Analysis
-
max time kernel
13s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-06-2021 21:02
Static task
static1
Behavioral task
behavioral1
Sample
1E8A8EE8289275F97487BB8E542FC82B.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
1E8A8EE8289275F97487BB8E542FC82B.exe
Resource
win10v20210408
General
-
Target
1E8A8EE8289275F97487BB8E542FC82B.exe
-
Size
4.9MB
-
MD5
1e8a8ee8289275f97487bb8e542fc82b
-
SHA1
a0bef3b42d878a39ffc9c97aa379bef23aa77d47
-
SHA256
aec52cfc257db5fc8401733d52f0b4eb0b8c1d814395b433859f64d08ec67d26
-
SHA512
02dcae9135cd4b70e57f0aa258c0d44a1bb46bc015e5da1c6882580c131050f7855b6ebeb778a365dd135cacad366fb5b0bbdb50a77802962ec0d1c63b425bb1
Malware Config
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Extracted
redline
ServAni
87.251.71.195:82
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral1/memory/1724-192-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1724-193-0x0000000000417F26-mapping.dmp family_redline behavioral1/memory/1724-195-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/752-177-0x0000000000CE0000-0x0000000000D7D000-memory.dmp family_vidar behavioral1/memory/752-181-0x0000000000400000-0x0000000000948000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x00030000000130d8-61.dat aspack_v212_v242 behavioral1/files/0x00030000000130d8-62.dat aspack_v212_v242 behavioral1/files/0x00030000000130d8-63.dat aspack_v212_v242 behavioral1/files/0x00030000000130d8-65.dat aspack_v212_v242 behavioral1/files/0x00030000000130d4-66.dat aspack_v212_v242 behavioral1/files/0x00030000000130d4-67.dat aspack_v212_v242 behavioral1/files/0x00030000000130d3-68.dat aspack_v212_v242 behavioral1/files/0x00030000000130d3-69.dat aspack_v212_v242 behavioral1/files/0x00030000000130d6-74.dat aspack_v212_v242 behavioral1/files/0x00030000000130d6-75.dat aspack_v212_v242 behavioral1/files/0x00030000000130d8-77.dat aspack_v212_v242 behavioral1/files/0x00030000000130d8-78.dat aspack_v212_v242 behavioral1/files/0x00030000000130d8-80.dat aspack_v212_v242 behavioral1/files/0x00030000000130d8-79.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 1320 setup_install.exe 1588 sonia_2.exe 1092 sonia_4.exe 752 sonia_3.exe 896 sonia_7.exe 1068 sonia_1.exe 280 sonia_5.exe 888 sonia_8.exe 1376 sonia_8.tmp -
resource yara_rule behavioral1/files/0x00030000000130df-179.dat upx behavioral1/files/0x00030000000130df-178.dat upx -
Loads dropped DLL 37 IoCs
pid Process 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 1320 setup_install.exe 1320 setup_install.exe 1320 setup_install.exe 1320 setup_install.exe 1320 setup_install.exe 1320 setup_install.exe 1320 setup_install.exe 1320 setup_install.exe 1508 cmd.exe 1508 cmd.exe 620 cmd.exe 620 cmd.exe 1588 sonia_2.exe 1588 sonia_2.exe 108 cmd.exe 752 sonia_3.exe 752 sonia_3.exe 684 cmd.exe 684 cmd.exe 1092 sonia_4.exe 1092 sonia_4.exe 1596 cmd.exe 1664 cmd.exe 584 cmd.exe 1068 sonia_1.exe 1068 sonia_1.exe 896 sonia_7.exe 896 sonia_7.exe 888 sonia_8.exe 888 sonia_8.exe 888 sonia_8.exe 1376 sonia_8.tmp 1376 sonia_8.tmp 1376 sonia_8.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2536 752 WerFault.exe 33 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 280 sonia_5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1320 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 26 PID 1612 wrote to memory of 1320 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 26 PID 1612 wrote to memory of 1320 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 26 PID 1612 wrote to memory of 1320 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 26 PID 1612 wrote to memory of 1320 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 26 PID 1612 wrote to memory of 1320 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 26 PID 1612 wrote to memory of 1320 1612 1E8A8EE8289275F97487BB8E542FC82B.exe 26 PID 1320 wrote to memory of 1596 1320 setup_install.exe 28 PID 1320 wrote to memory of 1596 1320 setup_install.exe 28 PID 1320 wrote to memory of 1596 1320 setup_install.exe 28 PID 1320 wrote to memory of 1596 1320 setup_install.exe 28 PID 1320 wrote to memory of 1596 1320 setup_install.exe 28 PID 1320 wrote to memory of 1596 1320 setup_install.exe 28 PID 1320 wrote to memory of 1596 1320 setup_install.exe 28 PID 1320 wrote to memory of 1508 1320 setup_install.exe 29 PID 1320 wrote to memory of 1508 1320 setup_install.exe 29 PID 1320 wrote to memory of 1508 1320 setup_install.exe 29 PID 1320 wrote to memory of 1508 1320 setup_install.exe 29 PID 1320 wrote to memory of 1508 1320 setup_install.exe 29 PID 1320 wrote to memory of 1508 1320 setup_install.exe 29 PID 1320 wrote to memory of 1508 1320 setup_install.exe 29 PID 1320 wrote to memory of 620 1320 setup_install.exe 30 PID 1320 wrote to memory of 620 1320 setup_install.exe 30 PID 1320 wrote to memory of 620 1320 setup_install.exe 30 PID 1320 wrote to memory of 620 1320 setup_install.exe 30 PID 1320 wrote to memory of 620 1320 setup_install.exe 30 PID 1320 wrote to memory of 620 1320 setup_install.exe 30 PID 1320 wrote to memory of 620 1320 setup_install.exe 30 PID 1320 wrote to memory of 108 1320 setup_install.exe 31 PID 1320 wrote to memory of 108 1320 setup_install.exe 31 PID 1320 wrote to memory of 108 1320 setup_install.exe 31 PID 1320 wrote to memory of 108 1320 setup_install.exe 31 PID 1320 wrote to memory of 108 1320 setup_install.exe 31 PID 1320 wrote to memory of 108 1320 setup_install.exe 31 PID 1320 wrote to memory of 108 1320 setup_install.exe 31 PID 1320 wrote to memory of 1664 1320 setup_install.exe 32 PID 1320 wrote to memory of 1664 1320 setup_install.exe 32 PID 1320 wrote to memory of 1664 1320 setup_install.exe 32 PID 1320 wrote to memory of 1664 1320 setup_install.exe 32 PID 1320 wrote to memory of 1664 1320 setup_install.exe 32 PID 1320 wrote to memory of 1664 1320 setup_install.exe 32 PID 1320 wrote to memory of 1664 1320 setup_install.exe 32 PID 1508 wrote to memory of 1588 1508 cmd.exe 44 PID 1508 wrote to memory of 1588 1508 cmd.exe 44 PID 1508 wrote to memory of 1588 1508 cmd.exe 44 PID 1508 wrote to memory of 1588 1508 cmd.exe 44 PID 1508 wrote to memory of 1588 1508 cmd.exe 44 PID 1508 wrote to memory of 1588 1508 cmd.exe 44 PID 1508 wrote to memory of 1588 1508 cmd.exe 44 PID 620 wrote to memory of 752 620 cmd.exe 33 PID 620 wrote to memory of 752 620 cmd.exe 33 PID 620 wrote to memory of 752 620 cmd.exe 33 PID 620 wrote to memory of 752 620 cmd.exe 33 PID 620 wrote to memory of 752 620 cmd.exe 33 PID 620 wrote to memory of 752 620 cmd.exe 33 PID 620 wrote to memory of 752 620 cmd.exe 33 PID 1320 wrote to memory of 324 1320 setup_install.exe 34 PID 1320 wrote to memory of 324 1320 setup_install.exe 34 PID 1320 wrote to memory of 324 1320 setup_install.exe 34 PID 1320 wrote to memory of 324 1320 setup_install.exe 34 PID 1320 wrote to memory of 324 1320 setup_install.exe 34 PID 1320 wrote to memory of 324 1320 setup_install.exe 34 PID 1320 wrote to memory of 324 1320 setup_install.exe 34 PID 1320 wrote to memory of 684 1320 setup_install.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1E8A8EE8289275F97487BB8E542FC82B.exe"C:\Users\Admin\AppData\Local\Temp\1E8A8EE8289275F97487BB8E542FC82B.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe3⤵
- Loads dropped DLL
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_1.exesonia_1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub5⤵PID:1536
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_2.exesonia_2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_3.exesonia_3.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 9725⤵
- Program crash
PID:2536
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe3⤵
- Loads dropped DLL
PID:108 -
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_4.exesonia_4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2428
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe3⤵
- Loads dropped DLL
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_5.exesonia_5.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:280 -
C:\Users\Admin\AppData\Roaming\5951125.exe"C:\Users\Admin\AppData\Roaming\5951125.exe"5⤵PID:1096
-
-
C:\Users\Admin\AppData\Roaming\8104582.exe"C:\Users\Admin\AppData\Roaming\8104582.exe"5⤵PID:1192
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"6⤵PID:2060
-
-
-
C:\Users\Admin\AppData\Roaming\5686967.exe"C:\Users\Admin\AppData\Roaming\5686967.exe"5⤵PID:912
-
-
C:\Users\Admin\AppData\Roaming\2371401.exe"C:\Users\Admin\AppData\Roaming\2371401.exe"5⤵PID:1964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe3⤵PID:324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_9.exe3⤵PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_8.exe3⤵
- Loads dropped DLL
PID:584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe3⤵
- Loads dropped DLL
PID:684
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_8.exesonia_8.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Users\Admin\AppData\Local\Temp\is-SRGCL.tmp\sonia_8.tmp"C:\Users\Admin\AppData\Local\Temp\is-SRGCL.tmp\sonia_8.tmp" /SL5="$4012C,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\is-BAFGM.tmp\bkhgbà _ç-.exe"C:\Users\Admin\AppData\Local\Temp\is-BAFGM.tmp\bkhgbà _ç-.exe" /S /UID=lab2123⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\64-de7d8-3ca-6daa4-4583db3df7de9\Sihulepyte.exe"C:\Users\Admin\AppData\Local\Temp\64-de7d8-3ca-6daa4-4583db3df7de9\Sihulepyte.exe"4⤵PID:2776
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e65⤵PID:2080
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:26⤵PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2d-e0235-96f-93588-846b7d3b3a940\Vybaejyhaju.exe"C:\Users\Admin\AppData\Local\Temp\2d-e0235-96f-93588-846b7d3b3a940\Vybaejyhaju.exe"4⤵PID:2796
-
-
C:\Program Files\Internet Explorer\OGOIVXCBQQ\prolab.exe"C:\Program Files\Internet Explorer\OGOIVXCBQQ\prolab.exe" /VERYSILENT4⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\is-5HB6Q.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-5HB6Q.tmp\prolab.tmp" /SL5="$2019A,575243,216576,C:\Program Files\Internet Explorer\OGOIVXCBQQ\prolab.exe" /VERYSILENT5⤵PID:2836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_7.exesonia_7.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_7.exeC:\Users\Admin\AppData\Local\Temp\7zSC46AFC54\sonia_7.exe2⤵PID:1724
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1984