Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
07/05/2021, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
polas.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
polas.exe
Resource
win10v20210408
General
-
Target
polas.exe
-
Size
7.4MB
-
MD5
d15d3eb03c466f207dd401047da792bc
-
SHA1
cca4dd46f38bfc164a1840907a608fb657d471b0
-
SHA256
6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90
-
SHA512
432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4
Malware Config
Extracted
redline
@aBigF
ydmau.xyz:80
Signatures
-
Orcus Main Payload 6 IoCs
resource yara_rule behavioral1/files/0x00050000000130da-67.dat family_orcus behavioral1/files/0x00050000000130da-69.dat family_orcus behavioral1/files/0x00050000000130da-70.dat family_orcus behavioral1/files/0x00040000000130e4-128.dat family_orcus behavioral1/files/0x00040000000130e4-126.dat family_orcus behavioral1/files/0x00040000000130e4-140.dat family_orcus -
Panda Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/1352-96-0x0000000001340000-0x0000000001CE0000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral1/memory/1384-104-0x00000000004163C2-mapping.dmp family_redline behavioral1/memory/1384-103-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral1/memory/1384-107-0x0000000000400000-0x000000000041C000-memory.dmp family_redline -
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/files/0x00050000000130da-67.dat orcus behavioral1/files/0x00050000000130da-69.dat orcus behavioral1/files/0x00050000000130da-70.dat orcus behavioral1/files/0x00040000000130e4-128.dat orcus behavioral1/files/0x00040000000130e4-126.dat orcus behavioral1/files/0x00040000000130e4-140.dat orcus -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 1496 WintWare.exe 1052 1.v1mp.exe 1800 build.vmp.sfx.exe 1724 Hack.exe 1352 build.vmp.exe 1636 WindowsInput.exe 1932 WindowsInput.exe 1148 javaUpdate.exe 1572 javaUpdate.exe 1732 System32.exe 1988 System32.exe 1808 build2.exe -
resource yara_rule behavioral1/files/0x00050000000130da-67.dat vmprotect behavioral1/files/0x00050000000130da-69.dat vmprotect behavioral1/files/0x00050000000130da-70.dat vmprotect behavioral1/files/0x00040000000130df-88.dat vmprotect behavioral1/files/0x00040000000130df-92.dat vmprotect behavioral1/files/0x00040000000130df-91.dat vmprotect behavioral1/files/0x00040000000130df-87.dat vmprotect behavioral1/files/0x00040000000130df-86.dat vmprotect behavioral1/files/0x00040000000130df-85.dat vmprotect behavioral1/memory/1352-96-0x0000000001340000-0x0000000001CE0000-memory.dmp vmprotect behavioral1/files/0x00040000000130e4-128.dat vmprotect behavioral1/files/0x00040000000130e4-126.dat vmprotect behavioral1/memory/1148-129-0x0000000000E90000-0x0000000000E91000-memory.dmp vmprotect behavioral1/files/0x00040000000130e4-140.dat vmprotect -
Loads dropped DLL 12 IoCs
pid Process 480 polas.exe 480 polas.exe 480 polas.exe 1496 WintWare.exe 1496 WintWare.exe 1496 WintWare.exe 1496 WintWare.exe 1800 build.vmp.sfx.exe 1800 build.vmp.sfx.exe 1800 build.vmp.sfx.exe 1800 build.vmp.sfx.exe 1384 AddInProcess32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 icanhazip.com -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe.config 1.v1mp.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe 1.v1mp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 1384 1724 Hack.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
resource yara_rule behavioral1/files/0x00050000000130d9-60.dat nsis_installer_1 behavioral1/files/0x00050000000130d9-60.dat nsis_installer_2 behavioral1/files/0x00050000000130d9-61.dat nsis_installer_1 behavioral1/files/0x00050000000130d9-61.dat nsis_installer_2 behavioral1/files/0x00050000000130d9-62.dat nsis_installer_1 behavioral1/files/0x00050000000130d9-62.dat nsis_installer_2 behavioral1/files/0x00050000000130d9-64.dat nsis_installer_1 behavioral1/files/0x00050000000130d9-64.dat nsis_installer_2 behavioral1/files/0x00050000000130d9-66.dat nsis_installer_1 behavioral1/files/0x00050000000130d9-66.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Hack.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Hack.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1352 build.vmp.exe 1352 build.vmp.exe 1988 System32.exe 1988 System32.exe 1988 System32.exe 1148 javaUpdate.exe 1148 javaUpdate.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1384 AddInProcess32.exe 1384 AddInProcess32.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1808 build2.exe 1808 build2.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe 1988 System32.exe 1148 javaUpdate.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 dw20.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1724 Hack.exe Token: SeDebugPrivilege 1148 javaUpdate.exe Token: SeDebugPrivilege 1732 System32.exe Token: SeDebugPrivilege 1988 System32.exe Token: SeDebugPrivilege 1384 AddInProcess32.exe Token: SeDebugPrivilege 1808 build2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1148 javaUpdate.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 480 wrote to memory of 1496 480 polas.exe 26 PID 480 wrote to memory of 1496 480 polas.exe 26 PID 480 wrote to memory of 1496 480 polas.exe 26 PID 480 wrote to memory of 1496 480 polas.exe 26 PID 1496 wrote to memory of 1052 1496 WintWare.exe 27 PID 1496 wrote to memory of 1052 1496 WintWare.exe 27 PID 1496 wrote to memory of 1052 1496 WintWare.exe 27 PID 1496 wrote to memory of 1052 1496 WintWare.exe 27 PID 1496 wrote to memory of 1800 1496 WintWare.exe 28 PID 1496 wrote to memory of 1800 1496 WintWare.exe 28 PID 1496 wrote to memory of 1800 1496 WintWare.exe 28 PID 1496 wrote to memory of 1800 1496 WintWare.exe 28 PID 1496 wrote to memory of 1724 1496 WintWare.exe 29 PID 1496 wrote to memory of 1724 1496 WintWare.exe 29 PID 1496 wrote to memory of 1724 1496 WintWare.exe 29 PID 1496 wrote to memory of 1724 1496 WintWare.exe 29 PID 1800 wrote to memory of 1352 1800 build.vmp.sfx.exe 30 PID 1800 wrote to memory of 1352 1800 build.vmp.sfx.exe 30 PID 1800 wrote to memory of 1352 1800 build.vmp.sfx.exe 30 PID 1800 wrote to memory of 1352 1800 build.vmp.sfx.exe 30 PID 1052 wrote to memory of 632 1052 1.v1mp.exe 32 PID 1052 wrote to memory of 632 1052 1.v1mp.exe 32 PID 1052 wrote to memory of 632 1052 1.v1mp.exe 32 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 1724 wrote to memory of 1384 1724 Hack.exe 34 PID 632 wrote to memory of 1828 632 csc.exe 35 PID 632 wrote to memory of 1828 632 csc.exe 35 PID 632 wrote to memory of 1828 632 csc.exe 35 PID 1052 wrote to memory of 1636 1052 1.v1mp.exe 36 PID 1052 wrote to memory of 1636 1052 1.v1mp.exe 36 PID 1052 wrote to memory of 1636 1052 1.v1mp.exe 36 PID 1052 wrote to memory of 1148 1052 1.v1mp.exe 38 PID 1052 wrote to memory of 1148 1052 1.v1mp.exe 38 PID 1052 wrote to memory of 1148 1052 1.v1mp.exe 38 PID 768 wrote to memory of 1572 768 taskeng.exe 43 PID 768 wrote to memory of 1572 768 taskeng.exe 43 PID 768 wrote to memory of 1572 768 taskeng.exe 43 PID 1148 wrote to memory of 1732 1148 javaUpdate.exe 44 PID 1148 wrote to memory of 1732 1148 javaUpdate.exe 44 PID 1148 wrote to memory of 1732 1148 javaUpdate.exe 44 PID 1148 wrote to memory of 1732 1148 javaUpdate.exe 44 PID 1732 wrote to memory of 1988 1732 System32.exe 45 PID 1732 wrote to memory of 1988 1732 System32.exe 45 PID 1732 wrote to memory of 1988 1732 System32.exe 45 PID 1732 wrote to memory of 1988 1732 System32.exe 45 PID 1384 wrote to memory of 1808 1384 AddInProcess32.exe 47 PID 1384 wrote to memory of 1808 1384 AddInProcess32.exe 47 PID 1384 wrote to memory of 1808 1384 AddInProcess32.exe 47 PID 1384 wrote to memory of 1808 1384 AddInProcess32.exe 47 PID 1808 wrote to memory of 2000 1808 build2.exe 48 PID 1808 wrote to memory of 2000 1808 build2.exe 48 PID 1808 wrote to memory of 2000 1808 build2.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\polas.exe"C:\Users\Admin\AppData\Local\Temp\polas.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Local\Temp\WintWare.exe"C:\Users\Admin\AppData\Local\Temp\WintWare.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Roaming\1.v1mp.exeC:\Users\Admin\AppData\Roaming\1.v1mp.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vda8jauk.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2DB6.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2DB5.tmp"5⤵PID:1828
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1636
-
-
C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\System32.exe"C:\Users\Admin\AppData\Roaming\System32.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 1148 /protectFile5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\System32.exe"C:\Users\Admin\AppData\Roaming\System32.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 1148 "/protectFile"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exeC:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
-
C:\Users\Admin\AppData\Roaming\Hack.exeC:\Users\Admin\AppData\Roaming\Hack.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Roaming\build2.exe"C:\Users\Admin\AppData\Roaming\build2.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 9686⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2000
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:1932
-
C:\Windows\system32\taskeng.exetaskeng.exe {F87E10A2-F37D-4B6A-8940-6AE1D42ACBA9} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exeC:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe2⤵
- Executes dropped EXE
PID:1572
-