Analysis
-
max time kernel
4294210s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
13-03-2022 11:32
Static task
static1
Behavioral task
behavioral1
Sample
ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe
Resource
win7-20220311-en
General
-
Target
ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe
-
Size
6.0MB
-
MD5
d24fbb35cf9c6f4f53bfee6043f07a6e
-
SHA1
01a84ddbe70dbaa93bc840637ac3c1799fa0e24d
-
SHA256
ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8
-
SHA512
2ad5422014450939805f04189f4f72850728e82eff16ae612f03b1c8e34f14f4bb1bac9fabde63f9be3e407d37a3b664cfb61272d400c4eb4e213c1579e62715
Malware Config
Extracted
redline
Pablisher
luchiki.store:80
elochka2021.store:80
girlanda2021.store:80
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral1/files/0x0006000000015c63-83.dat family_babadeda behavioral1/memory/1228-109-0x0000000004330000-0x0000000008330000-memory.dmp family_babadeda -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/memory/1228-108-0x0000000000B80000-0x0000000000B9C000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 1432 setup.exe 568 IrfanViewStreamer.exe 888 md8_8eus.exe 1464 KiffApp2.exe 1840 ifhvvyy.exe 1228 IVStreamer.exe 2024 jfiag3g_gg.exe 1316 jfiag3g_gg.exe -
resource yara_rule behavioral1/files/0x0006000000015ebb-86.dat upx behavioral1/files/0x0006000000015ebb-85.dat upx behavioral1/files/0x0006000000015ebb-84.dat upx behavioral1/files/0x000b000000015ebb-91.dat upx behavioral1/files/0x000b000000015ebb-92.dat upx behavioral1/files/0x000b000000015ebb-93.dat upx -
Loads dropped DLL 12 IoCs
pid Process 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 568 IrfanViewStreamer.exe 1228 IVStreamer.exe 1840 ifhvvyy.exe 1840 ifhvvyy.exe 1840 ifhvvyy.exe 1840 ifhvvyy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" ifhvvyy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\setup.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x0006000000015613-59.dat nsis_installer_1 behavioral1/files/0x0006000000015613-59.dat nsis_installer_2 behavioral1/files/0x0006000000015613-60.dat nsis_installer_1 behavioral1/files/0x0006000000015613-60.dat nsis_installer_2 behavioral1/files/0x0006000000015613-75.dat nsis_installer_1 behavioral1/files/0x0006000000015613-75.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1052 dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 888 md8_8eus.exe Token: SeDebugPrivilege 1228 IVStreamer.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1432 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 27 PID 1548 wrote to memory of 1432 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 27 PID 1548 wrote to memory of 1432 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 27 PID 1548 wrote to memory of 1432 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 27 PID 1548 wrote to memory of 1432 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 27 PID 1548 wrote to memory of 1432 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 27 PID 1548 wrote to memory of 1432 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 27 PID 1548 wrote to memory of 568 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 28 PID 1548 wrote to memory of 568 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 28 PID 1548 wrote to memory of 568 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 28 PID 1548 wrote to memory of 568 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 28 PID 1548 wrote to memory of 888 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 29 PID 1548 wrote to memory of 888 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 29 PID 1548 wrote to memory of 888 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 29 PID 1548 wrote to memory of 888 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 29 PID 1548 wrote to memory of 1464 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 30 PID 1548 wrote to memory of 1464 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 30 PID 1548 wrote to memory of 1464 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 30 PID 1548 wrote to memory of 1464 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 30 PID 1548 wrote to memory of 1840 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 31 PID 1548 wrote to memory of 1840 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 31 PID 1548 wrote to memory of 1840 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 31 PID 1548 wrote to memory of 1840 1548 ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe 31 PID 568 wrote to memory of 1228 568 IrfanViewStreamer.exe 33 PID 568 wrote to memory of 1228 568 IrfanViewStreamer.exe 33 PID 568 wrote to memory of 1228 568 IrfanViewStreamer.exe 33 PID 568 wrote to memory of 1228 568 IrfanViewStreamer.exe 33 PID 1840 wrote to memory of 2024 1840 ifhvvyy.exe 34 PID 1840 wrote to memory of 2024 1840 ifhvvyy.exe 34 PID 1840 wrote to memory of 2024 1840 ifhvvyy.exe 34 PID 1840 wrote to memory of 2024 1840 ifhvvyy.exe 34 PID 1464 wrote to memory of 1052 1464 KiffApp2.exe 35 PID 1464 wrote to memory of 1052 1464 KiffApp2.exe 35 PID 1464 wrote to memory of 1052 1464 KiffApp2.exe 35 PID 1840 wrote to memory of 1316 1840 ifhvvyy.exe 36 PID 1840 wrote to memory of 1316 1840 ifhvvyy.exe 36 PID 1840 wrote to memory of 1316 1840 ifhvvyy.exe 36 PID 1840 wrote to memory of 1316 1840 ifhvvyy.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe"C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Company\NewProduct\setup.exe"C:\Program Files (x86)\Company\NewProduct\setup.exe"2⤵
- Executes dropped EXE
PID:1432
-
-
C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe"C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exeC:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe"C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 5283⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1052
-
-
-
C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe"C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:1316
-
-