Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-05-2021 09:01
Static task
static1
Behavioral task
behavioral1
Sample
d15d3eb0_by_Libranalysis.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d15d3eb0_by_Libranalysis.exe
Resource
win10v20210410
General
-
Target
d15d3eb0_by_Libranalysis.exe
-
Size
7.4MB
-
MD5
d15d3eb03c466f207dd401047da792bc
-
SHA1
cca4dd46f38bfc164a1840907a608fb657d471b0
-
SHA256
6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90
-
SHA512
432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4
Malware Config
Extracted
redline
@aBigF
ydmau.xyz:80
Signatures
-
Orcus Main Payload 5 IoCs
resource yara_rule behavioral2/files/0x000300000001ab5b-121.dat family_orcus behavioral2/files/0x000300000001ab5b-120.dat family_orcus behavioral2/files/0x000200000001ab6b-177.dat family_orcus behavioral2/files/0x000200000001ab6b-178.dat family_orcus behavioral2/files/0x000200000001ab6b-190.dat family_orcus -
Panda Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/2624-146-0x0000000000F30000-0x00000000018D0000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral2/memory/3396-139-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral2/memory/3396-140-0x00000000004163C2-mapping.dmp family_redline -
Orcurs Rat Executable 5 IoCs
resource yara_rule behavioral2/files/0x000300000001ab5b-121.dat orcus behavioral2/files/0x000300000001ab5b-120.dat orcus behavioral2/files/0x000200000001ab6b-177.dat orcus behavioral2/files/0x000200000001ab6b-178.dat orcus behavioral2/files/0x000200000001ab6b-190.dat orcus -
Executes dropped EXE 11 IoCs
pid Process 620 WintWare.exe 2196 1.v1mp.exe 2520 build.vmp.sfx.exe 2620 Hack.exe 2624 build.vmp.exe 3692 WindowsInput.exe 2620 WindowsInput.exe 652 javaUpdate.exe 1824 javaUpdate.exe 3536 System32.exe 1680 System32.exe -
resource yara_rule behavioral2/files/0x000300000001ab5b-121.dat vmprotect behavioral2/files/0x000300000001ab5b-120.dat vmprotect behavioral2/files/0x000200000001ab62-135.dat vmprotect behavioral2/files/0x000200000001ab62-134.dat vmprotect behavioral2/memory/2624-146-0x0000000000F30000-0x00000000018D0000-memory.dmp vmprotect behavioral2/files/0x000200000001ab6b-177.dat vmprotect behavioral2/files/0x000200000001ab6b-178.dat vmprotect behavioral2/memory/652-180-0x0000000000250000-0x0000000000251000-memory.dmp vmprotect behavioral2/files/0x000200000001ab6b-190.dat vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 1.v1mp.exe File opened for modification C:\Windows\assembly\Desktop.ini 1.v1mp.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe 1.v1mp.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config 1.v1mp.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 3396 2620 Hack.exe 82 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 1.v1mp.exe File created C:\Windows\assembly\Desktop.ini 1.v1mp.exe File opened for modification C:\Windows\assembly\Desktop.ini 1.v1mp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0009000000000689-117.dat nsis_installer_1 behavioral2/files/0x0009000000000689-117.dat nsis_installer_2 behavioral2/files/0x0009000000000689-118.dat nsis_installer_1 behavioral2/files/0x0009000000000689-118.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 build.vmp.exe 2624 build.vmp.exe 2624 build.vmp.exe 2624 build.vmp.exe 652 javaUpdate.exe 652 javaUpdate.exe 652 javaUpdate.exe 652 javaUpdate.exe 1680 System32.exe 1680 System32.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 3396 AddInProcess32.exe 3396 AddInProcess32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe 1680 System32.exe 652 javaUpdate.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2620 Hack.exe Token: SeDebugPrivilege 3396 AddInProcess32.exe Token: SeDebugPrivilege 652 javaUpdate.exe Token: SeDebugPrivilege 3536 System32.exe Token: SeDebugPrivilege 1680 System32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 620 WintWare.exe 2520 build.vmp.sfx.exe 2624 build.vmp.exe 4064 csc.exe 652 javaUpdate.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1824 wrote to memory of 620 1824 d15d3eb0_by_Libranalysis.exe 74 PID 1824 wrote to memory of 620 1824 d15d3eb0_by_Libranalysis.exe 74 PID 1824 wrote to memory of 620 1824 d15d3eb0_by_Libranalysis.exe 74 PID 620 wrote to memory of 2196 620 WintWare.exe 78 PID 620 wrote to memory of 2196 620 WintWare.exe 78 PID 620 wrote to memory of 2520 620 WintWare.exe 79 PID 620 wrote to memory of 2520 620 WintWare.exe 79 PID 620 wrote to memory of 2520 620 WintWare.exe 79 PID 620 wrote to memory of 2620 620 WintWare.exe 80 PID 620 wrote to memory of 2620 620 WintWare.exe 80 PID 620 wrote to memory of 2620 620 WintWare.exe 80 PID 2520 wrote to memory of 2624 2520 build.vmp.sfx.exe 81 PID 2520 wrote to memory of 2624 2520 build.vmp.sfx.exe 81 PID 2520 wrote to memory of 2624 2520 build.vmp.sfx.exe 81 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2620 wrote to memory of 3396 2620 Hack.exe 82 PID 2196 wrote to memory of 4064 2196 1.v1mp.exe 83 PID 2196 wrote to memory of 4064 2196 1.v1mp.exe 83 PID 4064 wrote to memory of 3952 4064 csc.exe 85 PID 4064 wrote to memory of 3952 4064 csc.exe 85 PID 2196 wrote to memory of 3692 2196 1.v1mp.exe 86 PID 2196 wrote to memory of 3692 2196 1.v1mp.exe 86 PID 2196 wrote to memory of 652 2196 1.v1mp.exe 88 PID 2196 wrote to memory of 652 2196 1.v1mp.exe 88 PID 652 wrote to memory of 3536 652 javaUpdate.exe 90 PID 652 wrote to memory of 3536 652 javaUpdate.exe 90 PID 652 wrote to memory of 3536 652 javaUpdate.exe 90 PID 3536 wrote to memory of 1680 3536 System32.exe 91 PID 3536 wrote to memory of 1680 3536 System32.exe 91 PID 3536 wrote to memory of 1680 3536 System32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d15d3eb0_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\d15d3eb0_by_Libranalysis.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\WintWare.exe"C:\Users\Admin\AppData\Local\Temp\WintWare.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Roaming\1.v1mp.exeC:\Users\Admin\AppData\Roaming\1.v1mp.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qbqdj2er.cmdline"4⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2012.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2011.tmp"5⤵PID:3952
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3692
-
-
C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Roaming\System32.exe"C:\Users\Admin\AppData\Roaming\System32.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 652 /protectFile5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Roaming\System32.exe"C:\Users\Admin\AppData\Roaming\System32.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe" 652 "/protectFile"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\build.vmp.sfx.exeC:\Users\Admin\AppData\Roaming\build.vmp.sfx.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"C:\Users\Admin\AppData\Local\Temp\build.vmp.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
-
C:\Users\Admin\AppData\Roaming\Hack.exeC:\Users\Admin\AppData\Roaming\Hack.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:2620
-
C:\Users\Admin\AppData\Roaming\Java\javaUpdate.exeC:\Users\Admin\AppData\Roaming\Java\javaUpdate.exe1⤵
- Executes dropped EXE
PID:1824