Analysis

  • max time kernel
    8s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    04-12-2021 18:01

General

  • Target

    C7304FF0966068D305DA031F9DA60C5B0EBE32AC43533.exe

  • Size

    4.4MB

  • MD5

    d13d7a330bd2b99acb5c445bb14ab499

  • SHA1

    0a598d94482ab95fe1ecd2a0741eb39b7d7defb2

  • SHA256

    c7304ff0966068d305da031f9da60c5b0ebe32ac43533d27f50190f1ba549347

  • SHA512

    9c754fb692a95daeb895cfd4acbb09b84c80b217b5b7dfb27ae75bc9ae9560e8a8e09e49424fcffaba0e2f365b79fb51fc4a69f5b580f0ddb1308c896d33d82c

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.efxety.top/

Extracted

Family

raccoon

Botnet

2f2ad1a1aa093c5a9d17040c8efd5650a99640b5

Attributes
  • url4cnc

    http://telegatt.top/oh12manymarty

    http://telegka.top/oh12manymarty

    http://telegin.top/oh12manymarty

    https://t.me/oh12manymarty

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

Chris

C2

194.104.136.5:46013

Extracted

Family

smokeloader

Version

2020

C2

http://directorycart.com/upload/

http://tierzahnarzt.at/upload/

http://streetofcards.com/upload/

http://ycdfzd.com/upload/

http://successcoachceo.com/upload/

http://uhvu.cn/upload/

http://japanarticle.com/upload/

rc4.i32
rc4.i32

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 1 IoCs
  • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 16 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C7304FF0966068D305DA031F9DA60C5B0EBE32AC43533.exe
    "C:\Users\Admin\AppData\Local\Temp\C7304FF0966068D305DA031F9DA60C5B0EBE32AC43533.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
            5⤵
              PID:1748
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1540
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
              5⤵
                PID:996
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Tue20ac538d4a24.exe
              4⤵
                PID:1720
                • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue20ac538d4a24.exe
                  Tue20ac538d4a24.exe
                  5⤵
                    PID:944
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c Tue208d5a2e61b0.exe
                  4⤵
                    PID:1992
                    • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue208d5a2e61b0.exe
                      Tue208d5a2e61b0.exe
                      5⤵
                        PID:608
                        • C:\Users\Admin\AppData\Local\Temp\is-MHUJK.tmp\Tue208d5a2e61b0.tmp
                          "C:\Users\Admin\AppData\Local\Temp\is-MHUJK.tmp\Tue208d5a2e61b0.tmp" /SL5="$50156,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue208d5a2e61b0.exe"
                          6⤵
                            PID:1476
                            • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue208d5a2e61b0.exe
                              "C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue208d5a2e61b0.exe" /SILENT
                              7⤵
                                PID:2128
                                • C:\Users\Admin\AppData\Local\Temp\is-4GK7Q.tmp\Tue208d5a2e61b0.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-4GK7Q.tmp\Tue208d5a2e61b0.tmp" /SL5="$70128,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue208d5a2e61b0.exe" /SILENT
                                  8⤵
                                    PID:2232
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Tue2046207032.exe
                            4⤵
                              PID:888
                              • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue2046207032.exe
                                Tue2046207032.exe
                                5⤵
                                  PID:1696
                                  • C:\Users\Admin\Pictures\Adobe Films\ukOhWzwYumZswI0tXQPVPTiT.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\ukOhWzwYumZswI0tXQPVPTiT.exe"
                                    6⤵
                                      PID:1600
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 1520
                                      6⤵
                                      • Program crash
                                      PID:1376
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c Tue205ab5626e61c.exe
                                  4⤵
                                  • Loads dropped DLL
                                  PID:672
                                  • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue205ab5626e61c.exe
                                    Tue205ab5626e61c.exe
                                    5⤵
                                      PID:896
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c Tue2064c324db92f.exe
                                    4⤵
                                      PID:1968
                                      • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue2064c324db92f.exe
                                        Tue2064c324db92f.exe
                                        5⤵
                                          PID:556
                                          • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue2064c324db92f.exe
                                            C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue2064c324db92f.exe
                                            6⤵
                                              PID:2492
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c Tue209f35d55df8511db.exe
                                          4⤵
                                            PID:1132
                                            • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue209f35d55df8511db.exe
                                              Tue209f35d55df8511db.exe
                                              5⤵
                                                PID:744
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c Tue2031b0185b8f.exe
                                              4⤵
                                                PID:588
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c Tue202a242fa2f8.exe
                                                4⤵
                                                  PID:1884
                                                  • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue202a242fa2f8.exe
                                                    Tue202a242fa2f8.exe
                                                    5⤵
                                                      PID:1800
                                                      • C:\Users\Admin\Pictures\Adobe Films\Qd0qO_IbkxhZ0ASeHt0b0QMe.exe
                                                        "C:\Users\Admin\Pictures\Adobe Films\Qd0qO_IbkxhZ0ASeHt0b0QMe.exe"
                                                        6⤵
                                                          PID:3000
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 1192
                                                          6⤵
                                                          • Program crash
                                                          PID:2156
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c Tue20b32e44e88.exe
                                                      4⤵
                                                        PID:1584
                                                        • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue20b32e44e88.exe
                                                          Tue20b32e44e88.exe
                                                          5⤵
                                                            PID:1304
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c Tue2079ec2d36.exe
                                                          4⤵
                                                            PID:828
                                                            • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue2079ec2d36.exe
                                                              Tue2079ec2d36.exe
                                                              5⤵
                                                                PID:340
                                                                • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue2079ec2d36.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue2079ec2d36.exe
                                                                  6⤵
                                                                    PID:2484
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c Tue204f9bcf3878.exe
                                                                4⤵
                                                                  PID:1920
                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue204f9bcf3878.exe
                                                                    Tue204f9bcf3878.exe
                                                                    5⤵
                                                                      PID:1576
                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue204f9bcf3878.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue204f9bcf3878.exe"
                                                                      5⤵
                                                                        PID:2076
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c Tue201a2ac2732ecc98e.exe
                                                                      4⤵
                                                                        PID:808
                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue201a2ac2732ecc98e.exe
                                                                          Tue201a2ac2732ecc98e.exe
                                                                          5⤵
                                                                            PID:920
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c Tue201693b44593b.exe
                                                                          4⤵
                                                                            PID:1172
                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue201693b44593b.exe
                                                                              Tue201693b44593b.exe
                                                                              5⤵
                                                                                PID:1628
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 1500
                                                                                  6⤵
                                                                                  • Program crash
                                                                                  PID:2708
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c Tue20890531b5bd.exe /mixone
                                                                              4⤵
                                                                                PID:1896
                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue20890531b5bd.exe
                                                                                  Tue20890531b5bd.exe /mixone
                                                                                  5⤵
                                                                                    PID:1532
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c Tue20bc246cdb.exe
                                                                                  4⤵
                                                                                    PID:792
                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS832F65E5\Tue20bc246cdb.exe
                                                                                      Tue20bc246cdb.exe
                                                                                      5⤵
                                                                                        PID:1596
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 492
                                                                                      4⤵
                                                                                      • Program crash
                                                                                      PID:2220

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v6

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • memory/340-210-0x0000000001090000-0x0000000001091000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/340-231-0x0000000004D90000-0x0000000004D91000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/556-213-0x0000000000250000-0x0000000000251000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/556-232-0x0000000004A60000-0x0000000004A61000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/608-176-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                Filesize

                                                                                80KB

                                                                              • memory/896-224-0x0000000001000000-0x0000000001001000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/944-262-0x0000000004C60000-0x0000000004C61000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/944-235-0x0000000000740000-0x0000000000741000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/944-211-0x0000000000850000-0x0000000000851000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/996-230-0x0000000002020000-0x0000000002C6A000-memory.dmp

                                                                                Filesize

                                                                                12.3MB

                                                                              • memory/996-234-0x0000000002020000-0x0000000002C6A000-memory.dmp

                                                                                Filesize

                                                                                12.3MB

                                                                              • memory/1200-101-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1200-96-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1200-98-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1200-100-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                Filesize

                                                                                572KB

                                                                              • memory/1200-102-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                Filesize

                                                                                152KB

                                                                              • memory/1200-99-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1200-97-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1200-91-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                Filesize

                                                                                152KB

                                                                              • memory/1200-84-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                Filesize

                                                                                572KB

                                                                              • memory/1200-90-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1200-89-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1200-85-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                Filesize

                                                                                572KB

                                                                              • memory/1200-88-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1200-87-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                Filesize

                                                                                1.5MB

                                                                              • memory/1200-86-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                Filesize

                                                                                572KB

                                                                              • memory/1304-236-0x0000000000400000-0x0000000002F02000-memory.dmp

                                                                                Filesize

                                                                                43.0MB

                                                                              • memory/1304-233-0x00000000001D0000-0x00000000001D9000-memory.dmp

                                                                                Filesize

                                                                                36KB

                                                                              • memory/1304-196-0x00000000002C0000-0x00000000002C9000-memory.dmp

                                                                                Filesize

                                                                                36KB

                                                                              • memory/1376-55-0x0000000075B71000-0x0000000075B73000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/1384-259-0x0000000002B60000-0x0000000002B76000-memory.dmp

                                                                                Filesize

                                                                                88KB

                                                                              • memory/1476-207-0x0000000000370000-0x0000000000371000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/1532-247-0x00000000035C0000-0x00000000060E2000-memory.dmp

                                                                                Filesize

                                                                                43.1MB

                                                                              • memory/1532-256-0x0000000000400000-0x0000000002F22000-memory.dmp

                                                                                Filesize

                                                                                43.1MB

                                                                              • memory/1532-202-0x0000000003110000-0x0000000003139000-memory.dmp

                                                                                Filesize

                                                                                164KB

                                                                              • memory/1596-226-0x0000000000280000-0x000000000030E000-memory.dmp

                                                                                Filesize

                                                                                568KB

                                                                              • memory/1596-206-0x0000000001B60000-0x0000000001BAF000-memory.dmp

                                                                                Filesize

                                                                                316KB

                                                                              • memory/1596-227-0x0000000000400000-0x00000000016FB000-memory.dmp

                                                                                Filesize

                                                                                19.0MB

                                                                              • memory/1748-229-0x0000000002010000-0x0000000002C5A000-memory.dmp

                                                                                Filesize

                                                                                12.3MB

                                                                              • memory/1748-228-0x0000000002010000-0x0000000002C5A000-memory.dmp

                                                                                Filesize

                                                                                12.3MB

                                                                              • memory/1920-218-0x0000000000C10000-0x0000000000C11000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/2128-217-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                Filesize

                                                                                80KB

                                                                              • memory/2220-261-0x00000000005E0000-0x00000000005E1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/2232-223-0x0000000000260000-0x0000000000261000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/2484-240-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/2492-237-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/2492-239-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/2492-241-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/2708-260-0x00000000007A0000-0x00000000007A1000-memory.dmp

                                                                                Filesize

                                                                                4KB