Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
23-09-2021 21:08
210923-zyzyaafbfr 1022-09-2021 10:40
210922-mqyzssehck 1022-09-2021 05:21
210922-f114ksecck 1021-09-2021 05:29
210921-f6zspsgdg2 1020-09-2021 21:51
210920-1qj3jafed9 1020-09-2021 19:44
210920-yftswafca9 1020-09-2021 08:28
210920-kczcasgahr 1020-09-2021 04:42
210920-fb3acafedj 1020-09-2021 04:42
210920-fb2zksfecr 10Analysis
-
max time kernel
12s -
max time network
112s -
platform
windows10_x64 -
resource
win10-jp -
submitted
20-09-2021 04:42
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
vidar
40.7
706
https://petrenko96.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
janesam
65.108.20.195:6774
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5280 3348 rundll32.exe 24 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral6/memory/5424-328-0x000000000041C5DA-mapping.dmp family_redline behavioral6/memory/584-245-0x0000000005260000-0x000000000527D000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral6/files/0x000600000001ab35-171.dat family_socelars behavioral6/files/0x000600000001ab35-143.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral6/memory/4920-235-0x0000000000A10000-0x0000000000AE4000-memory.dmp family_vidar behavioral6/memory/4920-236-0x0000000000400000-0x00000000004D7000-memory.dmp family_vidar -
resource yara_rule behavioral6/files/0x000400000001ab2c-123.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2c-126.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2e-128.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2e-131.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2b-125.dat aspack_v212_v242 behavioral6/files/0x000400000001ab2b-124.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4040 setup_installer.exe 3576 setup_install.exe -
Loads dropped DLL 6 IoCs
pid Process 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe 3576 setup_install.exe -
resource yara_rule behavioral6/files/0x000500000001ab70-288.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com 37 ipinfo.io 38 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1324 1936 WerFault.exe 88 5664 1936 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4040 4344 setup_x86_x64_install.exe 76 PID 4344 wrote to memory of 4040 4344 setup_x86_x64_install.exe 76 PID 4344 wrote to memory of 4040 4344 setup_x86_x64_install.exe 76 PID 4040 wrote to memory of 3576 4040 setup_installer.exe 77 PID 4040 wrote to memory of 3576 4040 setup_installer.exe 77 PID 4040 wrote to memory of 3576 4040 setup_installer.exe 77 PID 3576 wrote to memory of 4524 3576 setup_install.exe 80 PID 3576 wrote to memory of 4524 3576 setup_install.exe 80 PID 3576 wrote to memory of 4524 3576 setup_install.exe 80 PID 3576 wrote to memory of 4532 3576 setup_install.exe 138 PID 3576 wrote to memory of 4532 3576 setup_install.exe 138 PID 3576 wrote to memory of 4532 3576 setup_install.exe 138 PID 3576 wrote to memory of 4560 3576 setup_install.exe 81 PID 3576 wrote to memory of 4560 3576 setup_install.exe 81 PID 3576 wrote to memory of 4560 3576 setup_install.exe 81 PID 3576 wrote to memory of 2280 3576 setup_install.exe 137 PID 3576 wrote to memory of 2280 3576 setup_install.exe 137 PID 3576 wrote to memory of 2280 3576 setup_install.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:4524
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:4136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19262b9e49ad.exeSun19262b9e49ad.exe5⤵PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe5⤵PID:4792
-
C:\Users\Admin\AppData\Roaming\2606592.scr"C:\Users\Admin\AppData\Roaming\2606592.scr" /S6⤵PID:3812
-
-
C:\Users\Admin\AppData\Roaming\7475752.scr"C:\Users\Admin\AppData\Roaming\7475752.scr" /S6⤵PID:5188
-
-
C:\Users\Admin\AppData\Roaming\4762554.scr"C:\Users\Admin\AppData\Roaming\4762554.scr" /S6⤵PID:68
-
-
C:\Users\Admin\AppData\Roaming\3061297.scr"C:\Users\Admin\AppData\Roaming\3061297.scr" /S6⤵PID:4360
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone5⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 6566⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 6726⤵
- Program crash
PID:5664
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe5⤵PID:4920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun198361825f4.exeSun198361825f4.exe5⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exe"6⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp623F_tmp.exe7⤵PID:5268
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe5⤵PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵PID:980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵PID:3656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵PID:4412
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵PID:4532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1905815e51282417.exeSun1905815e51282417.exe1⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\is-48904.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-48904.tmp\Sun1966fb31dd5a07.tmp" /SL5="$7005C,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1966fb31dd5a07.exe"1⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\is-3TOOE.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-3TOOE.tmp\Ze2ro.exe" /S /UID=burnerch22⤵PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe1⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun191101c1aaa.exeSun191101c1aaa.exe1⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"3⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"3⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"3⤵PID:5468
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"3⤵PID:5308
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"3⤵PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe1⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe1⤵PID:4080
-
C:\Users\Admin\Documents\0FQR8FSXT1mih_Dzp5pdCtqh.exe"C:\Users\Admin\Documents\0FQR8FSXT1mih_Dzp5pdCtqh.exe"2⤵PID:5708
-
-
C:\Users\Admin\Documents\34AdyjjKyODet9DOMmJwQd4i.exe"C:\Users\Admin\Documents\34AdyjjKyODet9DOMmJwQd4i.exe"2⤵PID:5696
-
-
C:\Users\Admin\Documents\8TSiTgJ3O0J20QQsNXpHftbR.exe"C:\Users\Admin\Documents\8TSiTgJ3O0J20QQsNXpHftbR.exe"2⤵PID:5684
-
-
C:\Users\Admin\Documents\JjFjhZCilZN8a8DmsY5z4KlC.exe"C:\Users\Admin\Documents\JjFjhZCilZN8a8DmsY5z4KlC.exe"2⤵PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8CF1D501\Sun193fda712d9f1.exeSun193fda712d9f1.exe1⤵PID:320
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5324
-
-
C:\Users\Admin\AppData\Roaming\4762554.scr"C:\Users\Admin\AppData\Roaming\4762554.scr"1⤵PID:5424