604 1368 svchost.exe 93 PID 1368 wrote to memory of 2444 1368 svchost.exe 94 PID 1368 wrote to memory of 2444 1368 svchost.exe 94 PID 2444 wrote to memory of 540 2444 XClient.exe 99 PID 2444 wrote to memory of 540 2444 XClient.exe 99 PID 2444 wrote to memory of 2384 2444 XClient.exe 101 PID 2444 wrote to memory of 2384 2444 XClient.exe 101 PID 2444 wrote to memory of 1512 2444 XClient.exe 103 PID 2444 wrote to memory of 1512 2444 XClient.exe 103 PID 2444 wrote to memory of 1296 2444 XClient.exe 106 PID 2444 wrote to memory of 1296 2444 XClient.exe 106 PID 2964 wrote to memory of 112 2964 cmd.exe 110 PID 2964 wrote to memory of 112 2964 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\preconform\conged.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_TB2837V_MATERIALS&TECH-SPEC-OP6736-2025.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:112
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD53930c254bc452c4fd482e3059b51aa04
SHA11c4bdb41f3a7c9d4ee3b8006cc1c495eedb072e2
SHA256dc600748250d0dd0ffa2678049fd27ec8e56e262601f3d8a1fd7165b03f97fb8
SHA512888565d3356b5fc9c5b55d6842c520487219bc2220df2a56cb74686cc36ebd0fbd1ab9f2a17f93e9c15031c8d6366031a4fd2c1f8a6f8cf96bc3a5939f31a083
-
Filesize
944B
MD510890cda4b6eab618e926c4118ab0647
SHA11e1d63b73a0e6c7575f458b3c7917a9ce5ba776d
SHA25600f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14
SHA512a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221
-
Filesize
944B
MD567e8893616f805af2411e2f4a1411b2a
SHA139bf1e1a0ddf46ce7c136972120f512d92827dcd
SHA256ca0dfe104c1bf27f7e01999fcdabc16c6400c3da937c832c26bdbca322381d31
SHA512164e911a9935e75c8be1a6ec3d31199a16ba2a1064da6c09d771b2a38dd7fddd142301ef55d67d90f306d3a454a1ce7b72e129ea42e44500b9b8c623a8d98b4d
-
Filesize
37KB
MD5f298510c3c663fe4ee5dfb82ea0f6e7e
SHA19a47a552e16c2e5b965c7c481cfc85618f35cc4a
SHA25658018602d0ad31538a4c4926ec8b79cd9c4951bf0f1b4aafd07a785ac13d55be
SHA512b3d8d1501e61ab1f98b0e03194542725dbe25292a803cc440c9b24f75cd4357e55e6e15f4a9cf8831d0b0219cddd135f9c9f5f59e165e0f5c9ac6f962e636a2a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
518KB
MD5cfe2edd123c7af6d5c965448b181dd96
SHA1acdcd001c0eb99345b4ac9896506e407829c1ae5
SHA256dab09fe26b469c8e6bc96fafe60928eab73b0d0d5bb3034c87d8cd7ef2093c55
SHA512af08bfb1b8a956ac9ce6e1a97b1fe1585cc59eed6c675245ffad97c9ba5fa54662ff5591f86134b0bad752c9d0aa4dfd2b82cb943f1b38270a918dc247ffe9f8
-
Filesize
300KB
MD5209b15fade618af5831e6e2528a4fedc
SHA12efc49db01f3df2c1cd0a528c75e466a9478b698
SHA256f07a706c0554ed9363bd396dd49f788a0df232caf0af01161d831a12b95d964d
SHA5123431efa0cfe6c2262ed07a9fe084567d9548e586efcfa752e0cec455e07f8a3e6b3acacacef77317881a0682358cf92d37abad80730560c33cb1e2d564afa8be
-
Filesize
1.4MB
MD590dc7c1dea8a6e2c03fedc9db60a1b5a
SHA11add1bc885460dd045c7241e3385af2aa1d2c521
SHA256a52110ba312a9500399c954fdb31a54288e2ab7b1f44b77adcb6864575460d8f
SHA512834d34798067448ba3d5683625eb0c01cd170a6decbfcbccf470795af45cade6eb1924a3929e64bf7d5c60eab53dc8694d66cce1e405e770e812d257266ad8a4