Overview
overview
10Static
static
8197f0e170f...2a.exe
windows7_x64
9197f0e170f...2a.exe
windows10_x64
9302d77c6ec...56.exe
windows7_x64
8302d77c6ec...56.exe
windows10_x64
8466d872ddb...0d.exe
windows7_x64
8466d872ddb...0d.exe
windows10_x64
106d13a07022...f4.exe
windows7_x64
86d13a07022...f4.exe
windows10_x64
88c1d1de824...ef.exe
windows7_x64
18c1d1de824...ef.exe
windows10_x64
1a31f1894f1...b8.exe
windows7_x64
8a31f1894f1...b8.exe
windows10_x64
9a3802c3a05...6d.exe
windows7_x64
10a3802c3a05...6d.exe
windows10_x64
10Android APK
android_x86_64
10c6c0d4969a...36.exe
windows7_x64
1c6c0d4969a...36.exe
windows10_x64
1d92ef7281e...1a.exe
windows7_x64
1d92ef7281e...1a.exe
windows10_x64
1dffb2eaccb...3a.exe
windows7_x64
8dffb2eaccb...3a.exe
windows10_x64
8e247b061c8...b1.exe
windows7_x64
8e247b061c8...b1.exe
windows10_x64
8Analysis
-
max time kernel
62s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-11-2020 02:32
Static task
static1
Behavioral task
behavioral1
Sample
197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
302d77c6ec68c07741be2ae0d0c26bc88c85f525c8e3766ebf23dba34802f956.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
302d77c6ec68c07741be2ae0d0c26bc88c85f525c8e3766ebf23dba34802f956.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
466d872ddb9f8ce7db8d16d171b9ba398f99c98c79e63396760cda7426d9460d.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
466d872ddb9f8ce7db8d16d171b9ba398f99c98c79e63396760cda7426d9460d.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
6d13a07022cd549f981cc929795c9c1b18c424a0faff27c1faa8990ca843c6f4.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
8c1d1de824c079bfec155f05b5f24fd4e1c64c015286ac417b3a587124d743ef.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
8c1d1de824c079bfec155f05b5f24fd4e1c64c015286ac417b3a587124d743ef.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
a31f1894f161f1005c00ad43235500691a4fd0cb7bd83945d47f16dbd7f62ab8.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe
Resource
win7v20201028
Behavioral task
behavioral14
Sample
a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
af82bed2c58c403908faf323310cf6a65a7e3bfe098cc930eb5ac4bfe9315ef4.apk
Resource
android-x86_64
Behavioral task
behavioral16
Sample
c6c0d4969ac74cdc574fae3ace12a4ad64858ec5ab292733ae78fd3d04696536.exe
Resource
win7v20201028
Behavioral task
behavioral17
Sample
c6c0d4969ac74cdc574fae3ace12a4ad64858ec5ab292733ae78fd3d04696536.exe
Resource
win10v20201028
Behavioral task
behavioral18
Sample
d92ef7281e3b5145835ffa17ff869c5569011ffb9ad327eeecfddebe31cdc31a.exe
Resource
win7v20201028
Behavioral task
behavioral19
Sample
d92ef7281e3b5145835ffa17ff869c5569011ffb9ad327eeecfddebe31cdc31a.exe
Resource
win10v20201028
Behavioral task
behavioral20
Sample
dffb2eaccbbfd1077d7679ecba62bb75de32259c70e28a84b32750fdfb17e13a.exe
Resource
win7v20201028
Behavioral task
behavioral21
Sample
dffb2eaccbbfd1077d7679ecba62bb75de32259c70e28a84b32750fdfb17e13a.exe
Resource
win10v20201028
Behavioral task
behavioral22
Sample
e247b061c89190fa7fec3ce419b3ed58e088db8a58fa40fc208d3995b149adb1.exe
Resource
win7v20201028
Behavioral task
behavioral23
Sample
e247b061c89190fa7fec3ce419b3ed58e088db8a58fa40fc208d3995b149adb1.exe
Resource
win10v20201028
General
-
Target
a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe
-
Size
590KB
-
MD5
6611edb58235884e8499d12cdfa808be
-
SHA1
7d1f2d13c59930dbb8e2547f3748215da9f20ee9
-
SHA256
a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d
-
SHA512
283769a041c725cfca6501b47979d8a51695535f701dca45d0c444a5e0d903e40a19ca98adc26f54998f2a4c27b9772bd821196c19f2b6ba485c837d79c803c2
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Processes:
resource yara_rule behavioral14/memory/2696-11-0x0000000000400000-0x0000000000426000-memory.dmp agent_tesla behavioral14/memory/2696-12-0x000000000042040E-mapping.dmp agent_tesla -
Executes dropped EXE 2 IoCs
Processes:
BubbleBrowser.exeBubbleBrowser.exepid process 2072 BubbleBrowser.exe 2696 BubbleBrowser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 checkip.amazonaws.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
BubbleBrowser.exedescription pid process target process PID 2072 set thread context of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
BubbleBrowser.exepid process 2696 BubbleBrowser.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
BubbleBrowser.exeBubbleBrowser.exedescription pid process Token: SeDebugPrivilege 2072 BubbleBrowser.exe Token: SeDebugPrivilege 2696 BubbleBrowser.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exeBubbleBrowser.exeBubbleBrowser.execmd.exedescription pid process target process PID 988 wrote to memory of 2072 988 a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe BubbleBrowser.exe PID 988 wrote to memory of 2072 988 a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe BubbleBrowser.exe PID 988 wrote to memory of 2072 988 a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2072 wrote to memory of 2696 2072 BubbleBrowser.exe BubbleBrowser.exe PID 2696 wrote to memory of 2740 2696 BubbleBrowser.exe cmd.exe PID 2696 wrote to memory of 2740 2696 BubbleBrowser.exe cmd.exe PID 2696 wrote to memory of 2740 2696 BubbleBrowser.exe cmd.exe PID 2740 wrote to memory of 816 2740 cmd.exe PING.EXE PID 2740 wrote to memory of 816 2740 cmd.exe PING.EXE PID 2740 wrote to memory of 816 2740 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe"C:\Users\Admin\AppData\Local\Temp\a3802c3a0538d8b24b8a43144c51e742b0041e3b983b654ee19639359c42b06d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Roaming\BubbleBrowser.exeC:\Users\Admin\AppData\Roaming\BubbleBrowser.exe daut2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\BubbleBrowser.exe"C:\Users\Admin\AppData\Roaming\BubbleBrowser.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul &del "C:\Users\Admin\AppData\Roaming\BubbleBrowser.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 35⤵
- Runs ping.exe
PID:816
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9e7845217df4a635ec4341c3d52ed685
SHA1d65cb39d37392975b038ce503a585adadb805da5
SHA256d60e596ed3d5c13dc9f1660e6d870d99487e1383891437645c4562a9ecaa8c9b
SHA512307c3b4d4f2655bdeb177e7b9c981ca27513618903f02c120caa755c9da5a8dd03ebab660b56108a680720a97c1e9596692490aede18cc4bd77b9fc3d8e68aa1
-
MD5
11d71c92fb114168431892a73963cb15
SHA16467448f5b6dfb4f0cd77e218e6e4bfbe8a61696
SHA25618f4e6a6483a5684d61942d56cc20abc1ed690aa03910c9a3ebe24e71da8cf94
SHA512e3d2b822acf17d3c63e1efad5ef2dfc5ff3a2fdbed9a1b3791e1175fc674f62c0be2ef618d0a4a36e4e5c96c5399a3d53e0e3c0102b2a9324aa30641d301e6be
-
MD5
11d71c92fb114168431892a73963cb15
SHA16467448f5b6dfb4f0cd77e218e6e4bfbe8a61696
SHA25618f4e6a6483a5684d61942d56cc20abc1ed690aa03910c9a3ebe24e71da8cf94
SHA512e3d2b822acf17d3c63e1efad5ef2dfc5ff3a2fdbed9a1b3791e1175fc674f62c0be2ef618d0a4a36e4e5c96c5399a3d53e0e3c0102b2a9324aa30641d301e6be
-
MD5
11d71c92fb114168431892a73963cb15
SHA16467448f5b6dfb4f0cd77e218e6e4bfbe8a61696
SHA25618f4e6a6483a5684d61942d56cc20abc1ed690aa03910c9a3ebe24e71da8cf94
SHA512e3d2b822acf17d3c63e1efad5ef2dfc5ff3a2fdbed9a1b3791e1175fc674f62c0be2ef618d0a4a36e4e5c96c5399a3d53e0e3c0102b2a9324aa30641d301e6be