Analysis

  • max time kernel
    155s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-06-2022 09:07

General

  • Target

    949338b881c13dffd583446046740257ec1e7a8a59092eae3a2fd88013d75cc3.exe

  • Size

    286KB

  • MD5

    33026366c5d3c2b724836a7072173d26

  • SHA1

    6938dd1c16c4bd5c1ddbf96d590f7fe9f480259b

  • SHA256

    949338b881c13dffd583446046740257ec1e7a8a59092eae3a2fd88013d75cc3

  • SHA512

    4ee3a5c9dacbce8dd10e953f9c18a6a060cf447db0608f19f2670b66ae746e8ceb77e76942727cf7f0cb74d851ae9e59357abba1decbaf61554086db4344a2c2

Malware Config

Extracted

Family

vidar

Version

52.6

Botnet

1415

C2

https://t.me/tg_dailylessons

https://busshi.moe/@olegf9844xx

Attributes
  • profile_id

    1415

Extracted

Family

redline

Botnet

USAeuTEST

C2

193.106.191.246:23196

Attributes
  • auth_value

    7dbf5ba6d421c1b0e8ce8d5867af4537

Extracted

Family

redline

Botnet

mario2

C2

193.106.191.129:80

Attributes
  • auth_value

    4ef7e3fec3a418b2f0233b604d0560d9

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

    suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved

  • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

  • Vidar Stealer 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\949338b881c13dffd583446046740257ec1e7a8a59092eae3a2fd88013d75cc3.exe
    "C:\Users\Admin\AppData\Local\Temp\949338b881c13dffd583446046740257ec1e7a8a59092eae3a2fd88013d75cc3.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:936
  • C:\Users\Admin\AppData\Local\Temp\4815.exe
    C:\Users\Admin\AppData\Local\Temp\4815.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Start-Sleep -Seconds 10;Start-Sleep -Seconds 10;
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:432
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 15
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Windows\SysWOW64\timeout.exe
        timeout 15
        3⤵
        • Delays execution with timeout.exe
        PID:740
    • C:\Users\Admin\AppData\Local\Temp\4815.exe
      C:\Users\Admin\AppData\Local\Temp\4815.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:676
  • C:\Users\Admin\AppData\Local\Temp\5EBB.exe
    C:\Users\Admin\AppData\Local\Temp\5EBB.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    PID:4628
  • C:\Users\Admin\AppData\Local\Temp\76E7.exe
    C:\Users\Admin\AppData\Local\Temp\76E7.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5060
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:3560
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 884
        2⤵
        • Program crash
        PID:2520
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:1992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3560 -ip 3560
        1⤵
          PID:2340
        • C:\Users\Admin\AppData\Roaming\bchdchh
          C:\Users\Admin\AppData\Roaming\bchdchh
          1⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:2952

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Credential Access

        Credentials in Files

        4
        T1081

        Discovery

        Query Registry

        4
        T1012

        System Information Discovery

        4
        T1082

        Peripheral Device Discovery

        1
        T1120

        Collection

        Data from Local System

        4
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\mozglue.dll
          Filesize

          133KB

          MD5

          8f73c08a9660691143661bf7332c3c27

          SHA1

          37fa65dd737c50fda710fdbde89e51374d0c204a

          SHA256

          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

          SHA512

          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

        • C:\ProgramData\nss3.dll
          Filesize

          1.2MB

          MD5

          bfac4e3c5908856ba17d41edcd455a51

          SHA1

          8eec7e888767aa9e4cca8ff246eb2aacb9170428

          SHA256

          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

          SHA512

          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4815.exe.log
          Filesize

          710B

          MD5

          d5a866e73c386c414e40fb9349fe3a6d

          SHA1

          4e1995053aa666a5393c89921a20ead4a887dd9c

          SHA256

          e94090c92f919c88dcde9c787b1fe5e27527c5e5de3e92ccef6abd99e59c7bbf

          SHA512

          203690b222fa96968f9fc3b87007d95dfa58cce0a812c0d0f8964c4e64e5c8e070c189c9bbf2db770290e790afd8a09e03c562e8d9c8143b8a766ab840a13a19

        • C:\Users\Admin\AppData\Local\Temp\4815.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • C:\Users\Admin\AppData\Local\Temp\4815.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • C:\Users\Admin\AppData\Local\Temp\4815.exe
          Filesize

          857KB

          MD5

          e05e8f5d45e55c5d238f3b112b077ca1

          SHA1

          466203c2d920723eaa3cca76939ad37fd42320b5

          SHA256

          60d613e0e98945c023b210635a37142933823d9a06c16ab55676ea6051a93c30

          SHA512

          abdfeb3b886dd424029a129b36cf76826f795e37496dc215b6eb451b7837c9bd03641757f9784f151a31b50d35b8e656e4de3b362eb097f0882a58e8ea27b980

        • C:\Users\Admin\AppData\Local\Temp\5EBB.exe
          Filesize

          387KB

          MD5

          7232e9decef4097791ea75d1eb91bf4e

          SHA1

          509b0bf958aa1e4f55957c7bf76095ecfc8fe16a

          SHA256

          6f6dd67166668f9495e3d0ac6a431f63f45c9d931ddd65a8400a7aeb71f7fac4

          SHA512

          88e006c359b948a96c74cac13a90708c3494c6a4d07609a65fe4232f94e4e7a4a6feddffb3232f4b89ffac0ef20125c8eac7e4a3fc80a89ee8bffff4d5dffbb8

        • C:\Users\Admin\AppData\Local\Temp\5EBB.exe
          Filesize

          387KB

          MD5

          7232e9decef4097791ea75d1eb91bf4e

          SHA1

          509b0bf958aa1e4f55957c7bf76095ecfc8fe16a

          SHA256

          6f6dd67166668f9495e3d0ac6a431f63f45c9d931ddd65a8400a7aeb71f7fac4

          SHA512

          88e006c359b948a96c74cac13a90708c3494c6a4d07609a65fe4232f94e4e7a4a6feddffb3232f4b89ffac0ef20125c8eac7e4a3fc80a89ee8bffff4d5dffbb8

        • C:\Users\Admin\AppData\Local\Temp\76E7.exe
          Filesize

          1.6MB

          MD5

          df9cc49add3e01f23c63b0f73469f752

          SHA1

          6f8199ae9280e13671f5eb5715b093cd93f6732e

          SHA256

          b18d30fdfaa2f3469131da279fe2a64ed3cf6c1cbc8785ea1ba6e7596ae85419

          SHA512

          09100b76b4d0ba5a417da4a68977ed0a9eba8563cc5866e0cf912234ebded7598c482967e1812c143868c43c49eb882f82588dfafc041698b814c564decfc9b5

        • C:\Users\Admin\AppData\Local\Temp\76E7.exe
          Filesize

          1.6MB

          MD5

          df9cc49add3e01f23c63b0f73469f752

          SHA1

          6f8199ae9280e13671f5eb5715b093cd93f6732e

          SHA256

          b18d30fdfaa2f3469131da279fe2a64ed3cf6c1cbc8785ea1ba6e7596ae85419

          SHA512

          09100b76b4d0ba5a417da4a68977ed0a9eba8563cc5866e0cf912234ebded7598c482967e1812c143868c43c49eb882f82588dfafc041698b814c564decfc9b5

        • C:\Users\Admin\AppData\Roaming\bchdchh
          Filesize

          286KB

          MD5

          33026366c5d3c2b724836a7072173d26

          SHA1

          6938dd1c16c4bd5c1ddbf96d590f7fe9f480259b

          SHA256

          949338b881c13dffd583446046740257ec1e7a8a59092eae3a2fd88013d75cc3

          SHA512

          4ee3a5c9dacbce8dd10e953f9c18a6a060cf447db0608f19f2670b66ae746e8ceb77e76942727cf7f0cb74d851ae9e59357abba1decbaf61554086db4344a2c2

        • C:\Users\Admin\AppData\Roaming\bchdchh
          Filesize

          286KB

          MD5

          33026366c5d3c2b724836a7072173d26

          SHA1

          6938dd1c16c4bd5c1ddbf96d590f7fe9f480259b

          SHA256

          949338b881c13dffd583446046740257ec1e7a8a59092eae3a2fd88013d75cc3

          SHA512

          4ee3a5c9dacbce8dd10e953f9c18a6a060cf447db0608f19f2670b66ae746e8ceb77e76942727cf7f0cb74d851ae9e59357abba1decbaf61554086db4344a2c2

        • memory/432-139-0x0000000002470000-0x00000000024A6000-memory.dmp
          Filesize

          216KB

        • memory/432-140-0x0000000005050000-0x0000000005678000-memory.dmp
          Filesize

          6.2MB

        • memory/432-141-0x0000000004CC0000-0x0000000004CE2000-memory.dmp
          Filesize

          136KB

        • memory/432-143-0x0000000004EE0000-0x0000000004F46000-memory.dmp
          Filesize

          408KB

        • memory/432-142-0x0000000004E70000-0x0000000004ED6000-memory.dmp
          Filesize

          408KB

        • memory/432-144-0x0000000005E20000-0x0000000005E3E000-memory.dmp
          Filesize

          120KB

        • memory/432-138-0x0000000000000000-mapping.dmp
        • memory/432-148-0x0000000007670000-0x0000000007CEA000-memory.dmp
          Filesize

          6.5MB

        • memory/432-149-0x0000000004B30000-0x0000000004B4A000-memory.dmp
          Filesize

          104KB

        • memory/676-196-0x0000000005980000-0x0000000005A8A000-memory.dmp
          Filesize

          1.0MB

        • memory/676-191-0x0000000000000000-mapping.dmp
        • memory/676-192-0x0000000000400000-0x000000000041E000-memory.dmp
          Filesize

          120KB

        • memory/676-194-0x0000000005DD0000-0x00000000063E8000-memory.dmp
          Filesize

          6.1MB

        • memory/676-204-0x0000000007BF0000-0x000000000811C000-memory.dmp
          Filesize

          5.2MB

        • memory/676-203-0x00000000074F0000-0x00000000076B2000-memory.dmp
          Filesize

          1.8MB

        • memory/676-200-0x0000000006980000-0x000000000699E000-memory.dmp
          Filesize

          120KB

        • memory/676-199-0x0000000006860000-0x00000000068D6000-memory.dmp
          Filesize

          472KB

        • memory/676-195-0x0000000005850000-0x0000000005862000-memory.dmp
          Filesize

          72KB

        • memory/676-198-0x00000000069A0000-0x0000000006F44000-memory.dmp
          Filesize

          5.6MB

        • memory/676-197-0x00000000058B0000-0x00000000058EC000-memory.dmp
          Filesize

          240KB

        • memory/740-188-0x0000000000000000-mapping.dmp
        • memory/936-130-0x0000000000C9E000-0x0000000000CAE000-memory.dmp
          Filesize

          64KB

        • memory/936-133-0x0000000000400000-0x0000000000B3A000-memory.dmp
          Filesize

          7.2MB

        • memory/936-132-0x0000000000400000-0x0000000000B3A000-memory.dmp
          Filesize

          7.2MB

        • memory/936-131-0x0000000000C00000-0x0000000000C09000-memory.dmp
          Filesize

          36KB

        • memory/1036-187-0x0000000000000000-mapping.dmp
        • memory/1992-181-0x0000000000380000-0x000000000038C000-memory.dmp
          Filesize

          48KB

        • memory/1992-180-0x0000000000000000-mapping.dmp
        • memory/2516-190-0x0000000005DF0000-0x0000000005E82000-memory.dmp
          Filesize

          584KB

        • memory/2516-137-0x0000000000F10000-0x0000000000FEC000-memory.dmp
          Filesize

          880KB

        • memory/2516-134-0x0000000000000000-mapping.dmp
        • memory/3560-178-0x0000000000C70000-0x0000000000CE4000-memory.dmp
          Filesize

          464KB

        • memory/3560-177-0x0000000000000000-mapping.dmp
        • memory/3560-179-0x0000000000C00000-0x0000000000C6B000-memory.dmp
          Filesize

          428KB

        • memory/4068-201-0x0000000010290000-0x00000000103D5000-memory.dmp
          Filesize

          1.3MB

        • memory/4068-202-0x0000000010290000-0x00000000103D5000-memory.dmp
          Filesize

          1.3MB

        • memory/4068-182-0x0000000002CB2000-0x00000000030AB000-memory.dmp
          Filesize

          4.0MB

        • memory/4068-210-0x00000000030BF000-0x000000000320E000-memory.dmp
          Filesize

          1.3MB

        • memory/4068-174-0x0000000000000000-mapping.dmp
        • memory/4068-186-0x0000000002CB2000-0x00000000030AB000-memory.dmp
          Filesize

          4.0MB

        • memory/4068-183-0x00000000030BF000-0x000000000320E000-memory.dmp
          Filesize

          1.3MB

        • memory/4068-189-0x00000000030BF000-0x000000000320E000-memory.dmp
          Filesize

          1.3MB

        • memory/4628-145-0x0000000000000000-mapping.dmp
        • memory/4628-152-0x0000000000400000-0x000000000067D000-memory.dmp
          Filesize

          2.5MB

        • memory/4628-184-0x000000000077D000-0x00000000007AA000-memory.dmp
          Filesize

          180KB

        • memory/4628-150-0x000000000077D000-0x00000000007AA000-memory.dmp
          Filesize

          180KB

        • memory/4628-185-0x0000000000400000-0x000000000067D000-memory.dmp
          Filesize

          2.5MB

        • memory/4628-151-0x00000000023D0000-0x000000000241B000-memory.dmp
          Filesize

          300KB

        • memory/4628-153-0x0000000060900000-0x0000000060992000-memory.dmp
          Filesize

          584KB

        • memory/5060-206-0x0000000000000000-mapping.dmp
        • memory/5060-207-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/5060-209-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/5060-211-0x0000000006D90000-0x0000000006DE0000-memory.dmp
          Filesize

          320KB