Resubmissions

28-09-2021 20:51

210928-zm5pdsdae8 10

28-09-2021 20:22

210928-y5kaqsdaa9 10

Analysis

  • max time kernel
    1472s
  • max time network
    1788s
  • platform
    windows7_x64
  • resource
    win7-de-20210920
  • submitted
    28-09-2021 20:51

General

  • Target

    071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe

  • Size

    3.9MB

  • MD5

    1be0d2741eaac6804e24a7586b1086b0

  • SHA1

    cdb330156b2063c6f259cb10a787463756798f7a

  • SHA256

    071f6bd61aef9f209be1bfb16ef1fb14bd44804fcab511b129deeb7822948ef9

  • SHA512

    cc9352b0ace0a51cac07069adf33d98e548e6726e71bf4582dcb15c3d7b0a7806765ffc57f95511f1aeca798d7fbf44c08bc5ebe7bc13626b8b7bcd0df872f85

Malware Config

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

pab4

C2

185.215.113.15:61506

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 43 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe
    "C:\Users\Admin\AppData\Local\Temp\071F6BD61AEF9F209BE1BFB16EF1FB14BD44804FCAB51.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
          PID:556
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:316
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu02d385ff55.exe
          3⤵
          • Loads dropped DLL
          PID:1220
          • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu02d385ff55.exe
            Thu02d385ff55.exe
            4⤵
            • Executes dropped EXE
            PID:560
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu02c015332704.exe
          3⤵
          • Loads dropped DLL
          PID:1812
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu02bfe1521bcc038.exe
          3⤵
          • Loads dropped DLL
          PID:2044
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu02f60acc90a3.exe
          3⤵
          • Loads dropped DLL
          PID:2012
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu02588bdad8e7.exe
          3⤵
          • Loads dropped DLL
          PID:1968
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu02966ca5c58f270.exe
          3⤵
          • Loads dropped DLL
          PID:1628
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu02483b39590da5492.exe
          3⤵
          • Loads dropped DLL
          PID:560
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu0299d0d70a4d322.exe
          3⤵
          • Loads dropped DLL
          PID:1124
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu0247e977c7950492a.exe
          3⤵
          • Loads dropped DLL
          PID:1040
    • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu0299d0d70a4d322.exe
      Thu0299d0d70a4d322.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1892
    • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu02bfe1521bcc038.exe
      Thu02bfe1521bcc038.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      PID:804
      • C:\Windows\SysWOW64\dllhost.exe
        dllhost.exe
        2⤵
          PID:1420
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Del.doc
          2⤵
            PID:1680
            • C:\Windows\SysWOW64\cmd.exe
              cmd
              3⤵
              • Loads dropped DLL
              PID:524
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V /R "^NZrkFJTgsCdMvCokxiUUxUBYmGUZCyshQzrAfUxHKQBByATJNifzJsTTnyLZOTMjkrVrmIWmMjlEaZSZNkkcPXDmmpwppcSQtfd$" Una.doc
                4⤵
                  PID:888
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com
                  Riconobbe.exe.com H
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1104
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H
                    5⤵
                    • Executes dropped EXE
                    • Checks processor information in registry
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1864
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\GpkcFOVZR & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com"
                      6⤵
                        PID:1140
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout 2
                          7⤵
                          • Delays execution with timeout.exe
                          PID:1328
                  • C:\Windows\SysWOW64\PING.EXE
                    ping JZCKHXIN -n 30
                    4⤵
                    • Runs ping.exe
                    PID:1272
            • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu0247e977c7950492a.exe
              "C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu0247e977c7950492a.exe" -a
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1768
            • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu02c015332704.exe
              Thu02c015332704.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1636
            • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu02f60acc90a3.exe
              Thu02f60acc90a3.exe
              1⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              PID:1740
            • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu02588bdad8e7.exe
              Thu02588bdad8e7.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1800
            • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu02966ca5c58f270.exe
              Thu02966ca5c58f270.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1596
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 940
                2⤵
                • Loads dropped DLL
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:1028
            • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu0247e977c7950492a.exe
              Thu0247e977c7950492a.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1088
            • C:\Users\Admin\AppData\Local\Temp\7zS0C613BC2\Thu02483b39590da5492.exe
              Thu02483b39590da5492.exe
              1⤵
              • Executes dropped EXE
              PID:1984
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {B8D19C9B-3DE7-48F3-AB1C-D5C0A3437191} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
              1⤵
                PID:1544
                • C:\Users\Admin\AppData\Roaming\iafbrvs
                  C:\Users\Admin\AppData\Roaming\iafbrvs
                  2⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:556
                • C:\Program Files\Mozilla Firefox\default-browser-agent.exe
                  "C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task
                  2⤵
                    PID:792
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {81FD261F-349D-4892-BCF1-C9FFBD348209} S-1-5-18:NT AUTHORITY\System:Service:
                  1⤵
                    PID:1020
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {E9E65429-F80D-412E-877B-4BE813568833} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
                    1⤵
                      PID:932
                      • C:\Users\Admin\AppData\Roaming\iafbrvs
                        C:\Users\Admin\AppData\Roaming\iafbrvs
                        2⤵
                        • Executes dropped EXE
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: MapViewOfSection
                        PID:1848
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {1E3D2944-A632-4F80-B408-552CCE3E533A} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
                      1⤵
                        PID:1136
                        • C:\Users\Admin\AppData\Roaming\iafbrvs
                          C:\Users\Admin\AppData\Roaming\iafbrvs
                          2⤵
                            PID:1592

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/316-189-0x0000000000280000-0x0000000000281000-memory.dmp

                          Filesize

                          4KB

                        • memory/316-197-0x0000000000281000-0x0000000000282000-memory.dmp

                          Filesize

                          4KB

                        • memory/316-205-0x0000000000282000-0x0000000000284000-memory.dmp

                          Filesize

                          8KB

                        • memory/556-220-0x0000000000400000-0x00000000023AF000-memory.dmp

                          Filesize

                          31.7MB

                        • memory/1028-211-0x0000000000570000-0x00000000005D0000-memory.dmp

                          Filesize

                          384KB

                        • memory/1228-230-0x0000000002DE0000-0x0000000002DF6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1228-226-0x0000000002DB0000-0x0000000002DC6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1228-221-0x0000000002D80000-0x0000000002D96000-memory.dmp

                          Filesize

                          88KB

                        • memory/1228-194-0x0000000002BE0000-0x0000000002BF6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1592-229-0x0000000000400000-0x00000000023AF000-memory.dmp

                          Filesize

                          31.7MB

                        • memory/1596-177-0x0000000000400000-0x0000000002403000-memory.dmp

                          Filesize

                          32.0MB

                        • memory/1596-173-0x00000000029A0000-0x0000000002A3D000-memory.dmp

                          Filesize

                          628KB

                        • memory/1636-181-0x0000000000E70000-0x0000000000E71000-memory.dmp

                          Filesize

                          4KB

                        • memory/1636-200-0x000000001B0B0000-0x000000001B0B2000-memory.dmp

                          Filesize

                          8KB

                        • memory/1728-53-0x0000000076391000-0x0000000076393000-memory.dmp

                          Filesize

                          8KB

                        • memory/1740-193-0x0000000000150000-0x0000000000165000-memory.dmp

                          Filesize

                          84KB

                        • memory/1740-201-0x000000001AE00000-0x000000001AE02000-memory.dmp

                          Filesize

                          8KB

                        • memory/1740-183-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1744-101-0x000000006B280000-0x000000006B2A6000-memory.dmp

                          Filesize

                          152KB

                        • memory/1744-80-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/1744-81-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/1744-78-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/1744-96-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1744-77-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/1744-76-0x000000006B280000-0x000000006B2A6000-memory.dmp

                          Filesize

                          152KB

                        • memory/1744-74-0x000000006B440000-0x000000006B4CF000-memory.dmp

                          Filesize

                          572KB

                        • memory/1744-75-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1744-88-0x000000006B440000-0x000000006B4CF000-memory.dmp

                          Filesize

                          572KB

                        • memory/1800-204-0x0000000004910000-0x000000000492A000-memory.dmp

                          Filesize

                          104KB

                        • memory/1800-198-0x00000000072B1000-0x00000000072B2000-memory.dmp

                          Filesize

                          4KB

                        • memory/1800-199-0x00000000003E0000-0x00000000003FC000-memory.dmp

                          Filesize

                          112KB

                        • memory/1800-203-0x00000000072B3000-0x00000000072B4000-memory.dmp

                          Filesize

                          4KB

                        • memory/1800-202-0x00000000072B2000-0x00000000072B3000-memory.dmp

                          Filesize

                          4KB

                        • memory/1800-159-0x0000000000250000-0x000000000027F000-memory.dmp

                          Filesize

                          188KB

                        • memory/1800-165-0x0000000000400000-0x0000000002CD0000-memory.dmp

                          Filesize

                          40.8MB

                        • memory/1800-210-0x00000000072B4000-0x00000000072B6000-memory.dmp

                          Filesize

                          8KB

                        • memory/1848-225-0x0000000000400000-0x00000000023AF000-memory.dmp

                          Filesize

                          31.7MB

                        • memory/1864-212-0x00000000001C0000-0x00000000001C1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1864-213-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1892-178-0x0000000000400000-0x00000000023AF000-memory.dmp

                          Filesize

                          31.7MB

                        • memory/1892-175-0x0000000000240000-0x0000000000249000-memory.dmp

                          Filesize

                          36KB

                        • memory/1984-190-0x000007FEFBBD1000-0x000007FEFBBD3000-memory.dmp

                          Filesize

                          8KB

                        • memory/1984-196-0x0000000003890000-0x0000000003A2B000-memory.dmp

                          Filesize

                          1.6MB

                        • memory/1984-195-0x0000000003610000-0x00000000036E7000-memory.dmp

                          Filesize

                          860KB