Analysis

  • max time kernel
    89s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    25-06-2021 20:04

General

  • Target

    1D5236140D1ED290E2EE8764CC9D9B30.exe

  • Size

    3.2MB

  • MD5

    1d5236140d1ed290e2ee8764cc9d9b30

  • SHA1

    79e8dc84460d2effb2767c21fa095addf3039477

  • SHA256

    6b1901a0869ace34caf5f28585e7b47df631708b16a55e4c9c0f4be765bbbaef

  • SHA512

    7a39f2a389a54e5e4e585b4e754b09afd6d32000437bf8d0334f689688ebea1e1dbbf181a6d5807bcc5668b76b3406ea35440747135d9b9cab6c2c023555b93c

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

706

C2

https://sergeevih43.tumblr.com

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

redline

Botnet

ServAni

C2

87.251.71.195:82

Extracted

Family

redline

Botnet

25_6_r

C2

rdanoriran.xyz:80

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 1 IoCs
  • ASPack v2.12-2.42 14 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 64 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1D5236140D1ED290E2EE8764CC9D9B30.exe
    "C:\Users\Admin\AppData\Local\Temp\1D5236140D1ED290E2EE8764CC9D9B30.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Users\Admin\AppData\Local\Temp\7zS441EC325\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS441EC325\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:752
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c arnatic_1.exe
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Users\Admin\AppData\Local\Temp\7zS441EC325\arnatic_1.exe
            arnatic_1.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            PID:1468
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 892
              6⤵
              • Program crash
              PID:2388
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c arnatic_2.exe
          4⤵
            PID:1992
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c arnatic_4.exe
            4⤵
              PID:328
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c arnatic_7.exe
              4⤵
              • Loads dropped DLL
              PID:812
              • C:\Users\Admin\AppData\Local\Temp\7zS441EC325\arnatic_7.exe
                arnatic_7.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1720
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c arnatic_6.exe
              4⤵
              • Loads dropped DLL
              PID:1256
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c arnatic_5.exe
              4⤵
              • Loads dropped DLL
              PID:764
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c arnatic_3.exe
              4⤵
              • Loads dropped DLL
              PID:428
      • C:\Users\Admin\AppData\Local\Temp\7zS441EC325\arnatic_3.exe
        arnatic_3.exe
        1⤵
        • Executes dropped EXE
        PID:1716
      • C:\Users\Admin\AppData\Local\Temp\7zS441EC325\arnatic_5.exe
        arnatic_5.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        PID:1512
        • C:\Users\Admin\Documents\oc2AJHYBUQnxNKwM1lTGxti1.exe
          "C:\Users\Admin\Documents\oc2AJHYBUQnxNKwM1lTGxti1.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1608
        • C:\Users\Admin\Documents\IL0scNtc6mz2HRKlFpOUgSvQ.exe
          "C:\Users\Admin\Documents\IL0scNtc6mz2HRKlFpOUgSvQ.exe"
          2⤵
            PID:940
          • C:\Users\Admin\Documents\Ldiitr_4Fckv1VIDLMFjrh4l.exe
            "C:\Users\Admin\Documents\Ldiitr_4Fckv1VIDLMFjrh4l.exe"
            2⤵
            • Executes dropped EXE
            PID:304
          • C:\Users\Admin\Documents\5TE7jclWH_hL7U5WCdnbzyhZ.exe
            "C:\Users\Admin\Documents\5TE7jclWH_hL7U5WCdnbzyhZ.exe"
            2⤵
            • Executes dropped EXE
            PID:568
          • C:\Users\Admin\Documents\Fqo8w0FvxlcjOXNlrvtP9sp_.exe
            "C:\Users\Admin\Documents\Fqo8w0FvxlcjOXNlrvtP9sp_.exe"
            2⤵
            • Executes dropped EXE
            PID:2068
          • C:\Users\Admin\Documents\Bm3oM3kU5xGuoUKVp6xM1DvT.exe
            "C:\Users\Admin\Documents\Bm3oM3kU5xGuoUKVp6xM1DvT.exe"
            2⤵
            • Executes dropped EXE
            PID:2056
          • C:\Users\Admin\Documents\XpogLeuNyhT3ikelWCvFbN7W.exe
            "C:\Users\Admin\Documents\XpogLeuNyhT3ikelWCvFbN7W.exe"
            2⤵
            • Executes dropped EXE
            PID:1144
            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
              3⤵
                PID:2492
            • C:\Users\Admin\Documents\kjMkB1HViyztTnaYMLVjPQm3.exe
              "C:\Users\Admin\Documents\kjMkB1HViyztTnaYMLVjPQm3.exe"
              2⤵
              • Executes dropped EXE
              PID:1712
            • C:\Users\Admin\Documents\T7uurFgz1o83Ej3ZxaMz2KWJ.exe
              "C:\Users\Admin\Documents\T7uurFgz1o83Ej3ZxaMz2KWJ.exe"
              2⤵
              • Executes dropped EXE
              PID:1684
            • C:\Users\Admin\Documents\W5BXjsbxqO0lf5pUyESm1llj.exe
              "C:\Users\Admin\Documents\W5BXjsbxqO0lf5pUyESm1llj.exe"
              2⤵
                PID:1988
              • C:\Users\Admin\Documents\cwB2EH4nFZhIVk2DxrJIGysU.exe
                "C:\Users\Admin\Documents\cwB2EH4nFZhIVk2DxrJIGysU.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1680
                • C:\Users\Admin\Documents\cwB2EH4nFZhIVk2DxrJIGysU.exe
                  C:\Users\Admin\Documents\cwB2EH4nFZhIVk2DxrJIGysU.exe
                  3⤵
                    PID:2352
                • C:\Users\Admin\Documents\Y67aSvaVceipa1aDigTJ9tH3.exe
                  "C:\Users\Admin\Documents\Y67aSvaVceipa1aDigTJ9tH3.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:2108
                • C:\Users\Admin\Documents\BLdqYBcGg097BfYwWUkBuI6s.exe
                  "C:\Users\Admin\Documents\BLdqYBcGg097BfYwWUkBuI6s.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:2096
                • C:\Users\Admin\Documents\PurClgjhVB7ki9M8mCgmdSvI.exe
                  "C:\Users\Admin\Documents\PurClgjhVB7ki9M8mCgmdSvI.exe"
                  2⤵
                    PID:2088
                  • C:\Users\Admin\Documents\qG8pj_9LzlMe5ZWNxWGCB3x5.exe
                    "C:\Users\Admin\Documents\qG8pj_9LzlMe5ZWNxWGCB3x5.exe"
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2156
                • C:\Users\Admin\AppData\Local\Temp\7zS441EC325\arnatic_6.exe
                  arnatic_6.exe
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1352
                  • C:\Users\Admin\AppData\Local\Temp\7zS441EC325\arnatic_6.exe
                    C:\Users\Admin\AppData\Local\Temp\7zS441EC325\arnatic_6.exe
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1116

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/752-111-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/752-92-0x0000000000400000-0x000000000051E000-memory.dmp

                  Filesize

                  1.1MB

                • memory/752-101-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/752-90-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/752-106-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/752-115-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/752-91-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/752-116-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/752-93-0x0000000000400000-0x000000000051E000-memory.dmp

                  Filesize

                  1.1MB

                • memory/752-89-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/752-103-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/752-88-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/1116-166-0x0000000000400000-0x000000000041E000-memory.dmp

                  Filesize

                  120KB

                • memory/1116-174-0x00000000008D0000-0x00000000008D1000-memory.dmp

                  Filesize

                  4KB

                • memory/1116-172-0x0000000000400000-0x000000000041E000-memory.dmp

                  Filesize

                  120KB

                • memory/1352-157-0x0000000000B10000-0x0000000000B11000-memory.dmp

                  Filesize

                  4KB

                • memory/1352-164-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

                  Filesize

                  4KB

                • memory/1468-152-0x0000000000230000-0x00000000002EC000-memory.dmp

                  Filesize

                  752KB

                • memory/1468-155-0x0000000000400000-0x00000000004BC000-memory.dmp

                  Filesize

                  752KB

                • memory/1680-210-0x0000000001200000-0x0000000001201000-memory.dmp

                  Filesize

                  4KB

                • memory/1720-154-0x0000000000400000-0x0000000000479000-memory.dmp

                  Filesize

                  484KB

                • memory/1720-161-0x00000000048F2000-0x00000000048F3000-memory.dmp

                  Filesize

                  4KB

                • memory/1720-156-0x00000000003E0000-0x00000000003FB000-memory.dmp

                  Filesize

                  108KB

                • memory/1720-162-0x00000000048F3000-0x00000000048F4000-memory.dmp

                  Filesize

                  4KB

                • memory/1720-159-0x0000000000AB0000-0x0000000000AC9000-memory.dmp

                  Filesize

                  100KB

                • memory/1720-165-0x00000000048F4000-0x00000000048F6000-memory.dmp

                  Filesize

                  8KB

                • memory/1720-160-0x00000000048F1000-0x00000000048F2000-memory.dmp

                  Filesize

                  4KB

                • memory/1720-153-0x0000000000230000-0x00000000002A9000-memory.dmp

                  Filesize

                  484KB

                • memory/1984-59-0x00000000767B1000-0x00000000767B3000-memory.dmp

                  Filesize

                  8KB

                • memory/2352-212-0x0000000000400000-0x000000000041E000-memory.dmp

                  Filesize

                  120KB

                • memory/2352-217-0x0000000000400000-0x000000000041E000-memory.dmp

                  Filesize

                  120KB

                • memory/2352-221-0x00000000008D0000-0x00000000008D1000-memory.dmp

                  Filesize

                  4KB