Resubmissions

13-01-2022 13:19

220113-qkhx6sade2 4

12-09-2021 07:40

210912-jhysaacbd3 10

12-09-2021 07:40

210912-jhp55sfbbr 10

12-09-2021 07:39

210912-jhc6kscbd2 10

12-09-2021 07:39

210912-jg161sfbbp 10

12-09-2021 07:38

210912-jgmnmafbbn 10

Analysis

  • max time kernel
    1756s
  • max time network
    1772s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    12-09-2021 07:38

General

  • Target

    Dot.Tk.123.ticket.keygen.by.CORE.bin.exe

  • Size

    6.2MB

  • MD5

    0cb3efeb5d9312e068c57e7e55affed7

  • SHA1

    aad1c65d257c7d2929ffb916114bc532feba0a16

  • SHA256

    a974231d8889e05fedfbe73b5cc58e414de6fd5031765c998a24ac326f35b0b2

  • SHA512

    236ce9aa9e71f279e7833c4f0afbad15a2de4aaf62e78a82f1132224951f25f0a184aacfe5c963a20481c20cdb12e1a56e6aaf662f4a07c756abe0c539488898

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

redline

Botnet

newmixnew

C2

94.140.115.194:31858

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16

    suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:420
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
              PID:3740
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
          keygen-step-1.exe
          3⤵
          • Executes dropped EXE
          PID:516
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe
          keygen-step-6.exe
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe" >> NUL
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              5⤵
              • Runs ping.exe
              PID:1344
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
          keygen-step-3.exe
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:596
          • C:\Windows\winnetdriv.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe" 1631432345 0
            4⤵
            • Executes dropped EXE
            PID:2532
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
          keygen-step-4.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3644
            • C:\Users\Admin\Documents\PlsWnEU2.exe
              "C:\Users\Admin\Documents\PlsWnEU2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:852

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/596-133-0x0000000000A80000-0x0000000000B65000-memory.dmp

      Filesize

      916KB

    • memory/852-174-0x0000000005140000-0x0000000005141000-memory.dmp

      Filesize

      4KB

    • memory/852-170-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

      Filesize

      4KB

    • memory/852-186-0x0000000007680000-0x0000000007681000-memory.dmp

      Filesize

      4KB

    • memory/852-185-0x0000000007420000-0x0000000007421000-memory.dmp

      Filesize

      4KB

    • memory/852-184-0x0000000007450000-0x0000000007451000-memory.dmp

      Filesize

      4KB

    • memory/852-183-0x0000000007300000-0x0000000007301000-memory.dmp

      Filesize

      4KB

    • memory/852-182-0x0000000006CD0000-0x0000000006CD1000-memory.dmp

      Filesize

      4KB

    • memory/852-181-0x0000000006B00000-0x0000000006B01000-memory.dmp

      Filesize

      4KB

    • memory/852-180-0x0000000002764000-0x0000000002766000-memory.dmp

      Filesize

      8KB

    • memory/852-179-0x0000000002763000-0x0000000002764000-memory.dmp

      Filesize

      4KB

    • memory/852-177-0x0000000002760000-0x0000000002761000-memory.dmp

      Filesize

      4KB

    • memory/852-178-0x0000000002762000-0x0000000002763000-memory.dmp

      Filesize

      4KB

    • memory/852-176-0x00000000052D0000-0x00000000052D1000-memory.dmp

      Filesize

      4KB

    • memory/852-167-0x0000000002200000-0x000000000224E000-memory.dmp

      Filesize

      312KB

    • memory/852-168-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/852-169-0x00000000024B0000-0x00000000024D2000-memory.dmp

      Filesize

      136KB

    • memory/852-175-0x0000000005250000-0x0000000005251000-memory.dmp

      Filesize

      4KB

    • memory/852-171-0x0000000002710000-0x0000000002730000-memory.dmp

      Filesize

      128KB

    • memory/852-172-0x0000000005700000-0x0000000005701000-memory.dmp

      Filesize

      4KB

    • memory/852-173-0x0000000002780000-0x0000000002781000-memory.dmp

      Filesize

      4KB

    • memory/2364-160-0x0000000002660000-0x00000000027FC000-memory.dmp

      Filesize

      1.6MB

    • memory/2532-146-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB

    • memory/2864-126-0x0000000000CE0000-0x0000000000CF8000-memory.dmp

      Filesize

      96KB

    • memory/3644-166-0x000000001BE34000-0x000000001BE35000-memory.dmp

      Filesize

      4KB

    • memory/3644-158-0x0000000000C40000-0x0000000000C41000-memory.dmp

      Filesize

      4KB

    • memory/3644-161-0x000000001BE30000-0x000000001BE32000-memory.dmp

      Filesize

      8KB

    • memory/3644-165-0x000000001BE32000-0x000000001BE34000-memory.dmp

      Filesize

      8KB