Analysis

  • max time kernel
    137s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2022 20:10

General

  • Target

    tmp.exe

  • Size

    18.4MB

  • MD5

    464502cbaae7b9ed1cd6da844d38ba86

  • SHA1

    30dd42539cbfad04564f9db45ca40f2b9e81546c

  • SHA256

    6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4

  • SHA512

    e74b45702eeaca95bc6c9f2aeea8a5958a425dc1f45ecfb127e286a39eb668243b41e56c705ae5fe7a72ff1ab691948adf29ddd6de18509421fa415647a36b59

  • SSDEEP

    98304:2pgc9WBd2/ojIbrK51bnqvMwqwWhWznbdyxDDFC4B14d+iXLfg0rf2a33OXA7zTg:2pgnBkbYEMUWIzbdyxDDFCXpZU

Malware Config

Extracted

Family

redline

Botnet

@NoxyCloud

C2

85.192.63.57:34210

Attributes
  • auth_value

    20dc074852db65a2b74addf964cf576e

Extracted

Family

arrowrat

Botnet

Client

C2

213.239.219.58:1337

Mutex

nPxRArUjc

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice.pdf"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:428
      • C:\Users\Admin\AppData\Local\Temp\MRH.exe
        "C:\Users\Admin\AppData\Local\Temp\MRH.exe" 0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe"
          4⤵
          • Creates scheduled task(s)
          PID:628
        • C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe
          "C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe" 0
          4⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
            5⤵
              PID:524
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\MRH.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:796
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1
                5⤵
                • Runs ping.exe
                PID:1608
          • C:\Users\Admin\AppData\Local\Temp\ROR.exe
            "C:\Users\Admin\AppData\Local\Temp\ROR.exe" 0
            3⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              4⤵
                PID:1168

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

          Filesize

          717B

          MD5

          ec8ff3b1ded0246437b1472c69dd1811

          SHA1

          d813e874c2524e3a7da6c466c67854ad16800326

          SHA256

          e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

          SHA512

          e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          3dcf580a93972319e82cafbc047d34d5

          SHA1

          8528d2a1363e5de77dc3b1142850e51ead0f4b6b

          SHA256

          40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

          SHA512

          98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

          Filesize

          192B

          MD5

          f61d82dff4f5537c07d1ab0e3e5a9326

          SHA1

          aa86dca11472c8375405eb733c47123141a3abff

          SHA256

          ac22fe213d3e0399754d4bdfe99951e811475e10cf5bd68adfae0c2b01ae59a6

          SHA512

          d41293bc10f5612f1471076075cec1c38b299a9e3aacfb74b41d2824e488f987c16e08a0521c5f3cd02d4a7e68cdbabef203ce29c31e71647b38cd3fb527df73

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          373684876baeaa01e07c1bfd09a8fc53

          SHA1

          433dae463c3c4d9935b26b43b98e86ef327de33e

          SHA256

          84779df3d7f182b77cff9b0edc93cd3aa62fe1ce312b7572f1d7b2d66ebb372a

          SHA512

          73da6b740802740be21e72d91d41b755ac71f118b26670c83f65b37b69c4974ed695c276aa6e8988369be9131db550a21f25b880a4526917d41ab12bfbe57cfd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4283ab8fdc7a53a836e4003d9a4b526f

          SHA1

          8d38c568ad21d17f861acb3b56122399b4555c22

          SHA256

          15517c3eb29aa247fc1e34baac23e5fb07047598dcd303965783898e977e1c44

          SHA512

          e47faf79ff00a065932637ba3fd337ab96418f7fdbe3329a6d90dc64620550a1ff86629b5e18cfbc6eb3474ee98a9393c463bfa6922b373dd416ded1516876ab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          f1420143e8759e6371ec84a60385a9cc

          SHA1

          62fca6db5248b2fb483ab10eedcf7509f730f9f6

          SHA256

          6ef292bb63428c68d82b0c910fb14ee7f1759d3e7bf6b2075b083e171244e326

          SHA512

          6b2a49154dc230ee9d2a44b6ca32409d286f0b51025ca0d84d93ae01b8ba797549d912a843ceece631776f3d77404ee2443259736d555f9b16b8c6d7d2901e3c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6ORS647J\library[1].bin

          Filesize

          259KB

          MD5

          94aafe6b249b7f529f9d66a6f7d0b80e

          SHA1

          a83eee4aa9c936a8e423c4b2b7d2b1036a9a0c44

          SHA256

          41c631caa7c9e95166917bec39627c488400d180622e4b2bb3a3629732692b54

          SHA512

          e94befd6c2462bbab13e0e66569c78d34d075f15a9923713f9e72bbd7f791103ef20161b7f830a9ad1f2745ccd9e60bbbe7540f87c025d3be4b0dba3d546d5cb

        • C:\Users\Admin\AppData\Local\Temp\Invoice.pdf

          Filesize

          163KB

          MD5

          5441d36f8dcfdd31e75562b380bea7a8

          SHA1

          70053ce7491743efacaa4b40f452efb3f32df4e8

          SHA256

          58098a6f25d3fb423b49a97cf917a406c5841d7ac792ef04ecb9646f5629baf3

          SHA512

          06a19ace54e2ccb25faaba3dce7a4b72010d1002efbd5d3e1cab1f23493dd8ada55803e9cd695a79c6030204224a84c5192b334b2e8c1007713e1f472f645bbe

        • C:\Users\Admin\AppData\Local\Temp\MRH.exe

          Filesize

          1.9MB

          MD5

          18585735c8866b21e2723a6f020bafd0

          SHA1

          afb5b2c9d5ca57501835b0c56fd97b0641f01d88

          SHA256

          e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

          SHA512

          88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

        • C:\Users\Admin\AppData\Local\Temp\MRH.exe

          Filesize

          1.9MB

          MD5

          18585735c8866b21e2723a6f020bafd0

          SHA1

          afb5b2c9d5ca57501835b0c56fd97b0641f01d88

          SHA256

          e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

          SHA512

          88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

        • C:\Users\Admin\AppData\Local\Temp\ROR.exe

          Filesize

          1.7MB

          MD5

          85ea4565608d2f6c35decb6ed8547749

          SHA1

          e15ae6c93c9e998b030609fdf4b3274925694229

          SHA256

          f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

          SHA512

          762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

        • C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe

          Filesize

          327.4MB

          MD5

          14f135012326d5feefbfd4f3f482ff05

          SHA1

          a8e14e6d2c940e1e81e4b6fa0a8b6923653ade1a

          SHA256

          5fb31e9453379d9b888b27db31527a53791b376436a62541bf3db67c79c46010

          SHA512

          aeef35b1a8ec472e374803d9692a185773f99f7163f72478aa276e7df04cb7d11a5c5140375c09f1aa8fd983e302e5f5fd53d50d6d8ae2003eaa6e445b81b7fa

        • \Users\Admin\AppData\Local\Temp\MRH.exe

          Filesize

          1.9MB

          MD5

          18585735c8866b21e2723a6f020bafd0

          SHA1

          afb5b2c9d5ca57501835b0c56fd97b0641f01d88

          SHA256

          e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

          SHA512

          88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

        • \Users\Admin\AppData\Local\Temp\MRH.exe

          Filesize

          1.9MB

          MD5

          18585735c8866b21e2723a6f020bafd0

          SHA1

          afb5b2c9d5ca57501835b0c56fd97b0641f01d88

          SHA256

          e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

          SHA512

          88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

        • \Users\Admin\AppData\Local\Temp\ROR.exe

          Filesize

          1.7MB

          MD5

          85ea4565608d2f6c35decb6ed8547749

          SHA1

          e15ae6c93c9e998b030609fdf4b3274925694229

          SHA256

          f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

          SHA512

          762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

        • \Users\Admin\AppData\Local\Temp\ROR.exe

          Filesize

          1.7MB

          MD5

          85ea4565608d2f6c35decb6ed8547749

          SHA1

          e15ae6c93c9e998b030609fdf4b3274925694229

          SHA256

          f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69

          SHA512

          762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5

        • \Users\Admin\AppData\Local\Temp\advapi32.dll

          Filesize

          262KB

          MD5

          1b51fec95f5403305749c4bcb3485b14

          SHA1

          f4974196213a94911c850504924f38cd9e7fe889

          SHA256

          3c0d3f9a776c503eca4e0a014006fe1a8f53e5e22138f6add9e45ad0fbf8844e

          SHA512

          6e8aa862cb2d95fe67c212de2ee59f903a3de6e16bdd87918e31bc2d7de9a1bdd61f756f1bdf35aa41c7e3620650b9ad9bbaa65487d7152fdf7420767a91e90d

        • \Users\Admin\AppData\Local\Temp\advapi32.exe

          Filesize

          262KB

          MD5

          1b51fec95f5403305749c4bcb3485b14

          SHA1

          f4974196213a94911c850504924f38cd9e7fe889

          SHA256

          3c0d3f9a776c503eca4e0a014006fe1a8f53e5e22138f6add9e45ad0fbf8844e

          SHA512

          6e8aa862cb2d95fe67c212de2ee59f903a3de6e16bdd87918e31bc2d7de9a1bdd61f756f1bdf35aa41c7e3620650b9ad9bbaa65487d7152fdf7420767a91e90d

        • \Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe

          Filesize

          325.6MB

          MD5

          709d063e450893257f8efa3359a8a839

          SHA1

          f932fe6c749030847e9989315c0cf7c7e26b5483

          SHA256

          169a7e81002b5585e6d7b477a59d28264e019e144560dd567d967b8e27c3a657

          SHA512

          2d0abd04d71140c22a1d17833f4ad13e6a3abe25b6a958c73dc21b9ee2d05fae4a344662df0501f328b2d683788602f4f0d2463a43e45a7d5ec7d79f57b7c638

        • \Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe

          Filesize

          326.0MB

          MD5

          02c72af481eec111240ab54501fbcf88

          SHA1

          26f7d76ecedf11a22e8907c9458ede14480e8298

          SHA256

          c88cd082599b118a5602c45c97ed873338d5534a8a15646969bb1594fca10289

          SHA512

          75efbed9cb91cdf44ae67e86eff3bff40f34a7774963677763734d08302d45bc92a3c4222e9c85a2b94de667a2299533bc9f7ff04aede2fe8fae5a85090bc3fb

        • memory/524-128-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/524-124-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/524-131-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1016-94-0x00000000025E0000-0x0000000002ED5000-memory.dmp

          Filesize

          9.0MB

        • memory/1016-110-0x000000000F240000-0x000000000F42F000-memory.dmp

          Filesize

          1.9MB

        • memory/1016-96-0x0000000000930000-0x0000000000AF7000-memory.dmp

          Filesize

          1.8MB

        • memory/1016-123-0x000000000F240000-0x000000000F42F000-memory.dmp

          Filesize

          1.9MB

        • memory/1016-89-0x00000000025E0000-0x0000000002ED5000-memory.dmp

          Filesize

          9.0MB

        • memory/1016-95-0x0000000000930000-0x0000000000AF7000-memory.dmp

          Filesize

          1.8MB

        • memory/1016-112-0x0000000000930000-0x0000000000AF7000-memory.dmp

          Filesize

          1.8MB

        • memory/1016-108-0x00000000025E0000-0x0000000002ED5000-memory.dmp

          Filesize

          9.0MB

        • memory/1016-137-0x0000000000930000-0x0000000000AF7000-memory.dmp

          Filesize

          1.8MB

        • memory/1168-134-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1168-126-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1168-130-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1168-138-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1628-54-0x0000000000E40000-0x00000000020AA000-memory.dmp

          Filesize

          18.4MB

        • memory/1628-55-0x000000001C350000-0x000000001C4E0000-memory.dmp

          Filesize

          1.6MB

        • memory/1668-76-0x00000000008B0000-0x00000000011A5000-memory.dmp

          Filesize

          9.0MB

        • memory/1668-83-0x00000000008B0000-0x00000000011A5000-memory.dmp

          Filesize

          9.0MB

        • memory/1668-77-0x00000000008B0000-0x00000000011A5000-memory.dmp

          Filesize

          9.0MB

        • memory/1668-91-0x00000000027F0000-0x00000000029B7000-memory.dmp

          Filesize

          1.8MB

        • memory/1668-78-0x00000000027F0000-0x00000000029B7000-memory.dmp

          Filesize

          1.8MB

        • memory/1668-84-0x00000000027F0000-0x00000000029B7000-memory.dmp

          Filesize

          1.8MB

        • memory/1668-81-0x00000000027F0000-0x00000000029B7000-memory.dmp

          Filesize

          1.8MB

        • memory/1968-120-0x0000000001E80000-0x000000000261D000-memory.dmp

          Filesize

          7.6MB

        • memory/1968-114-0x0000000002620000-0x00000000027A1000-memory.dmp

          Filesize

          1.5MB

        • memory/1968-113-0x0000000002620000-0x00000000027A1000-memory.dmp

          Filesize

          1.5MB

        • memory/1968-111-0x0000000001E80000-0x000000000261D000-memory.dmp

          Filesize

          7.6MB

        • memory/1968-107-0x0000000001E80000-0x000000000261D000-memory.dmp

          Filesize

          7.6MB

        • memory/1968-133-0x0000000002620000-0x00000000027A1000-memory.dmp

          Filesize

          1.5MB

        • memory/1968-122-0x000000000DE90000-0x000000000E004000-memory.dmp

          Filesize

          1.5MB

        • memory/2044-67-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2044-71-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2044-66-0x0000000075ED1000-0x0000000075ED3000-memory.dmp

          Filesize

          8KB

        • memory/2044-63-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2044-106-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2044-60-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2044-59-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2044-57-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/2044-56-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB