Analysis
-
max time kernel
14s -
max time network
104s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-06-2021 22:02
Static task
static1
Behavioral task
behavioral1
Sample
main_setup_x86x64.exe
Resource
win7v20210410
General
Malware Config
Extracted
redline
ServAni
87.251.71.195:82
Extracted
redline
7500
ahannnavod.xyz:80
Extracted
redline
Cana
176.111.174.254:56328
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Extracted
vidar
39.4
903
https://sergeevih43.tumblr.com
-
profile_id
903
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral2/memory/1908-194-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/1908-195-0x0000000000417F26-mapping.dmp family_redline behavioral2/memory/4656-271-0x0000000000417E32-mapping.dmp family_redline behavioral2/memory/4656-269-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/792-300-0x00000000028D0000-0x00000000028E9000-memory.dmp family_redline behavioral2/memory/792-294-0x0000000002660000-0x000000000267B000-memory.dmp family_redline behavioral2/memory/1252-339-0x0000000000417E36-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/3908-283-0x00000000025E0000-0x000000000267D000-memory.dmp family_vidar behavioral2/memory/3908-308-0x0000000000400000-0x000000000094D000-memory.dmp family_vidar behavioral2/memory/4520-338-0x000000000046B76D-mapping.dmp family_vidar behavioral2/memory/4520-340-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000100000001ab50-118.dat aspack_v212_v242 behavioral2/files/0x000100000001ab50-119.dat aspack_v212_v242 behavioral2/files/0x000100000001ab4c-122.dat aspack_v212_v242 behavioral2/files/0x000100000001ab4c-124.dat aspack_v212_v242 behavioral2/files/0x000100000001ab4b-123.dat aspack_v212_v242 behavioral2/files/0x000100000001ab4b-129.dat aspack_v212_v242 behavioral2/files/0x000100000001ab4b-127.dat aspack_v212_v242 behavioral2/files/0x000100000001ab4e-126.dat aspack_v212_v242 behavioral2/files/0x000100000001ab4e-130.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 3264 setup_installer.exe 3164 setup_install.exe 1936 sotema_2.exe 3984 sotema_1.exe 636 sotema_9.exe 1768 sotema_5.exe 3908 sotema_3.exe 792 sotema_7.exe 2296 sotema_6.exe 3200 sotema_4.exe 1624 sotema_8.exe 2144 sotema_9.tmp 3996 jfiag3g_gg.exe 1908 sotema_8.exe -
resource yara_rule behavioral2/files/0x000200000001ab4b-192.dat upx behavioral2/files/0x000200000001ab4b-191.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation sotema_1.exe -
Loads dropped DLL 7 IoCs
pid Process 3164 setup_install.exe 3164 setup_install.exe 3164 setup_install.exe 3164 setup_install.exe 3164 setup_install.exe 3164 setup_install.exe 2144 sotema_9.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ipinfo.io 11 ipinfo.io 13 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 1908 1624 sotema_8.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4856 4236 WerFault.exe 114 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1768 sotema_5.exe Token: SeDebugPrivilege 1624 sotema_8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 3264 516 main_setup_x86x64.exe 75 PID 516 wrote to memory of 3264 516 main_setup_x86x64.exe 75 PID 516 wrote to memory of 3264 516 main_setup_x86x64.exe 75 PID 3264 wrote to memory of 3164 3264 setup_installer.exe 76 PID 3264 wrote to memory of 3164 3264 setup_installer.exe 76 PID 3264 wrote to memory of 3164 3264 setup_installer.exe 76 PID 3164 wrote to memory of 788 3164 setup_install.exe 80 PID 3164 wrote to memory of 788 3164 setup_install.exe 80 PID 3164 wrote to memory of 788 3164 setup_install.exe 80 PID 3164 wrote to memory of 3460 3164 setup_install.exe 79 PID 3164 wrote to memory of 3460 3164 setup_install.exe 79 PID 3164 wrote to memory of 3460 3164 setup_install.exe 79 PID 3164 wrote to memory of 1348 3164 setup_install.exe 81 PID 3164 wrote to memory of 1348 3164 setup_install.exe 81 PID 3164 wrote to memory of 1348 3164 setup_install.exe 81 PID 3164 wrote to memory of 2112 3164 setup_install.exe 82 PID 3164 wrote to memory of 2112 3164 setup_install.exe 82 PID 3164 wrote to memory of 2112 3164 setup_install.exe 82 PID 3164 wrote to memory of 2772 3164 setup_install.exe 83 PID 3164 wrote to memory of 2772 3164 setup_install.exe 83 PID 3164 wrote to memory of 2772 3164 setup_install.exe 83 PID 3164 wrote to memory of 3080 3164 setup_install.exe 84 PID 3164 wrote to memory of 3080 3164 setup_install.exe 84 PID 3164 wrote to memory of 3080 3164 setup_install.exe 84 PID 3164 wrote to memory of 3912 3164 setup_install.exe 85 PID 3164 wrote to memory of 3912 3164 setup_install.exe 85 PID 3164 wrote to memory of 3912 3164 setup_install.exe 85 PID 3164 wrote to memory of 920 3164 setup_install.exe 86 PID 3164 wrote to memory of 920 3164 setup_install.exe 86 PID 3164 wrote to memory of 920 3164 setup_install.exe 86 PID 3164 wrote to memory of 2360 3164 setup_install.exe 87 PID 3164 wrote to memory of 2360 3164 setup_install.exe 87 PID 3164 wrote to memory of 2360 3164 setup_install.exe 87 PID 788 wrote to memory of 3984 788 cmd.exe 96 PID 788 wrote to memory of 3984 788 cmd.exe 96 PID 788 wrote to memory of 3984 788 cmd.exe 96 PID 3460 wrote to memory of 1936 3460 cmd.exe 95 PID 3460 wrote to memory of 1936 3460 cmd.exe 95 PID 3460 wrote to memory of 1936 3460 cmd.exe 95 PID 2360 wrote to memory of 636 2360 cmd.exe 94 PID 2360 wrote to memory of 636 2360 cmd.exe 94 PID 2360 wrote to memory of 636 2360 cmd.exe 94 PID 2772 wrote to memory of 1768 2772 cmd.exe 93 PID 2772 wrote to memory of 1768 2772 cmd.exe 93 PID 1348 wrote to memory of 3908 1348 cmd.exe 91 PID 1348 wrote to memory of 3908 1348 cmd.exe 91 PID 1348 wrote to memory of 3908 1348 cmd.exe 91 PID 3912 wrote to memory of 792 3912 cmd.exe 88 PID 3912 wrote to memory of 792 3912 cmd.exe 88 PID 3912 wrote to memory of 792 3912 cmd.exe 88 PID 2112 wrote to memory of 3200 2112 cmd.exe 90 PID 2112 wrote to memory of 3200 2112 cmd.exe 90 PID 2112 wrote to memory of 3200 2112 cmd.exe 90 PID 3080 wrote to memory of 2296 3080 cmd.exe 89 PID 3080 wrote to memory of 2296 3080 cmd.exe 89 PID 3080 wrote to memory of 2296 3080 cmd.exe 89 PID 920 wrote to memory of 1624 920 cmd.exe 92 PID 920 wrote to memory of 1624 920 cmd.exe 92 PID 920 wrote to memory of 1624 920 cmd.exe 92 PID 636 wrote to memory of 2144 636 sotema_9.exe 97 PID 636 wrote to memory of 2144 636 sotema_9.exe 97 PID 636 wrote to memory of 2144 636 sotema_9.exe 97 PID 1624 wrote to memory of 1908 1624 sotema_8.exe 98 PID 1624 wrote to memory of 1908 1624 sotema_8.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.exe"C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_2.exesotema_2.exe5⤵
- Executes dropped EXE
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_1.exesotema_1.exe5⤵
- Executes dropped EXE
- Checks computer location settings
PID:3984 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub6⤵PID:4352
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_3.exesotema_3.exe5⤵
- Executes dropped EXE
PID:3908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_4.exesotema_4.exe5⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:4504
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_5.exesotema_5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_6.exesotema_6.exe5⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\Documents\TDVX0oIyQbUXGO6m8aKwyahC.exe"C:\Users\Admin\Documents\TDVX0oIyQbUXGO6m8aKwyahC.exe"6⤵PID:4340
-
C:\Users\Admin\Documents\TDVX0oIyQbUXGO6m8aKwyahC.exe"C:\Users\Admin\Documents\TDVX0oIyQbUXGO6m8aKwyahC.exe"7⤵PID:4084
-
-
-
C:\Users\Admin\Documents\vEcN08Deai447lObhReWvndj.exe"C:\Users\Admin\Documents\vEcN08Deai447lObhReWvndj.exe"6⤵PID:4412
-
-
C:\Users\Admin\Documents\4WsuKxmD5_loUw5NFtrmDUbG.exe"C:\Users\Admin\Documents\4WsuKxmD5_loUw5NFtrmDUbG.exe"6⤵PID:4400
-
C:\Users\Admin\Documents\4WsuKxmD5_loUw5NFtrmDUbG.exeC:\Users\Admin\Documents\4WsuKxmD5_loUw5NFtrmDUbG.exe7⤵PID:4656
-
-
-
C:\Users\Admin\Documents\2WZS5uIEparwEj7vNjfvznbg.exe"C:\Users\Admin\Documents\2WZS5uIEparwEj7vNjfvznbg.exe"6⤵PID:4388
-
-
C:\Users\Admin\Documents\cNo5wGhwOMoFcLoITLgXN0Is.exe"C:\Users\Admin\Documents\cNo5wGhwOMoFcLoITLgXN0Is.exe"6⤵PID:4376
-
-
C:\Users\Admin\Documents\ZsRYXvkDNNXLWOqY1REXVALR.exe"C:\Users\Admin\Documents\ZsRYXvkDNNXLWOqY1REXVALR.exe"6⤵PID:4708
-
C:\Users\Admin\Documents\ZsRYXvkDNNXLWOqY1REXVALR.exeC:\Users\Admin\Documents\ZsRYXvkDNNXLWOqY1REXVALR.exe7⤵PID:4520
-
-
-
C:\Users\Admin\Documents\gwq4qASYApQRZ6739zTbMoRD.exe"C:\Users\Admin\Documents\gwq4qASYApQRZ6739zTbMoRD.exe"6⤵PID:4740
-
C:\Users\Admin\Documents\gwq4qASYApQRZ6739zTbMoRD.exeC:\Users\Admin\Documents\gwq4qASYApQRZ6739zTbMoRD.exe7⤵PID:1252
-
-
-
C:\Users\Admin\Documents\dv7omecIV1WBDzZMpAi_d6Ht.exe"C:\Users\Admin\Documents\dv7omecIV1WBDzZMpAi_d6Ht.exe"6⤵PID:4044
-
-
C:\Users\Admin\Documents\_VF3RQqz4lnh8Kh5vHhk5_jX.exe"C:\Users\Admin\Documents\_VF3RQqz4lnh8Kh5vHhk5_jX.exe"6⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 8927⤵
- Program crash
PID:4856
-
-
-
C:\Users\Admin\Documents\9BmKBKAEAkg_GsTMfMBTLs0H.exe"C:\Users\Admin\Documents\9BmKBKAEAkg_GsTMfMBTLs0H.exe"6⤵PID:3632
-
-
C:\Users\Admin\Documents\edpivxdi7nK3d9CdvodSqcJs.exe"C:\Users\Admin\Documents\edpivxdi7nK3d9CdvodSqcJs.exe"6⤵PID:3368
-
-
C:\Users\Admin\Documents\emdulBaqnKGV1t3tKcQiPwGC.exe"C:\Users\Admin\Documents\emdulBaqnKGV1t3tKcQiPwGC.exe"6⤵PID:4408
-
-
C:\Users\Admin\Documents\r9JxR5mQHQH5DGpgQS3YXHyr.exe"C:\Users\Admin\Documents\r9JxR5mQHQH5DGpgQS3YXHyr.exe"6⤵PID:952
-
-
C:\Users\Admin\Documents\hPg53tmkGnFtbtkUg5wmXSaO.exe"C:\Users\Admin\Documents\hPg53tmkGnFtbtkUg5wmXSaO.exe"6⤵PID:4788
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_7.exesotema_7.exe5⤵
- Executes dropped EXE
PID:792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_8.exe4⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_8.exesotema_8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_8.exeC:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_8.exe6⤵
- Executes dropped EXE
PID:1908
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sotema_9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_9.exesotema_9.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\is-3BJTM.tmp\sotema_9.tmp"C:\Users\Admin\AppData\Local\Temp\is-3BJTM.tmp\sotema_9.tmp" /SL5="$3002E,161510,77824,C:\Users\Admin\AppData\Local\Temp\7zS0CCE6754\sotema_9.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\is-PO6BG.tmp\gucca.exe"C:\Users\Admin\AppData\Local\Temp\is-PO6BG.tmp\gucca.exe" /S /UID=lab2127⤵PID:4280
-
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4648