Analysis
-
max time kernel
11s -
max time network
183s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
14-08-2021 00:00
Static task
static1
Behavioral task
behavioral1
Sample
918769ECEACD168684DEF1B316FF3198.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
918769ECEACD168684DEF1B316FF3198.exe
Resource
win10v20210408
General
-
Target
918769ECEACD168684DEF1B316FF3198.exe
-
Size
3.3MB
-
MD5
918769eceacd168684def1b316ff3198
-
SHA1
044df161143e5e5c255b4edea7199364703776ed
-
SHA256
6bc9c4e5a88eaa95550d066ff02f0d45b6bd2a93fbcb72b562c6c65ce06bb900
-
SHA512
b0f4dc956b8aeee77724d0424d6c5f8c5b7c503e184ef54caf9bb47bd509205e843d91784329327010726e73fc28140d63a7e461b61fe86278caa86fc4530a17
Malware Config
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
raccoon
93d3ccba4a3cbd5e268873fc1760b2335272e198
-
url4cnc
https://telete.in/opa4kiprivatem
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 1784 rundll32.exe 49 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/memory/2992-290-0x0000000000418F86-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/640-157-0x0000000000400000-0x0000000002CC8000-memory.dmp family_vidar behavioral1/memory/640-148-0x0000000000300000-0x000000000039D000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x000300000001310e-75.dat aspack_v212_v242 behavioral1/files/0x000300000001310e-74.dat aspack_v212_v242 behavioral1/files/0x0004000000013104-71.dat aspack_v212_v242 behavioral1/files/0x0004000000013107-68.dat aspack_v212_v242 behavioral1/files/0x0004000000013104-70.dat aspack_v212_v242 behavioral1/files/0x0004000000013107-69.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 852 setup_install.exe 368 6eee9f336da6fcf1.exe 1488 01a389215e4.exe 1928 c98f61652.exe 640 9e27a03aab64665.exe 1940 1a693a205739887.exe 1932 efd22e6e99d7ee86.exe 1768 626c1e3ded0b288.exe 2044 1a693a205739887.exe -
resource yara_rule behavioral1/files/0x000300000001312d-143.dat vmprotect behavioral1/files/0x000300000001312d-144.dat vmprotect behavioral1/files/0x000300000001312d-145.dat vmprotect behavioral1/files/0x000300000001312d-153.dat vmprotect behavioral1/files/0x000300000001312d-163.dat vmprotect behavioral1/files/0x000300000001312d-162.dat vmprotect behavioral1/memory/1932-165-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect -
Loads dropped DLL 35 IoCs
pid Process 1080 918769ECEACD168684DEF1B316FF3198.exe 1080 918769ECEACD168684DEF1B316FF3198.exe 1080 918769ECEACD168684DEF1B316FF3198.exe 852 setup_install.exe 852 setup_install.exe 852 setup_install.exe 852 setup_install.exe 852 setup_install.exe 852 setup_install.exe 852 setup_install.exe 852 setup_install.exe 1536 cmd.exe 1696 cmd.exe 1504 cmd.exe 1504 cmd.exe 1488 01a389215e4.exe 1488 01a389215e4.exe 752 cmd.exe 752 cmd.exe 1928 c98f61652.exe 1928 c98f61652.exe 640 9e27a03aab64665.exe 640 9e27a03aab64665.exe 1840 cmd.exe 1840 cmd.exe 1940 1a693a205739887.exe 1940 1a693a205739887.exe 1612 cmd.exe 1612 cmd.exe 1060 cmd.exe 1940 1a693a205739887.exe 2044 1a693a205739887.exe 2044 1a693a205739887.exe 1932 efd22e6e99d7ee86.exe 1932 efd22e6e99d7ee86.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ipinfo.io 4 ipinfo.io 145 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1640 640 WerFault.exe 39 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c98f61652.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c98f61652.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c98f61652.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1928 c98f61652.exe 1928 c98f61652.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1932 efd22e6e99d7ee86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 852 1080 918769ECEACD168684DEF1B316FF3198.exe 26 PID 1080 wrote to memory of 852 1080 918769ECEACD168684DEF1B316FF3198.exe 26 PID 1080 wrote to memory of 852 1080 918769ECEACD168684DEF1B316FF3198.exe 26 PID 1080 wrote to memory of 852 1080 918769ECEACD168684DEF1B316FF3198.exe 26 PID 1080 wrote to memory of 852 1080 918769ECEACD168684DEF1B316FF3198.exe 26 PID 1080 wrote to memory of 852 1080 918769ECEACD168684DEF1B316FF3198.exe 26 PID 1080 wrote to memory of 852 1080 918769ECEACD168684DEF1B316FF3198.exe 26 PID 852 wrote to memory of 1536 852 setup_install.exe 29 PID 852 wrote to memory of 1536 852 setup_install.exe 29 PID 852 wrote to memory of 1536 852 setup_install.exe 29 PID 852 wrote to memory of 1536 852 setup_install.exe 29 PID 852 wrote to memory of 1536 852 setup_install.exe 29 PID 852 wrote to memory of 1536 852 setup_install.exe 29 PID 852 wrote to memory of 1536 852 setup_install.exe 29 PID 852 wrote to memory of 1504 852 setup_install.exe 30 PID 852 wrote to memory of 1504 852 setup_install.exe 30 PID 852 wrote to memory of 1504 852 setup_install.exe 30 PID 852 wrote to memory of 1504 852 setup_install.exe 30 PID 852 wrote to memory of 1504 852 setup_install.exe 30 PID 852 wrote to memory of 1504 852 setup_install.exe 30 PID 852 wrote to memory of 1504 852 setup_install.exe 30 PID 852 wrote to memory of 1696 852 setup_install.exe 35 PID 852 wrote to memory of 1696 852 setup_install.exe 35 PID 852 wrote to memory of 1696 852 setup_install.exe 35 PID 852 wrote to memory of 1696 852 setup_install.exe 35 PID 852 wrote to memory of 1696 852 setup_install.exe 35 PID 852 wrote to memory of 1696 852 setup_install.exe 35 PID 852 wrote to memory of 1696 852 setup_install.exe 35 PID 1536 wrote to memory of 368 1536 cmd.exe 31 PID 1536 wrote to memory of 368 1536 cmd.exe 31 PID 1536 wrote to memory of 368 1536 cmd.exe 31 PID 1536 wrote to memory of 368 1536 cmd.exe 31 PID 852 wrote to memory of 672 852 setup_install.exe 34 PID 852 wrote to memory of 672 852 setup_install.exe 34 PID 852 wrote to memory of 672 852 setup_install.exe 34 PID 852 wrote to memory of 672 852 setup_install.exe 34 PID 852 wrote to memory of 672 852 setup_install.exe 34 PID 852 wrote to memory of 672 852 setup_install.exe 34 PID 852 wrote to memory of 672 852 setup_install.exe 34 PID 852 wrote to memory of 752 852 setup_install.exe 32 PID 852 wrote to memory of 752 852 setup_install.exe 32 PID 852 wrote to memory of 752 852 setup_install.exe 32 PID 852 wrote to memory of 752 852 setup_install.exe 32 PID 852 wrote to memory of 752 852 setup_install.exe 32 PID 852 wrote to memory of 752 852 setup_install.exe 32 PID 852 wrote to memory of 752 852 setup_install.exe 32 PID 1696 wrote to memory of 1488 1696 cmd.exe 33 PID 1696 wrote to memory of 1488 1696 cmd.exe 33 PID 1696 wrote to memory of 1488 1696 cmd.exe 33 PID 1696 wrote to memory of 1488 1696 cmd.exe 33 PID 1696 wrote to memory of 1488 1696 cmd.exe 33 PID 1696 wrote to memory of 1488 1696 cmd.exe 33 PID 1696 wrote to memory of 1488 1696 cmd.exe 33 PID 1504 wrote to memory of 1928 1504 cmd.exe 36 PID 1504 wrote to memory of 1928 1504 cmd.exe 36 PID 1504 wrote to memory of 1928 1504 cmd.exe 36 PID 1504 wrote to memory of 1928 1504 cmd.exe 36 PID 1504 wrote to memory of 1928 1504 cmd.exe 36 PID 1504 wrote to memory of 1928 1504 cmd.exe 36 PID 1504 wrote to memory of 1928 1504 cmd.exe 36 PID 852 wrote to memory of 1840 852 setup_install.exe 37 PID 852 wrote to memory of 1840 852 setup_install.exe 37 PID 852 wrote to memory of 1840 852 setup_install.exe 37 PID 852 wrote to memory of 1840 852 setup_install.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\918769ECEACD168684DEF1B316FF3198.exe"C:\Users\Admin\AppData\Local\Temp\918769ECEACD168684DEF1B316FF3198.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6eee9f336da6fcf1.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\6eee9f336da6fcf1.exe6eee9f336da6fcf1.exe4⤵
- Executes dropped EXE
PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c98f61652.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\c98f61652.exec98f61652.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 9e27a03aab64665.exe3⤵
- Loads dropped DLL
PID:752 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\9e27a03aab64665.exe9e27a03aab64665.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 14485⤵
- Program crash
PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME33.exe3⤵PID:672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 01a389215e4.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 1a693a205739887.exe3⤵
- Loads dropped DLL
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\1a693a205739887.exe1a693a205739887.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\1a693a205739887.exe"C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\1a693a205739887.exe" -a5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c efd22e6e99d7ee86.exe3⤵
- Loads dropped DLL
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\efd22e6e99d7ee86.exeefd22e6e99d7ee86.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 626c1e3ded0b288.exe3⤵
- Loads dropped DLL
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\626c1e3ded0b288.exe626c1e3ded0b288.exe4⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Roaming\6746545.exe"C:\Users\Admin\AppData\Roaming\6746545.exe"5⤵PID:2724
-
-
C:\Users\Admin\AppData\Roaming\7862897.exe"C:\Users\Admin\AppData\Roaming\7862897.exe"5⤵PID:2308
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"6⤵PID:2696
-
-
-
C:\Users\Admin\AppData\Roaming\8228776.exe"C:\Users\Admin\AppData\Roaming\8228776.exe"5⤵PID:1468
-
-
C:\Users\Admin\AppData\Roaming\3717610.exe"C:\Users\Admin\AppData\Roaming\3717610.exe"5⤵PID:2100
-
-
C:\Users\Admin\AppData\Roaming\2343990.exe"C:\Users\Admin\AppData\Roaming\2343990.exe"5⤵PID:1560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS834A40A4\01a389215e4.exe01a389215e4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\Documents\Worb3DpoNUWyeRsiCfSRVtyT.exe"C:\Users\Admin\Documents\Worb3DpoNUWyeRsiCfSRVtyT.exe"2⤵PID:2636
-
-
C:\Users\Admin\Documents\vgNLMM1avCtelx85_FDu4Pbb.exe"C:\Users\Admin\Documents\vgNLMM1avCtelx85_FDu4Pbb.exe"2⤵PID:2756
-
-
C:\Users\Admin\Documents\4ymoRS51CDxhK0LksEI0j_g3.exe"C:\Users\Admin\Documents\4ymoRS51CDxhK0LksEI0j_g3.exe"2⤵PID:2584
-
C:\Users\Admin\AppData\Roaming\5604733.exe"C:\Users\Admin\AppData\Roaming\5604733.exe"3⤵PID:1988
-
-
C:\Users\Admin\AppData\Roaming\4220281.exe"C:\Users\Admin\AppData\Roaming\4220281.exe"3⤵PID:2548
-
-
C:\Users\Admin\AppData\Roaming\1368372.exe"C:\Users\Admin\AppData\Roaming\1368372.exe"3⤵PID:2868
-
-
C:\Users\Admin\AppData\Roaming\1035798.exe"C:\Users\Admin\AppData\Roaming\1035798.exe"3⤵PID:2428
-
-
-
C:\Users\Admin\Documents\QuiEfTNhbU_EmmaQ1HJaUXS3.exe"C:\Users\Admin\Documents\QuiEfTNhbU_EmmaQ1HJaUXS3.exe"2⤵PID:2572
-
-
C:\Users\Admin\Documents\CIJT1AkWWBNRxn9EBfg_I1QI.exe"C:\Users\Admin\Documents\CIJT1AkWWBNRxn9EBfg_I1QI.exe"2⤵PID:2704
-
C:\Users\Admin\Documents\CIJT1AkWWBNRxn9EBfg_I1QI.exeC:\Users\Admin\Documents\CIJT1AkWWBNRxn9EBfg_I1QI.exe3⤵PID:2992
-
-
-
C:\Users\Admin\Documents\0oAT8upBeWTNXry9qkZJkYRB.exe"C:\Users\Admin\Documents\0oAT8upBeWTNXry9qkZJkYRB.exe"2⤵PID:2688
-
-
C:\Users\Admin\Documents\_lfIxVjKqY7m3lSqrBz0mDWl.exe"C:\Users\Admin\Documents\_lfIxVjKqY7m3lSqrBz0mDWl.exe"2⤵PID:2132
-
C:\Users\Admin\Documents\_lfIxVjKqY7m3lSqrBz0mDWl.exe"C:\Users\Admin\Documents\_lfIxVjKqY7m3lSqrBz0mDWl.exe"3⤵PID:2912
-
-
-
C:\Users\Admin\Documents\MKUdbwKqR5zCyFq_0ILlOolq.exe"C:\Users\Admin\Documents\MKUdbwKqR5zCyFq_0ILlOolq.exe"2⤵PID:2748
-
-
C:\Users\Admin\Documents\4B92Ae808Prjrc_zY8iOVlac.exe"C:\Users\Admin\Documents\4B92Ae808Prjrc_zY8iOVlac.exe"2⤵PID:2168
-
-
C:\Users\Admin\Documents\fzox5TqjDYYFU5mQO1wan2qF.exe"C:\Users\Admin\Documents\fzox5TqjDYYFU5mQO1wan2qF.exe"2⤵PID:2216
-
-
C:\Users\Admin\Documents\fKOkizjI12B3SB9ip1uYDpoM.exe"C:\Users\Admin\Documents\fKOkizjI12B3SB9ip1uYDpoM.exe"2⤵PID:2200
-
-
C:\Users\Admin\Documents\3hTnrsZ1T2Zk0F073W4KGxIJ.exe"C:\Users\Admin\Documents\3hTnrsZ1T2Zk0F073W4KGxIJ.exe"2⤵PID:2052
-
-
C:\Users\Admin\Documents\_7dpw_htaLsK_DtnQy_zAbOt.exe"C:\Users\Admin\Documents\_7dpw_htaLsK_DtnQy_zAbOt.exe"2⤵PID:924
-
-
C:\Users\Admin\Documents\0IQ9r18AMBWW5MWxCsNtKTfJ.exe"C:\Users\Admin\Documents\0IQ9r18AMBWW5MWxCsNtKTfJ.exe"2⤵PID:756
-
-
C:\Users\Admin\Documents\rBzjPaP8Ya11Hd3UEOktMKok.exe"C:\Users\Admin\Documents\rBzjPaP8Ya11Hd3UEOktMKok.exe"2⤵PID:2204
-
-
C:\Users\Admin\Documents\dvn2VouERVg2LSU91aEljqR0.exe"C:\Users\Admin\Documents\dvn2VouERVg2LSU91aEljqR0.exe"2⤵PID:2488
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵PID:2164
-
-
-
C:\Users\Admin\Documents\0xCZLCMJl2fWwV9cN4IrYSls.exe"C:\Users\Admin\Documents\0xCZLCMJl2fWwV9cN4IrYSls.exe"2⤵PID:2144
-
-
C:\Users\Admin\Documents\UPqk8H6_LMpuKeSsGQG79vbL.exe"C:\Users\Admin\Documents\UPqk8H6_LMpuKeSsGQG79vbL.exe"2⤵PID:2200
-
-
C:\Users\Admin\Documents\RrHVL5SCCdcl3s7VOe2PB2nS.exe"C:\Users\Admin\Documents\RrHVL5SCCdcl3s7VOe2PB2nS.exe"2⤵PID:2188
-
-
C:\Users\Admin\Documents\JCoboVC0Oqcsu7aOdsz1szNp.exe"C:\Users\Admin\Documents\JCoboVC0Oqcsu7aOdsz1szNp.exe"2⤵PID:2336
-
-
C:\Users\Admin\Documents\pygR6qilyCPDscMNrjaAb8eI.exe"C:\Users\Admin\Documents\pygR6qilyCPDscMNrjaAb8eI.exe"2⤵PID:2344
-
-
C:\Users\Admin\Documents\ZhH5z46TpxF_QFabyiJVKxCO.exe"C:\Users\Admin\Documents\ZhH5z46TpxF_QFabyiJVKxCO.exe"2⤵PID:2116
-
-
C:\Users\Admin\Documents\Wrjo3hbJ1IwgjsfUYsDRy2oZ.exe"C:\Users\Admin\Documents\Wrjo3hbJ1IwgjsfUYsDRy2oZ.exe"2⤵PID:2264
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2068
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2232