Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    07/05/2021, 09:01

General

  • Target

    d15d3eb0_by_Libranalysis.exe

  • Size

    7.4MB

  • MD5

    d15d3eb03c466f207dd401047da792bc

  • SHA1

    cca4dd46f38bfc164a1840907a608fb657d471b0

  • SHA256

    6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90

  • SHA512

    432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4

Malware Config

Extracted

Family

redline

Botnet

@aBigF

C2

ydmau.xyz:80

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus Main Payload 6 IoCs
  • Panda Stealer Payload 1 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Orcurs Rat Executable 6 IoCs
  • Executes dropped EXE 11 IoCs
  • VMProtect packed file 14 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 10 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d15d3eb0_by_Libranalysis.exe
    "C:\Users\Admin\AppData\Local\Temp\d15d3eb0_by_Libranalysis.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\WintWare.exe
      "C:\Users\Admin\AppData\Local\Temp\WintWare.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        C:\Users\Admin\AppData\Roaming\1.v1mp.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vwykipoz.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1796
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE86.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCE85.tmp"
            5⤵
              PID:1492
          • C:\Windows\SysWOW64\WindowsInput.exe
            "C:\Windows\SysWOW64\WindowsInput.exe" --install
            4⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            PID:1276
          • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
            "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:952
            • C:\Users\Admin\AppData\Roaming\System32.exe
              "C:\Users\Admin\AppData\Roaming\System32.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 952 /protectFile
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1708
              • C:\Users\Admin\AppData\Roaming\System32.exe
                "C:\Users\Admin\AppData\Roaming\System32.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 952 "/protectFile"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:900
        • C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
          C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1268
          • C:\Users\Admin\AppData\Local\Temp\build.vmp.exe
            "C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:748
        • C:\Users\Admin\AppData\Roaming\Hack.exe
          C:\Users\Admin\AppData\Roaming\Hack.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2040
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:1392
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {BFEC4A15-8632-4B80-B9EA-7F393D3AB1D0} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe
        2⤵
        • Executes dropped EXE
        PID:1528

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/748-95-0x0000000000960000-0x0000000001300000-memory.dmp

      Filesize

      9.6MB

    • memory/748-94-0x00000000000E0000-0x00000000000E1000-memory.dmp

      Filesize

      4KB

    • memory/952-147-0x000000001B5C8000-0x000000001B5E7000-memory.dmp

      Filesize

      124KB

    • memory/952-146-0x000000001B5C2000-0x000000001B5C4000-memory.dmp

      Filesize

      8KB

    • memory/952-139-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/952-138-0x0000000000B40000-0x0000000000B55000-memory.dmp

      Filesize

      84KB

    • memory/952-137-0x000000001B5C0000-0x000000001B5C2000-memory.dmp

      Filesize

      8KB

    • memory/952-136-0x0000000000BE0000-0x0000000000C28000-memory.dmp

      Filesize

      288KB

    • memory/952-135-0x0000000000490000-0x00000000004A0000-memory.dmp

      Filesize

      64KB

    • memory/952-134-0x00000000003C0000-0x00000000003CC000-memory.dmp

      Filesize

      48KB

    • memory/952-133-0x0000000000AE0000-0x0000000000B3A000-memory.dmp

      Filesize

      360KB

    • memory/952-129-0x00000000011A0000-0x00000000011A1000-memory.dmp

      Filesize

      4KB

    • memory/980-60-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

      Filesize

      8KB

    • memory/1276-119-0x000000001B0B0000-0x000000001B0B2000-memory.dmp

      Filesize

      8KB

    • memory/1276-113-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/1392-120-0x0000000019980000-0x0000000019982000-memory.dmp

      Filesize

      8KB

    • memory/1392-117-0x0000000000320000-0x0000000000321000-memory.dmp

      Filesize

      4KB

    • memory/1408-100-0x000007FEF23D0000-0x000007FEF3466000-memory.dmp

      Filesize

      16.6MB

    • memory/1408-84-0x00000000022F0000-0x00000000022F2000-memory.dmp

      Filesize

      8KB

    • memory/1416-90-0x00000000041A0000-0x00000000041A1000-memory.dmp

      Filesize

      4KB

    • memory/1416-82-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

      Filesize

      4KB

    • memory/1416-97-0x00000000004C0000-0x00000000004C2000-memory.dmp

      Filesize

      8KB

    • memory/1528-148-0x000000001B560000-0x000000001B562000-memory.dmp

      Filesize

      8KB

    • memory/1708-153-0x00000000009F0000-0x00000000009F1000-memory.dmp

      Filesize

      4KB

    • memory/1796-108-0x00000000020F0000-0x00000000020F2000-memory.dmp

      Filesize

      8KB

    • memory/2040-121-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2040-131-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

      Filesize

      4KB

    • memory/2040-123-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB