Analysis
-
max time kernel
6s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
29/11/2021, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
ad95953f1162d1179340da7c4b087fb5.exe
Resource
win7-en-20211104
General
-
Target
ad95953f1162d1179340da7c4b087fb5.exe
-
Size
10.3MB
-
MD5
ad95953f1162d1179340da7c4b087fb5
-
SHA1
d3eab9147bb6482ccb5e45aa4c12ff9671ed4448
-
SHA256
501db6290affecf31a95c2fb5e1b93e047aa3a1cc93657891fd90c0f7bb16830
-
SHA512
9a2842484196b14ee635bfd581baa2fa16ae8a3015e3d00852cf6a425392f031bc2f178b7af856215613b093c4d708e719948a942088b11458f541ff3ec79c60
Malware Config
Extracted
socelars
http://www.gianninidesign.com/
Extracted
amadey
2.82
185.215.113.45/g4MbvE/index.php
Extracted
redline
udptest
193.56.146.64:65441
Extracted
redline
Faker
51.79.188.112:7110
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral2/memory/2508-168-0x0000000002280000-0x00000000022AE000-memory.dmp family_redline behavioral2/memory/2508-179-0x0000000002380000-0x00000000023AC000-memory.dmp family_redline behavioral2/memory/2808-231-0x0000000000030000-0x000000000017B000-memory.dmp family_redline behavioral2/memory/1424-257-0x0000000005C30000-0x0000000005C4B000-memory.dmp family_redline behavioral2/memory/4952-331-0x0000000000418F4E-mapping.dmp family_redline behavioral2/memory/1500-242-0x0000000000E90000-0x0000000000FDA000-memory.dmp family_redline -
Socelars Payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001ab97-145.dat family_socelars behavioral2/files/0x000400000001ab97-144.dat family_socelars -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2768 Folder.exe 860 Gttinstall.exe 2408 lzinstall.exe 3380 prxinstall.exe 2884 SoCleanerInst4234.exe 1012 Folder.exe 1852 Graphics.exe 1200 Install.exe -
resource yara_rule behavioral2/files/0x000500000001ab9b-160.dat vmprotect behavioral2/files/0x000500000001ab9b-159.dat vmprotect behavioral2/memory/1328-165-0x0000000000F10000-0x0000000001531000-memory.dmp vmprotect behavioral2/files/0x000400000001abac-194.dat vmprotect behavioral2/files/0x000400000001abac-195.dat vmprotect behavioral2/memory/3932-205-0x00000000002A0000-0x00000000008C1000-memory.dmp vmprotect -
resource yara_rule behavioral2/files/0x000400000001abf8-361.dat themida behavioral2/files/0x000400000001abf8-362.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ip-api.com 38 ipinfo.io 39 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4268 schtasks.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2768 2636 ad95953f1162d1179340da7c4b087fb5.exe 68 PID 2636 wrote to memory of 2768 2636 ad95953f1162d1179340da7c4b087fb5.exe 68 PID 2636 wrote to memory of 2768 2636 ad95953f1162d1179340da7c4b087fb5.exe 68 PID 2636 wrote to memory of 860 2636 ad95953f1162d1179340da7c4b087fb5.exe 71 PID 2636 wrote to memory of 860 2636 ad95953f1162d1179340da7c4b087fb5.exe 71 PID 2636 wrote to memory of 860 2636 ad95953f1162d1179340da7c4b087fb5.exe 71 PID 2636 wrote to memory of 2408 2636 ad95953f1162d1179340da7c4b087fb5.exe 72 PID 2636 wrote to memory of 2408 2636 ad95953f1162d1179340da7c4b087fb5.exe 72 PID 2636 wrote to memory of 2408 2636 ad95953f1162d1179340da7c4b087fb5.exe 72 PID 2636 wrote to memory of 3380 2636 ad95953f1162d1179340da7c4b087fb5.exe 73 PID 2636 wrote to memory of 3380 2636 ad95953f1162d1179340da7c4b087fb5.exe 73 PID 2636 wrote to memory of 3380 2636 ad95953f1162d1179340da7c4b087fb5.exe 73 PID 2636 wrote to memory of 2884 2636 ad95953f1162d1179340da7c4b087fb5.exe 81 PID 2636 wrote to memory of 2884 2636 ad95953f1162d1179340da7c4b087fb5.exe 81 PID 2636 wrote to memory of 2884 2636 ad95953f1162d1179340da7c4b087fb5.exe 81 PID 2768 wrote to memory of 1012 2768 8372385.exe 74 PID 2768 wrote to memory of 1012 2768 8372385.exe 74 PID 2768 wrote to memory of 1012 2768 8372385.exe 74 PID 2636 wrote to memory of 1852 2636 ad95953f1162d1179340da7c4b087fb5.exe 75 PID 2636 wrote to memory of 1852 2636 ad95953f1162d1179340da7c4b087fb5.exe 75 PID 2636 wrote to memory of 1852 2636 ad95953f1162d1179340da7c4b087fb5.exe 75 PID 2636 wrote to memory of 1200 2636 ad95953f1162d1179340da7c4b087fb5.exe 76 PID 2636 wrote to memory of 1200 2636 ad95953f1162d1179340da7c4b087fb5.exe 76 PID 2636 wrote to memory of 1200 2636 ad95953f1162d1179340da7c4b087fb5.exe 76 PID 3380 wrote to memory of 2508 3380 prxinstall.exe 78 PID 3380 wrote to memory of 2508 3380 prxinstall.exe 78 PID 3380 wrote to memory of 2508 3380 prxinstall.exe 78 PID 2636 wrote to memory of 3532 2636 ad95953f1162d1179340da7c4b087fb5.exe 80 PID 2636 wrote to memory of 3532 2636 ad95953f1162d1179340da7c4b087fb5.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad95953f1162d1179340da7c4b087fb5.exe"C:\Users\Admin\AppData\Local\Temp\ad95953f1162d1179340da7c4b087fb5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe"2⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe" -u3⤵
- Executes dropped EXE
PID:1012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gttinstall.exe"C:\Users\Admin\AppData\Local\Temp\Gttinstall.exe"2⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Processs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Processs.exe"3⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe"C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe"4⤵PID:3932
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\2303a34fa8\5⤵PID:4120
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\2303a34fa8\6⤵PID:4540
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe" /F5⤵
- Creates scheduled task(s)
PID:4268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lzinstall.exe"C:\Users\Admin\AppData\Local\Temp\lzinstall.exe"2⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\lsginstall.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\lsginstall.exe"3⤵PID:1424
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX1\lsginstall.exe" -Force4⤵PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\mirzas\svchost.exe" -Force4⤵PID:500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX1\lsginstall.exe" -Force4⤵PID:2896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\mirzas\svchost.exe" -Force4⤵PID:2084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"4⤵PID:4808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"4⤵PID:4952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\prxinstall.exe"C:\Users\Admin\AppData\Local\Temp\prxinstall.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\udptest.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\udptest.exe"3⤵PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Graphics.exe"C:\Users\Admin\AppData\Local\Temp\Graphics.exe"2⤵
- Executes dropped EXE
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵PID:588
-
C:\Users\Admin\Pictures\Adobe Films\TkJcXUIed41GQ0BPD4Vrg70c.exe"C:\Users\Admin\Pictures\Adobe Films\TkJcXUIed41GQ0BPD4Vrg70c.exe"3⤵PID:2404
-
-
C:\Users\Admin\Pictures\Adobe Films\13htemGZqjsLw3SffkgVC7bF.exe"C:\Users\Admin\Pictures\Adobe Films\13htemGZqjsLw3SffkgVC7bF.exe"3⤵PID:4524
-
-
C:\Users\Admin\Pictures\Adobe Films\_hIRguObIbe4LgKWlGoy28iX.exe"C:\Users\Admin\Pictures\Adobe Films\_hIRguObIbe4LgKWlGoy28iX.exe"3⤵PID:1040
-
-
C:\Users\Admin\Pictures\Adobe Films\H3uEbhHGOKUfspuXRSit3yAF.exe"C:\Users\Admin\Pictures\Adobe Films\H3uEbhHGOKUfspuXRSit3yAF.exe"3⤵PID:1656
-
-
C:\Users\Admin\Pictures\Adobe Films\fpD4RHoxt7nRpPF7BNvsKq0n.exe"C:\Users\Admin\Pictures\Adobe Films\fpD4RHoxt7nRpPF7BNvsKq0n.exe"3⤵PID:4312
-
-
C:\Users\Admin\Pictures\Adobe Films\Vtpozb0UFmvqvvgR8bjV7DLh.exe"C:\Users\Admin\Pictures\Adobe Films\Vtpozb0UFmvqvvgR8bjV7DLh.exe"3⤵PID:3104
-
-
C:\Users\Admin\Pictures\Adobe Films\nNw8gSPs6j27BYiIfXwsgvI6.exe"C:\Users\Admin\Pictures\Adobe Films\nNw8gSPs6j27BYiIfXwsgvI6.exe"3⤵PID:4316
-
-
C:\Users\Admin\Pictures\Adobe Films\8JR2tRhb9m7pMxByWUk0VS9Q.exe"C:\Users\Admin\Pictures\Adobe Films\8JR2tRhb9m7pMxByWUk0VS9Q.exe"3⤵PID:4428
-
-
C:\Users\Admin\Pictures\Adobe Films\V4PRd9YA_qYCHFlIo1IqrpvX.exe"C:\Users\Admin\Pictures\Adobe Films\V4PRd9YA_qYCHFlIo1IqrpvX.exe"3⤵PID:4296
-
-
C:\Users\Admin\Pictures\Adobe Films\97irSMRW6C_XpUpIHN5UKuVK.exe"C:\Users\Admin\Pictures\Adobe Films\97irSMRW6C_XpUpIHN5UKuVK.exe"3⤵PID:1820
-
-
C:\Users\Admin\Pictures\Adobe Films\3QPV9gEZWZ7e60T1jHehagyG.exe"C:\Users\Admin\Pictures\Adobe Films\3QPV9gEZWZ7e60T1jHehagyG.exe"3⤵PID:4444
-
-
C:\Users\Admin\Pictures\Adobe Films\dgYeFVUh1jZMJkQUr5Q1y2Le.exe"C:\Users\Admin\Pictures\Adobe Films\dgYeFVUh1jZMJkQUr5Q1y2Le.exe"3⤵PID:1360
-
-
C:\Users\Admin\Pictures\Adobe Films\hISdw4DGUwBogU1TFGqUgvrH.exe"C:\Users\Admin\Pictures\Adobe Films\hISdw4DGUwBogU1TFGqUgvrH.exe"3⤵PID:4576
-
-
C:\Users\Admin\Pictures\Adobe Films\X9P0H239vAA9kXuhjxlh9sgi.exe"C:\Users\Admin\Pictures\Adobe Films\X9P0H239vAA9kXuhjxlh9sgi.exe"3⤵PID:5212
-
-
C:\Users\Admin\Pictures\Adobe Films\9JJekNxfjCSwBdQjRMuR1xCN.exe"C:\Users\Admin\Pictures\Adobe Films\9JJekNxfjCSwBdQjRMuR1xCN.exe"3⤵PID:5200
-
-
C:\Users\Admin\Pictures\Adobe Films\xGYp5V5PUgGdV0e51w7VF0I2.exe"C:\Users\Admin\Pictures\Adobe Films\xGYp5V5PUgGdV0e51w7VF0I2.exe"3⤵PID:5504
-
-
C:\Users\Admin\Pictures\Adobe Films\eN42tBs8DrDGKxvGtSVXfpqd.exe"C:\Users\Admin\Pictures\Adobe Films\eN42tBs8DrDGKxvGtSVXfpqd.exe"3⤵PID:5464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files.exe"C:\Users\Admin\AppData\Local\Temp\Files.exe"2⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\SoCleanerInst4234.exe"C:\Users\Admin\AppData\Local\Temp\SoCleanerInst4234.exe"2⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Roaming\7303942.exe"C:\Users\Admin\AppData\Roaming\7303942.exe"3⤵PID:944
-
-
C:\Users\Admin\AppData\Roaming\8372385.exe"C:\Users\Admin\AppData\Roaming\8372385.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵PID:4500
-
-
-
C:\Users\Admin\AppData\Roaming\4490144.exe"C:\Users\Admin\AppData\Roaming\4490144.exe"3⤵PID:2808
-
-
C:\Users\Admin\AppData\Roaming\8656853.exe"C:\Users\Admin\AppData\Roaming\8656853.exe"3⤵PID:1500
-
-
C:\Users\Admin\AppData\Roaming\794665.exe"C:\Users\Admin\AppData\Roaming\794665.exe"3⤵PID:3964
-
-
C:\Users\Admin\AppData\Roaming\7500059.exe"C:\Users\Admin\AppData\Roaming\7500059.exe"3⤵PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exeC:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe1⤵PID:5188