Analysis

  • max time kernel
    62s
  • max time network
    81s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    07-06-2021 05:41

General

  • Target

    eb4c908bf4649374644662ac2e50f7e9.exe

  • Size

    318KB

  • MD5

    eb4c908bf4649374644662ac2e50f7e9

  • SHA1

    cdec9c7bad714149e6a5b10a9f5931fea457ac32

  • SHA256

    1eb4b2a30f7d2822fc91b6ead0a0524d381a17cf0cba9603fa3779aff8894e6d

  • SHA512

    009392c0725b3dc3f1a6914aba9c653038e7187a97a2181055744ea69b9bf3069a759d6f55facd114581c683705a39948feea13181170e76e4918d24cfe8179f

Malware Config

Extracted

Family

raccoon

Botnet

28198d4512d0cf31c204eddceb4471d79950b588

Attributes
  • url4cnc

    https://tttttt.me/capibar

rc4.plain
rc4.plain

Extracted

Family

cryptbot

C2

olmrso12.top

morleg01.top

Attributes
  • payload_url

    http://vamgha01.top/download.php?file=lv.exe

Extracted

Family

redline

Botnet

MIX 07.06

C2

185.215.113.17:18597

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot Payload 2 IoCs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb4c908bf4649374644662ac2e50f7e9.exe
    "C:\Users\Admin\AppData\Local\Temp\eb4c908bf4649374644662ac2e50f7e9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\46165915982.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\46165915982.exe
        "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\46165915982.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\46165915982.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2032
          • C:\Windows\SysWOW64\timeout.exe
            timeout /T 10 /NOBREAK
            5⤵
            • Delays execution with timeout.exe
            PID:3120
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\39301440014.exe" /mix
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\39301440014.exe
        "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\39301440014.exe" /mix
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4016
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\OwjsxKoe.exe"
          4⤵
            PID:3548
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\QURIWqwZeyDgl & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\39301440014.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3876
            • C:\Windows\SysWOW64\timeout.exe
              timeout 3
              5⤵
              • Delays execution with timeout.exe
              PID:3896
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\54873139270.exe" /mix
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\54873139270.exe
          "C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\54873139270.exe" /mix
          3⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious use of WriteProcessMemory
          PID:1264
          • C:\Users\Admin\AppData\Roaming\nailedp\edspolishpp.exe
            edspolishpp.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im "eb4c908bf4649374644662ac2e50f7e9.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\eb4c908bf4649374644662ac2e50f7e9.exe" & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /im "eb4c908bf4649374644662ac2e50f7e9.exe" /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2884

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    3
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OwjsxKoe.exe
      MD5

      52b6a733020dc0c4b4924d77f869d966

      SHA1

      af5cad05c3cf5dfd7a209cee82bf9b3a39d0c4d2

      SHA256

      1b09a98111f585c48220347fdd87519499ced201c116027ca8712a3dbf078772

      SHA512

      6e41f4078af255b2a93fe45d9cfba3faf5e0643ed867c7e1a7efbaf2d8403e5179f01454abc9fd3336cc2fe6cd8e77316f6c3326ef64b02485c05bb9f6b36ba1

    • C:\Users\Admin\AppData\Local\Temp\QURIWqwZeyDgl\EOQANU~1.ZIP
      MD5

      e31dfffe241ea81cc00231afd3b85175

      SHA1

      bb9be3ba46d0c39d76ceabd374f0e46b80010f6a

      SHA256

      15669f187fbf5df7b18c957988ce80fcbbd7e267e2fad40368db6ce6afadccd7

      SHA512

      7f72df0c7089732d7cddab6ae75237ba3dcecb66bd33e4b178eed8d2fb4eddf0b41917532aa56f78377a556e6a96a8f11b44b24a94da411b67c4576761789b89

    • C:\Users\Admin\AppData\Local\Temp\QURIWqwZeyDgl\KHQCVD~1.ZIP
      MD5

      237f66b71d49b0a30dfb9b4362b5bacf

      SHA1

      529d463c266ad83bb7c1cc2a233c43360241460c

      SHA256

      05e5ffa3f95431dd0f8288311c33ee3261a5df1c4fce9949484eefe4e7cccfbc

      SHA512

      5a722ba13d75ab96a66d15bb4a99b640b33dc8b42698d3e8003359ee85864f52661adf25300e7e74ad48a407988b4301e0089661b0ab2a7c168f63f95ddbb1e6

    • C:\Users\Admin\AppData\Local\Temp\QURIWqwZeyDgl\_Files\_INFOR~1.TXT
      MD5

      c7de47dfed9e4ce7a6b8756bbdb13406

      SHA1

      aca8d85951bf317cc1089a38a8474d0252d895ee

      SHA256

      fa3cc245b3eb0b2cc844fa8f65119c4020788b614d7011eb4d08f93074ef96de

      SHA512

      09ceb84e49efd94936f850eb05a1954a75d1a60ff820c0f265c5122838ffedc459b4d4018b660c3974385b4d4da4694b26cc8bdbcb5ab5f5bc88a8abe0bddabc

    • C:\Users\Admin\AppData\Local\Temp\QURIWqwZeyDgl\_Files\_SCREE~1.JPE
      MD5

      429e8c756ba45773f40d1610092a85d9

      SHA1

      2c5b536100ebead49e620d7a07b656a29f632fd0

      SHA256

      f78f45a329b74e08a4316925600161c2b5011ebf32436aea9dcf21347e2131eb

      SHA512

      1188a1dbb30555a69f1da4f06e3db96a89e85724187e9c3ae08bf9ac4a21d5b6d7ef6c1a244dcef295a90f780d48ea5de1973703f4313209015b846566752b3c

    • C:\Users\Admin\AppData\Local\Temp\QURIWqwZeyDgl\files_\SCREEN~1.JPG
      MD5

      429e8c756ba45773f40d1610092a85d9

      SHA1

      2c5b536100ebead49e620d7a07b656a29f632fd0

      SHA256

      f78f45a329b74e08a4316925600161c2b5011ebf32436aea9dcf21347e2131eb

      SHA512

      1188a1dbb30555a69f1da4f06e3db96a89e85724187e9c3ae08bf9ac4a21d5b6d7ef6c1a244dcef295a90f780d48ea5de1973703f4313209015b846566752b3c

    • C:\Users\Admin\AppData\Local\Temp\QURIWqwZeyDgl\files_\SYSTEM~1.TXT
      MD5

      ab111ecb083a32d785f7288bd7b4ef17

      SHA1

      c97f9d45d32099302dd3c13017f4aff6b74ad297

      SHA256

      d8f53b8288c54ab42397899590bc6dad1f1b7e31149727da2b86a6b699abbee1

      SHA512

      377f86ee28480cae8a4267a4d16de114e1af7325921880af7e1d06248f0f27df61cdb525bf51841a64e9ea98f506318257fe477c6471ec93bde2e59c7784eeed

    • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\39301440014.exe
      MD5

      879a13a9b7154378e564238486a8cecd

      SHA1

      9fbffa6d4c723428bab00483e31a4d4fe713b6cb

      SHA256

      2997be50821a306f51e9fc931785c6cac4bc4cba5871e7b64606ece237c5a2ff

      SHA512

      af6960792747ff69a74f2041f180314f980cc768268cb6db7540c350fac336362890b21890477a4a4675a068f55292f2881a07529f85a5a1076f11a16bdbc7d1

    • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\39301440014.exe
      MD5

      879a13a9b7154378e564238486a8cecd

      SHA1

      9fbffa6d4c723428bab00483e31a4d4fe713b6cb

      SHA256

      2997be50821a306f51e9fc931785c6cac4bc4cba5871e7b64606ece237c5a2ff

      SHA512

      af6960792747ff69a74f2041f180314f980cc768268cb6db7540c350fac336362890b21890477a4a4675a068f55292f2881a07529f85a5a1076f11a16bdbc7d1

    • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\46165915982.exe
      MD5

      62070cc23ba860995b41f6e03541bfcf

      SHA1

      f8454f7bafd043b8335d8aa7fd0baff7fc418cf7

      SHA256

      66371cf1cf1ac4a101cf4beacfbe00035f7ea2ecb7674d79bfceec34937c22ed

      SHA512

      6af5046e61e658f08f0885b705ea788d720f4da80e011b1b7f91f58dc2641113f4d310e211d3a6146ba0138cd455c0d304769838807c2ea7316ad917f71439d8

    • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\46165915982.exe
      MD5

      62070cc23ba860995b41f6e03541bfcf

      SHA1

      f8454f7bafd043b8335d8aa7fd0baff7fc418cf7

      SHA256

      66371cf1cf1ac4a101cf4beacfbe00035f7ea2ecb7674d79bfceec34937c22ed

      SHA512

      6af5046e61e658f08f0885b705ea788d720f4da80e011b1b7f91f58dc2641113f4d310e211d3a6146ba0138cd455c0d304769838807c2ea7316ad917f71439d8

    • C:\Users\Admin\AppData\Local\Temp\{MQxE-yA7eT-81Oi-95i7d}\54873139270.exe
      MD5

      2543e0c6bea2743d37001dc40be9c924

      SHA1

      8235e7da3f31b160f461aef1a746080b39d1f0f1

      SHA256

      a83b7204b09ec11aa74afd33d181a1a31e95f7bd583ad734201f2494daa06a9e

      SHA512

      c090e53af4583268e36b4005e7cc416d5d78259113ad6ef82204c5a0d43bc1559d39b88a7a13e6ecfa369e32ff59ca98ac37a281320e1e4924af37f85571d9e8

    • C:\Users\Admin\AppData\Roaming\nailedp\edspolishpp.exe
      MD5

      8e0a7dcf639084d47f9d0bc22ed4f2a6

      SHA1

      0b7b7053577b588426306625a20ddb258e4921dc

      SHA256

      47e2ec978b92cb6e768b583144ff50b909350bd4dd069726f2de969e51705637

      SHA512

      74d9664a52259a4f741582e3dfbecb93b570c7fe9bd82ef2101762f73883400e17d8579af19738da09b06fb5765608a747b8becbbdc2b66c3c15d7fc45bf4158

    • C:\Users\Admin\AppData\Roaming\nailedp\edspolishpp.exe
      MD5

      8e0a7dcf639084d47f9d0bc22ed4f2a6

      SHA1

      0b7b7053577b588426306625a20ddb258e4921dc

      SHA256

      47e2ec978b92cb6e768b583144ff50b909350bd4dd069726f2de969e51705637

      SHA512

      74d9664a52259a4f741582e3dfbecb93b570c7fe9bd82ef2101762f73883400e17d8579af19738da09b06fb5765608a747b8becbbdc2b66c3c15d7fc45bf4158

    • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\freebl3.dll
      MD5

      60acd24430204ad2dc7f148b8cfe9bdc

      SHA1

      989f377b9117d7cb21cbe92a4117f88f9c7693d9

      SHA256

      9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

      SHA512

      626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

    • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\mozglue.dll
      MD5

      eae9273f8cdcf9321c6c37c244773139

      SHA1

      8378e2a2f3635574c106eea8419b5eb00b8489b0

      SHA256

      a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

      SHA512

      06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

    • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\nss3.dll
      MD5

      02cc7b8ee30056d5912de54f1bdfc219

      SHA1

      a6923da95705fb81e368ae48f93d28522ef552fb

      SHA256

      1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

      SHA512

      0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

    • \Users\Admin\AppData\LocalLow\gC9tT2iQ3s\softokn3.dll
      MD5

      4e8df049f3459fa94ab6ad387f3561ac

      SHA1

      06ed392bc29ad9d5fc05ee254c2625fd65925114

      SHA256

      25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

      SHA512

      3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

    • \Users\Admin\AppData\LocalLow\sqlite3.dll
      MD5

      f964811b68f9f1487c2b41e1aef576ce

      SHA1

      b423959793f14b1416bc3b7051bed58a1034025f

      SHA256

      83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

      SHA512

      565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

    • memory/220-116-0x0000000000000000-mapping.dmp
    • memory/660-114-0x0000000000600000-0x000000000062F000-memory.dmp
      Filesize

      188KB

    • memory/660-115-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/1264-129-0x0000000000000000-mapping.dmp
    • memory/1264-140-0x0000000002240000-0x000000000230E000-memory.dmp
      Filesize

      824KB

    • memory/1264-141-0x0000000000400000-0x00000000004D5000-memory.dmp
      Filesize

      852KB

    • memory/1308-155-0x0000000001F70000-0x0000000001F9F000-memory.dmp
      Filesize

      188KB

    • memory/1308-158-0x0000000002400000-0x000000000241A000-memory.dmp
      Filesize

      104KB

    • memory/1308-164-0x0000000004AD0000-0x0000000004AD1000-memory.dmp
      Filesize

      4KB

    • memory/1308-142-0x0000000000000000-mapping.dmp
    • memory/1308-163-0x0000000004A80000-0x0000000004A81000-memory.dmp
      Filesize

      4KB

    • memory/1308-162-0x0000000004A50000-0x0000000004A51000-memory.dmp
      Filesize

      4KB

    • memory/1308-161-0x0000000005080000-0x0000000005081000-memory.dmp
      Filesize

      4KB

    • memory/1308-160-0x0000000004990000-0x00000000049A9000-memory.dmp
      Filesize

      100KB

    • memory/1308-172-0x00000000070B0000-0x00000000070B1000-memory.dmp
      Filesize

      4KB

    • memory/1308-171-0x0000000006C60000-0x0000000006C61000-memory.dmp
      Filesize

      4KB

    • memory/1308-170-0x0000000006630000-0x0000000006631000-memory.dmp
      Filesize

      4KB

    • memory/1308-169-0x0000000006460000-0x0000000006461000-memory.dmp
      Filesize

      4KB

    • memory/1308-159-0x0000000004B80000-0x0000000004B81000-memory.dmp
      Filesize

      4KB

    • memory/1308-168-0x0000000005780000-0x0000000005781000-memory.dmp
      Filesize

      4KB

    • memory/1308-167-0x0000000004B74000-0x0000000004B76000-memory.dmp
      Filesize

      8KB

    • memory/1308-166-0x0000000004B73000-0x0000000004B74000-memory.dmp
      Filesize

      4KB

    • memory/1308-156-0x0000000004B70000-0x0000000004B71000-memory.dmp
      Filesize

      4KB

    • memory/1308-165-0x0000000004B72000-0x0000000004B73000-memory.dmp
      Filesize

      4KB

    • memory/1308-157-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/2032-138-0x0000000000000000-mapping.dmp
    • memory/2132-128-0x0000000000000000-mapping.dmp
    • memory/2464-131-0x0000000000000000-mapping.dmp
    • memory/2884-132-0x0000000000000000-mapping.dmp
    • memory/3120-139-0x0000000000000000-mapping.dmp
    • memory/3548-145-0x0000000000000000-mapping.dmp
    • memory/3680-122-0x0000000000000000-mapping.dmp
    • memory/3744-117-0x0000000000000000-mapping.dmp
    • memory/3744-120-0x0000000002110000-0x00000000021A1000-memory.dmp
      Filesize

      580KB

    • memory/3744-121-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/3876-147-0x0000000000000000-mapping.dmp
    • memory/3896-154-0x0000000000000000-mapping.dmp
    • memory/4016-123-0x0000000000000000-mapping.dmp
    • memory/4016-126-0x00000000021B0000-0x0000000002291000-memory.dmp
      Filesize

      900KB

    • memory/4016-127-0x0000000000400000-0x00000000004E5000-memory.dmp
      Filesize

      916KB