Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    07/05/2021, 09:01 UTC

General

  • Target

    d15d3eb0_by_Libranalysis.exe

  • Size

    7.4MB

  • MD5

    d15d3eb03c466f207dd401047da792bc

  • SHA1

    cca4dd46f38bfc164a1840907a608fb657d471b0

  • SHA256

    6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90

  • SHA512

    432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4

Malware Config

Extracted

Family

redline

Botnet

@aBigF

C2

ydmau.xyz:80

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus Main Payload 6 IoCs
  • Panda Stealer Payload 1 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Orcurs Rat Executable 6 IoCs
  • Executes dropped EXE 11 IoCs
  • VMProtect packed file 14 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 10 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d15d3eb0_by_Libranalysis.exe
    "C:\Users\Admin\AppData\Local\Temp\d15d3eb0_by_Libranalysis.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\WintWare.exe
      "C:\Users\Admin\AppData\Local\Temp\WintWare.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vwykipoz.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1796
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE86.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCE85.tmp"
            5⤵
              PID:1492
          • C:\Windows\SysWOW64\WindowsInput.exe
            "C:\Windows\SysWOW64\WindowsInput.exe" --install
            4⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            PID:1276
          • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
            "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:952
            • C:\Users\Admin\AppData\Roaming\System32.exe
              "C:\Users\Admin\AppData\Roaming\System32.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 952 /protectFile
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1708
              • C:\Users\Admin\AppData\Roaming\System32.exe
                "C:\Users\Admin\AppData\Roaming\System32.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 952 "/protectFile"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:900
        • C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
          C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1268
          • C:\Users\Admin\AppData\Local\Temp\build.vmp.exe
            "C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:748
        • C:\Users\Admin\AppData\Roaming\Hack.exe
          C:\Users\Admin\AppData\Roaming\Hack.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2040
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:1392
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {BFEC4A15-8632-4B80-B9EA-7F393D3AB1D0} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        2⤵
        • Executes dropped EXE
        PID:1528

    Network

    • flag-unknown
      DNS
      cb60062.tmweb.ru
      build.vmp.exe
      Remote address:
      8.8.8.8:53
      Request
      cb60062.tmweb.ru
      IN A
      Response
      cb60062.tmweb.ru
      IN A
      185.114.247.102
    • flag-unknown
      POST
      http://cb60062.tmweb.ru/collect.php
      build.vmp.exe
      Remote address:
      185.114.247.102:80
      Request
      POST /collect.php HTTP/1.1
      Content-Type: multipart/form-data; boundary=SendFileZIPBoundary
      User-Agent: uploader
      Host: cb60062.tmweb.ru
      Content-Length: 389852
      Connection: Keep-Alive
      Cache-Control: no-cache
      Response
      HTTP/1.1 200 OK
      Server: nginx/1.16.1
      Date: Fri, 07 May 2021 09:01:39 GMT
      Content-Type: text/html; charset=UTF-8
      Content-Length: 0
      Connection: keep-alive
    • flag-unknown
      DNS
      42nn.hellomir.ru
      Remote address:
      8.8.8.8:53
      Request
      42nn.hellomir.ru
      IN A
      Response
      42nn.hellomir.ru
      IN A
      217.107.34.191
    • flag-unknown
      GET
      https://42nn.hellomir.ru/SystemServiceModelChannelsServerSingletonDecoder67994
      Hack.exe
      Remote address:
      217.107.34.191:443
      Request
      GET /SystemServiceModelChannelsServerSingletonDecoder67994 HTTP/1.1
      Host: 42nn.hellomir.ru
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Fri, 07 May 2021 09:01:39 GMT
      Content-Type: text/html
      Content-Length: 213683
      Connection: keep-alive
      Server: Jino.ru/mod_pizza
      Last-Modified: Thu, 06 May 2021 11:14:37 GMT
      ETag: "8572fed-342b3-5c1a76ab515c1"
      Accept-Ranges: bytes
    • flag-unknown
      DNS
      ydmau.xyz
      AddInProcess32.exe
      Remote address:
      8.8.8.8:53
      Request
      ydmau.xyz
      IN A
      Response
      ydmau.xyz
      IN A
      94.140.115.158
    • flag-unknown
      POST
      http://ydmau.xyz//
      AddInProcess32.exe
      Remote address:
      94.140.115.158:80
      Request
      POST // HTTP/1.1
      Content-Type: text/xml; charset=utf-8
      SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
      Host: ydmau.xyz
      Content-Length: 137
      Expect: 100-continue
      Accept-Encoding: gzip, deflate
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Fri, 07 May 2021 09:01:47 GMT
      Content-Type: text/xml; charset=utf-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      Keep-Alive: timeout=3
      Vary: Accept-Encoding
      Content-Encoding: gzip
    • flag-unknown
      POST
      http://ydmau.xyz//
      AddInProcess32.exe
      Remote address:
      94.140.115.158:80
      Request
      POST // HTTP/1.1
      Content-Type: text/xml; charset=utf-8
      SOAPAction: "http://tempuri.org/Endpoint/VerifyScanRequest"
      Host: ydmau.xyz
      Content-Length: 932483
      Expect: 100-continue
      Accept-Encoding: gzip, deflate
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Fri, 07 May 2021 09:01:54 GMT
      Content-Type: text/xml; charset=utf-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      Keep-Alive: timeout=3
      Vary: Accept-Encoding
      Content-Encoding: gzip
    • flag-unknown
      POST
      http://ydmau.xyz//
      AddInProcess32.exe
      Remote address:
      94.140.115.158:80
      Request
      POST // HTTP/1.1
      Content-Type: text/xml; charset=utf-8
      SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
      Host: ydmau.xyz
      Content-Length: 932469
      Expect: 100-continue
      Accept-Encoding: gzip, deflate
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Fri, 07 May 2021 09:01:55 GMT
      Content-Type: text/xml; charset=utf-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      Keep-Alive: timeout=3
      Vary: Accept-Encoding
      Content-Encoding: gzip
    • flag-unknown
      DNS
      api.ip.sb
      AddInProcess32.exe
      Remote address:
      8.8.8.8:53
      Request
      api.ip.sb
      IN A
      Response
      api.ip.sb
      IN CNAME
      api.ip.sb.cdn.cloudflare.net
      api.ip.sb.cdn.cloudflare.net
      IN A
      104.26.12.31
      api.ip.sb.cdn.cloudflare.net
      IN A
      172.67.75.172
      api.ip.sb.cdn.cloudflare.net
      IN A
      104.26.13.31
    • flag-unknown
      GET
      https://api.ip.sb/geoip
      AddInProcess32.exe
      Remote address:
      104.26.12.31:443
      Request
      GET /geoip HTTP/1.1
      Host: api.ip.sb
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Fri, 07 May 2021 09:01:48 GMT
      Content-Type: application/json; charset=utf-8
      Content-Length: 285
      Connection: keep-alive
      Set-Cookie: __cfduid=d166ddc21dcb70ea280c703e2d8695efd1620378107; expires=Sun, 06-Jun-21 09:01:47 GMT; path=/; domain=.ip.sb; HttpOnly; SameSite=Lax
      Vary: Accept-Encoding
      Vary: Accept-Encoding
      Cache-Control: no-cache
      Access-Control-Allow-Origin: *
      CF-Cache-Status: DYNAMIC
      cf-request-id: 09e7a8d75b0000417af6212000000001
      Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
      Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=pthHUcZO3D5ypzsjKJfe%2FtJfMGKDxBd99mE60DQVjjsEnaYTTyXT%2B1rMELNMRopiGYSYynYuMRUeAA%2BdLNYti6EMBKJSCz5xmy4%3D"}],"max_age":604800}
      NEL: {"max_age":604800,"report_to":"cf-nel"}
      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
      Server: cloudflare
      CF-RAY: 64b9440558ed417a-HAM
    • 185.114.247.102:80
      http://cb60062.tmweb.ru/collect.php
      http
      build.vmp.exe
      401.0kB
      5.8kB
      272
      140

      HTTP Request

      POST http://cb60062.tmweb.ru/collect.php

      HTTP Response

      200
    • 217.107.34.191:443
      https://42nn.hellomir.ru/SystemServiceModelChannelsServerSingletonDecoder67994
      tls, http
      Hack.exe
      4.5kB
      224.0kB
      88
      155

      HTTP Request

      GET https://42nn.hellomir.ru/SystemServiceModelChannelsServerSingletonDecoder67994

      HTTP Response

      200
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.140.115.158:80
      http://ydmau.xyz//
      http
      AddInProcess32.exe
      1.9MB
      17.1kB
      1286
      339

      HTTP Request

      POST http://ydmau.xyz//

      HTTP Response

      200

      HTTP Request

      POST http://ydmau.xyz//

      HTTP Response

      200

      HTTP Request

      POST http://ydmau.xyz//

      HTTP Response

      200
    • 104.26.12.31:443
      https://api.ip.sb/geoip
      tls, http
      AddInProcess32.exe
      710 B
      5.5kB
      8
      9

      HTTP Request

      GET https://api.ip.sb/geoip

      HTTP Response

      200
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      152 B
      120 B
      3
      3
    • 94.180.177.97:10134
      javaUpdate.exe
      104 B
      80 B
      2
      2
    • 8.8.8.8:53
      cb60062.tmweb.ru
      dns
      build.vmp.exe
      62 B
      78 B
      1
      1

      DNS Request

      cb60062.tmweb.ru

      DNS Response

      185.114.247.102

    • 8.8.8.8:53
      42nn.hellomir.ru
      dns
      62 B
      78 B
      1
      1

      DNS Request

      42nn.hellomir.ru

      DNS Response

      217.107.34.191

    • 8.8.8.8:53
      ydmau.xyz
      dns
      AddInProcess32.exe
      55 B
      71 B
      1
      1

      DNS Request

      ydmau.xyz

      DNS Response

      94.140.115.158

    • 8.8.8.8:53
      api.ip.sb
      dns
      AddInProcess32.exe
      55 B
      145 B
      1
      1

      DNS Request

      api.ip.sb

      DNS Response

      104.26.12.31
      172.67.75.172
      104.26.13.31

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/748-95-0x0000000000960000-0x0000000001300000-memory.dmp

      Filesize

      9.6MB

    • memory/748-94-0x00000000000E0000-0x00000000000E1000-memory.dmp

      Filesize

      4KB

    • memory/952-147-0x000000001B5C8000-0x000000001B5E7000-memory.dmp

      Filesize

      124KB

    • memory/952-146-0x000000001B5C2000-0x000000001B5C4000-memory.dmp

      Filesize

      8KB

    • memory/952-139-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/952-138-0x0000000000B40000-0x0000000000B55000-memory.dmp

      Filesize

      84KB

    • memory/952-137-0x000000001B5C0000-0x000000001B5C2000-memory.dmp

      Filesize

      8KB

    • memory/952-136-0x0000000000BE0000-0x0000000000C28000-memory.dmp

      Filesize

      288KB

    • memory/952-135-0x0000000000490000-0x00000000004A0000-memory.dmp

      Filesize

      64KB

    • memory/952-134-0x00000000003C0000-0x00000000003CC000-memory.dmp

      Filesize

      48KB

    • memory/952-133-0x0000000000AE0000-0x0000000000B3A000-memory.dmp

      Filesize

      360KB

    • memory/952-129-0x00000000011A0000-0x00000000011A1000-memory.dmp

      Filesize

      4KB

    • memory/980-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

      Filesize

      8KB

    • memory/1276-119-0x000000001B0B0000-0x000000001B0B2000-memory.dmp

      Filesize

      8KB

    • memory/1276-113-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/1392-120-0x0000000019980000-0x0000000019982000-memory.dmp

      Filesize

      8KB

    • memory/1392-117-0x0000000000320000-0x0000000000321000-memory.dmp

      Filesize

      4KB

    • memory/1408-100-0x000007FEF23D0000-0x000007FEF3466000-memory.dmp

      Filesize

      16.6MB

    • memory/1408-84-0x00000000022F0000-0x00000000022F2000-memory.dmp

      Filesize

      8KB

    • memory/1416-90-0x00000000041A0000-0x00000000041A1000-memory.dmp

      Filesize

      4KB

    • memory/1416-82-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

      Filesize

      4KB

    • memory/1416-97-0x00000000004C0000-0x00000000004C2000-memory.dmp

      Filesize

      8KB

    • memory/1528-148-0x000000001B560000-0x000000001B562000-memory.dmp

      Filesize

      8KB

    • memory/1708-153-0x00000000009F0000-0x00000000009F1000-memory.dmp

      Filesize

      4KB

    • memory/1796-108-0x00000000020F0000-0x00000000020F2000-memory.dmp

      Filesize

      8KB

    • memory/2040-121-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2040-131-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

      Filesize

      4KB

    • memory/2040-123-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.