Analysis

  • max time kernel
    4294210s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    13-03-2022 11:32

General

  • Target

    ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe

  • Size

    6.0MB

  • MD5

    d24fbb35cf9c6f4f53bfee6043f07a6e

  • SHA1

    01a84ddbe70dbaa93bc840637ac3c1799fa0e24d

  • SHA256

    ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8

  • SHA512

    2ad5422014450939805f04189f4f72850728e82eff16ae612f03b1c8e34f14f4bb1bac9fabde63f9be3e407d37a3b664cfb61272d400c4eb4e213c1579e62715

Malware Config

Extracted

Family

redline

Botnet

Pablisher

C2

luchiki.store:80

elochka2021.store:80

girlanda2021.store:80

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Executes dropped EXE 8 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe
    "C:\Users\Admin\AppData\Local\Temp\ec5a2438bc8bea3adb3484fb4574f476792924a89e3fab7c5b6bd1e6e4d44ec8.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Program Files (x86)\Company\NewProduct\setup.exe
      "C:\Program Files (x86)\Company\NewProduct\setup.exe"
      2⤵
      • Executes dropped EXE
      PID:1432
    • C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe
      "C:\Program Files (x86)\Company\NewProduct\IrfanViewStreamer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exe
        C:\Users\Admin\AppData\Roaming\IrfanViewStreamer\IVStreamer.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1228
    • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
      "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:888
    • C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe
      "C:\Program Files (x86)\Company\NewProduct\KiffApp2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 528
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1052
    • C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe
      "C:\Program Files (x86)\Company\NewProduct\ifhvvyy.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        PID:2024
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        PID:1316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/888-102-0x0000000002D50000-0x0000000002D60000-memory.dmp

    Filesize

    64KB

  • memory/888-96-0x0000000002BB0000-0x0000000002BC0000-memory.dmp

    Filesize

    64KB

  • memory/1052-88-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmp

    Filesize

    8KB

  • memory/1052-89-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1228-109-0x0000000004330000-0x0000000008330000-memory.dmp

    Filesize

    64.0MB

  • memory/1228-108-0x0000000000B80000-0x0000000000B9C000-memory.dmp

    Filesize

    112KB

  • memory/1228-110-0x0000000072FE0000-0x00000000736CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1228-112-0x000000000AD52000-0x000000000AD53000-memory.dmp

    Filesize

    4KB

  • memory/1228-111-0x000000000AD51000-0x000000000AD52000-memory.dmp

    Filesize

    4KB

  • memory/1228-113-0x000000000AD54000-0x000000000AD55000-memory.dmp

    Filesize

    4KB

  • memory/1464-80-0x0000000000AD0000-0x0000000000AD2000-memory.dmp

    Filesize

    8KB

  • memory/1464-79-0x000007FEF5330000-0x000007FEF5CCD000-memory.dmp

    Filesize

    9.6MB

  • memory/1464-81-0x000007FEF5330000-0x000007FEF5CCD000-memory.dmp

    Filesize

    9.6MB

  • memory/1464-74-0x000007FEF2740000-0x000007FEF37D6000-memory.dmp

    Filesize

    16.6MB

  • memory/1548-54-0x0000000075611000-0x0000000075613000-memory.dmp

    Filesize

    8KB