Resubmissions

13-01-2022 13:19

220113-qkhx6sade2 4

12-09-2021 07:40

210912-jhysaacbd3 10

12-09-2021 07:40

210912-jhp55sfbbr 10

12-09-2021 07:39

210912-jhc6kscbd2 10

12-09-2021 07:39

210912-jg161sfbbp 10

12-09-2021 07:38

210912-jgmnmafbbn 10

Analysis

  • max time kernel
    1748s
  • max time network
    1761s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    12-09-2021 07:38

General

  • Target

    Dot.Tk.123.ticket.keygen.by.CORE.bin.exe

  • Size

    6.2MB

  • MD5

    0cb3efeb5d9312e068c57e7e55affed7

  • SHA1

    aad1c65d257c7d2929ffb916114bc532feba0a16

  • SHA256

    a974231d8889e05fedfbe73b5cc58e414de6fd5031765c998a24ac326f35b0b2

  • SHA512

    236ce9aa9e71f279e7833c4f0afbad15a2de4aaf62e78a82f1132224951f25f0a184aacfe5c963a20481c20cdb12e1a56e6aaf662f4a07c756abe0c539488898

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

redline

Botnet

newmixnew

C2

94.140.115.194:31858

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

    suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 43 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious use of WriteProcessMemory
        PID:4556
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
            • Executes dropped EXE
            PID:2488
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
        keygen-step-1.exe
        3⤵
        • Executes dropped EXE
        PID:4100
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe
        keygen-step-6.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4640
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe" >> NUL
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:676
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            5⤵
            • Runs ping.exe
            PID:2220
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
        keygen-step-3.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4612
        • C:\Windows\winnetdriv.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe" 1631432336 0
          4⤵
          • Executes dropped EXE
          PID:1732
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
        keygen-step-4.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2348
          • C:\Users\Admin\Documents\PlsWnEU2.exe
            "C:\Users\Admin\Documents\PlsWnEU2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4468
  • C:\Windows\System32\sihclient.exe
    C:\Windows\System32\sihclient.exe /cv hT4RkUrQU0KJr6hWfqbv1w.0.2
    1⤵
    • Modifies data under HKEY_USERS
    PID:3860
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:912
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
    1⤵
      PID:4628

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/912-237-0x0000012A59D80000-0x0000012A59D84000-memory.dmp

      Filesize

      16KB

    • memory/912-231-0x0000012A57760000-0x0000012A57770000-memory.dmp

      Filesize

      64KB

    • memory/912-232-0x0000012A59D60000-0x0000012A59D64000-memory.dmp

      Filesize

      16KB

    • memory/912-230-0x0000012A56D80000-0x0000012A56D90000-memory.dmp

      Filesize

      64KB

    • memory/912-233-0x0000012A5A050000-0x0000012A5A054000-memory.dmp

      Filesize

      16KB

    • memory/912-234-0x0000012A5A010000-0x0000012A5A011000-memory.dmp

      Filesize

      4KB

    • memory/912-235-0x0000012A59D90000-0x0000012A59D94000-memory.dmp

      Filesize

      16KB

    • memory/912-236-0x0000012A59D80000-0x0000012A59D81000-memory.dmp

      Filesize

      4KB

    • memory/912-238-0x0000012A59C60000-0x0000012A59C61000-memory.dmp

      Filesize

      4KB

    • memory/1256-222-0x0000000002C20000-0x0000000002C3B000-memory.dmp

      Filesize

      108KB

    • memory/1256-193-0x0000000003150000-0x00000000032EC000-memory.dmp

      Filesize

      1.6MB

    • memory/1256-218-0x0000000003930000-0x0000000003A1F000-memory.dmp

      Filesize

      956KB

    • memory/1256-221-0x0000000002C30000-0x0000000002C31000-memory.dmp

      Filesize

      4KB

    • memory/2348-202-0x000000001C304000-0x000000001C305000-memory.dmp

      Filesize

      4KB

    • memory/2348-200-0x000000001C302000-0x000000001C304000-memory.dmp

      Filesize

      8KB

    • memory/2348-192-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

      Filesize

      4KB

    • memory/2348-196-0x000000001C300000-0x000000001C302000-memory.dmp

      Filesize

      8KB

    • memory/2488-190-0x0000000000400000-0x0000000000983000-memory.dmp

      Filesize

      5.5MB

    • memory/2488-195-0x0000000000400000-0x0000000000983000-memory.dmp

      Filesize

      5.5MB

    • memory/4468-217-0x0000000002AB4000-0x0000000002AB6000-memory.dmp

      Filesize

      8KB

    • memory/4468-226-0x0000000007B70000-0x0000000007B71000-memory.dmp

      Filesize

      4KB

    • memory/4468-211-0x0000000005660000-0x0000000005661000-memory.dmp

      Filesize

      4KB

    • memory/4468-214-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

      Filesize

      4KB

    • memory/4468-215-0x0000000002AB2000-0x0000000002AB3000-memory.dmp

      Filesize

      4KB

    • memory/4468-210-0x0000000005550000-0x0000000005551000-memory.dmp

      Filesize

      4KB

    • memory/4468-216-0x0000000002AB3000-0x0000000002AB4000-memory.dmp

      Filesize

      4KB

    • memory/4468-209-0x0000000005440000-0x0000000005441000-memory.dmp

      Filesize

      4KB

    • memory/4468-219-0x0000000005960000-0x0000000005961000-memory.dmp

      Filesize

      4KB

    • memory/4468-220-0x0000000006160000-0x0000000006161000-memory.dmp

      Filesize

      4KB

    • memory/4468-208-0x0000000005420000-0x0000000005421000-memory.dmp

      Filesize

      4KB

    • memory/4468-207-0x0000000005A40000-0x0000000005A41000-memory.dmp

      Filesize

      4KB

    • memory/4468-223-0x00000000071F0000-0x00000000071F1000-memory.dmp

      Filesize

      4KB

    • memory/4468-224-0x00000000073D0000-0x00000000073D1000-memory.dmp

      Filesize

      4KB

    • memory/4468-225-0x0000000007A30000-0x0000000007A31000-memory.dmp

      Filesize

      4KB

    • memory/4468-212-0x00000000056A0000-0x00000000056A1000-memory.dmp

      Filesize

      4KB

    • memory/4468-227-0x0000000007D40000-0x0000000007D41000-memory.dmp

      Filesize

      4KB

    • memory/4468-228-0x0000000007D90000-0x0000000007D91000-memory.dmp

      Filesize

      4KB

    • memory/4468-229-0x0000000008300000-0x0000000008301000-memory.dmp

      Filesize

      4KB

    • memory/4468-206-0x0000000002A50000-0x0000000002A70000-memory.dmp

      Filesize

      128KB

    • memory/4468-205-0x0000000004E70000-0x0000000004E71000-memory.dmp

      Filesize

      4KB

    • memory/4468-204-0x00000000028A0000-0x00000000028C2000-memory.dmp

      Filesize

      136KB

    • memory/4468-203-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4468-201-0x00000000022D0000-0x000000000231E000-memory.dmp

      Filesize

      312KB

    • memory/4612-163-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB

    • memory/4640-157-0x00000000006E0000-0x00000000006F8000-memory.dmp

      Filesize

      96KB