Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
07-05-2021 08:55
Static task
static1
Behavioral task
behavioral1
Sample
polas.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
polas.exe
Resource
win10v20210408
General
-
Target
polas.exe
-
Size
7.4MB
-
MD5
d15d3eb03c466f207dd401047da792bc
-
SHA1
cca4dd46f38bfc164a1840907a608fb657d471b0
-
SHA256
6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90
-
SHA512
432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4
Malware Config
Extracted
redline
@aBigF
ydmau.xyz:80
Signatures
-
Orcus Main Payload 5 IoCs
resource yara_rule behavioral2/files/0x000200000001ab53-121.dat family_orcus behavioral2/files/0x000200000001ab53-120.dat family_orcus behavioral2/files/0x000200000001ab64-171.dat family_orcus behavioral2/files/0x000200000001ab64-170.dat family_orcus behavioral2/files/0x000200000001ab64-181.dat family_orcus -
Panda Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/2124-140-0x0000000000850000-0x00000000011F0000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral2/memory/4000-142-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral2/memory/4000-143-0x00000000004163C2-mapping.dmp family_redline -
Orcurs Rat Executable 5 IoCs
resource yara_rule behavioral2/files/0x000200000001ab53-121.dat orcus behavioral2/files/0x000200000001ab53-120.dat orcus behavioral2/files/0x000200000001ab64-171.dat orcus behavioral2/files/0x000200000001ab64-170.dat orcus behavioral2/files/0x000200000001ab64-181.dat orcus -
Executes dropped EXE 11 IoCs
pid Process 2952 WintWare.exe 2388 1.v1mp.exe 1840 build.vmp.sfx.exe 652 Hack.exe 2124 build.vmp.exe 4056 WindowsInput.exe 2544 WindowsInput.exe 3948 javaUpdate.exe 856 javaUpdate.exe 2252 System32.exe 3932 System32.exe -
resource yara_rule behavioral2/files/0x000200000001ab53-121.dat vmprotect behavioral2/files/0x000200000001ab53-120.dat vmprotect behavioral2/files/0x000200000001ab56-135.dat vmprotect behavioral2/files/0x000200000001ab56-134.dat vmprotect behavioral2/memory/2124-140-0x0000000000850000-0x00000000011F0000-memory.dmp vmprotect behavioral2/files/0x000200000001ab64-171.dat vmprotect behavioral2/files/0x000200000001ab64-170.dat vmprotect behavioral2/memory/3948-173-0x00000000004D0000-0x00000000004D1000-memory.dmp vmprotect behavioral2/files/0x000200000001ab64-181.dat vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 1.v1mp.exe File opened for modification C:\Windows\assembly\Desktop.ini 1.v1mp.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe 1.v1mp.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config 1.v1mp.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 652 set thread context of 4000 652 Hack.exe 81 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 1.v1mp.exe File opened for modification C:\Windows\assembly\Desktop.ini 1.v1mp.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\assembly 1.v1mp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1728 4000 WerFault.exe 81 -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000300000001ab4e-118.dat nsis_installer_1 behavioral2/files/0x000300000001ab4e-118.dat nsis_installer_2 behavioral2/files/0x000300000001ab4e-117.dat nsis_installer_1 behavioral2/files/0x000300000001ab4e-117.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 build.vmp.exe 2124 build.vmp.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 2124 build.vmp.exe 2124 build.vmp.exe 3948 javaUpdate.exe 3948 javaUpdate.exe 3948 javaUpdate.exe 3948 javaUpdate.exe 3932 System32.exe 3932 System32.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe 3932 System32.exe 3948 javaUpdate.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 652 Hack.exe Token: SeRestorePrivilege 1728 WerFault.exe Token: SeBackupPrivilege 1728 WerFault.exe Token: SeBackupPrivilege 1728 WerFault.exe Token: SeDebugPrivilege 1728 WerFault.exe Token: SeDebugPrivilege 3948 javaUpdate.exe Token: SeDebugPrivilege 2252 System32.exe Token: SeDebugPrivilege 3932 System32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2952 WintWare.exe 1840 build.vmp.sfx.exe 2124 build.vmp.exe 1016 csc.exe 3948 javaUpdate.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 740 wrote to memory of 2952 740 polas.exe 75 PID 740 wrote to memory of 2952 740 polas.exe 75 PID 740 wrote to memory of 2952 740 polas.exe 75 PID 2952 wrote to memory of 2388 2952 WintWare.exe 77 PID 2952 wrote to memory of 2388 2952 WintWare.exe 77 PID 2952 wrote to memory of 1840 2952 WintWare.exe 78 PID 2952 wrote to memory of 1840 2952 WintWare.exe 78 PID 2952 wrote to memory of 1840 2952 WintWare.exe 78 PID 2952 wrote to memory of 652 2952 WintWare.exe 79 PID 2952 wrote to memory of 652 2952 WintWare.exe 79 PID 2952 wrote to memory of 652 2952 WintWare.exe 79 PID 1840 wrote to memory of 2124 1840 build.vmp.sfx.exe 80 PID 1840 wrote to memory of 2124 1840 build.vmp.sfx.exe 80 PID 1840 wrote to memory of 2124 1840 build.vmp.sfx.exe 80 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 652 wrote to memory of 4000 652 Hack.exe 81 PID 2388 wrote to memory of 1016 2388 1.v1mp.exe 84 PID 2388 wrote to memory of 1016 2388 1.v1mp.exe 84 PID 1016 wrote to memory of 204 1016 csc.exe 86 PID 1016 wrote to memory of 204 1016 csc.exe 86 PID 2388 wrote to memory of 4056 2388 1.v1mp.exe 87 PID 2388 wrote to memory of 4056 2388 1.v1mp.exe 87 PID 2388 wrote to memory of 3948 2388 1.v1mp.exe 89 PID 2388 wrote to memory of 3948 2388 1.v1mp.exe 89 PID 3948 wrote to memory of 2252 3948 javaUpdate.exe 91 PID 3948 wrote to memory of 2252 3948 javaUpdate.exe 91 PID 3948 wrote to memory of 2252 3948 javaUpdate.exe 91 PID 2252 wrote to memory of 3932 2252 System32.exe 92 PID 2252 wrote to memory of 3932 2252 System32.exe 92 PID 2252 wrote to memory of 3932 2252 System32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\polas.exe"C:\Users\Admin\AppData\Local\Temp\polas.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\WintWare.exe"C:\Users\Admin\AppData\Local\Temp\WintWare.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\1.v1mp.exeC:\Users\Admin\AppData\Roaming\1.v1mp.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zuz0fo_n.cmdline"4⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8BBC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8BBB.tmp"5⤵PID:204
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4056
-
-
C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Roaming\System32.exe"C:\Users\Admin\AppData\Roaming\System32.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 3948 /protectFile5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\System32.exe"C:\Users\Admin\AppData\Roaming\System32.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 3948 "/protectFile"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exeC:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
-
C:\Users\Admin\AppData\Roaming\Hack.exeC:\Users\Admin\AppData\Roaming\Hack.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1605⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:2544
-
C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exeC:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe1⤵
- Executes dropped EXE
PID:856