Analysis
-
max time kernel
113s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03-12-2022 00:23
Static task
static1
Behavioral task
behavioral1
Sample
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe
Resource
win10-20220901-en
General
-
Target
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe
-
Size
1.3MB
-
MD5
74079c12b9f2aac6e8c6589d02a61bae
-
SHA1
f3ee1c95814a8bb9f4924219820e84c8b63928b1
-
SHA256
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d
-
SHA512
90a11fd92bab604b2d86a7b0b84b15dc60b68fc8979434930e86e3e7f57eea436ae21f5685ddf8ba9f3f3847ec397340015f32de314f7993e39dcd9b0a7d9e9c
-
SSDEEP
24576:ZmMuVE/AnaKAHh6akEKtkZf/UUsdAIAtJmzbN9RpMm/fi+oaWuBX/5:ZmMuGJ6nEKqJJxIoJmt97tfi+oa5Bv5
Malware Config
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4720-407-0x00000000072A0000-0x00000000072F8000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exedescription pid process target process PID 1376 created 2740 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe taskhostw.exe -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/4720-407-0x00000000072A0000-0x00000000072F8000-memory.dmp net_reactor -
Executes dropped EXE 1 IoCs
Processes:
Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exepid process 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe -
Loads dropped DLL 1 IoCs
Processes:
Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exepid process 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exedescription pid process target process PID 1376 set thread context of 4184 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe ngentask.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exeXigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exefontview.exepid process 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 4720 fontview.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fontview.exedescription pid process Token: SeDebugPrivilege 4720 fontview.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.execmd.exeXigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exedescription pid process target process PID 2172 wrote to memory of 3472 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe schtasks.exe PID 2172 wrote to memory of 3472 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe schtasks.exe PID 2172 wrote to memory of 3472 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe schtasks.exe PID 2172 wrote to memory of 1376 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe PID 2172 wrote to memory of 1376 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe PID 2172 wrote to memory of 1376 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe PID 2172 wrote to memory of 3020 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe cmd.exe PID 2172 wrote to memory of 3020 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe cmd.exe PID 2172 wrote to memory of 3020 2172 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe cmd.exe PID 3020 wrote to memory of 4172 3020 cmd.exe chcp.com PID 3020 wrote to memory of 4172 3020 cmd.exe chcp.com PID 3020 wrote to memory of 4172 3020 cmd.exe chcp.com PID 3020 wrote to memory of 1740 3020 cmd.exe PING.EXE PID 3020 wrote to memory of 1740 3020 cmd.exe PING.EXE PID 3020 wrote to memory of 1740 3020 cmd.exe PING.EXE PID 1376 wrote to memory of 4184 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe ngentask.exe PID 1376 wrote to memory of 4184 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe ngentask.exe PID 1376 wrote to memory of 4184 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe ngentask.exe PID 1376 wrote to memory of 4184 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe ngentask.exe PID 1376 wrote to memory of 4184 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe ngentask.exe PID 1376 wrote to memory of 4720 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe fontview.exe PID 1376 wrote to memory of 4720 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe fontview.exe PID 1376 wrote to memory of 4720 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe fontview.exe PID 1376 wrote to memory of 4720 1376 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe fontview.exe
Processes
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2740
-
C:\Windows\SYSWOW64\fontview.exe"C:\Windows\SYSWOW64\fontview.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"2⤵
- Creates scheduled task(s)
PID:3472 -
C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"3⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:4172
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392.1MB
MD5476bc4d270eb670250b48058132e7e7a
SHA1321b54483af896d6a94c81fecd028190e5082c7f
SHA25685813cda2dc2ffca87c799b2c597505a589a0ae491fd787d42be8211950094d8
SHA512922d6bc909e0460330d3594fb7ab331d55f38c190f4a83e4adb7218c7b586588b841436b6d73429dd4fd5bdf149301327cd2e72639427316777e3913ecddb6ea
-
Filesize
394.8MB
MD55bb9cf9a5aa42d8a36904dba846bbebb
SHA163d835b8f6a9da64da620e777b19d8a132cc131e
SHA2566cd05781c1f59dbcb7d2307c5ef0e332d6d5dd95a88f26803aca95ea9427e96f
SHA512469ac12c1cb6c7a8d9c8df2e5293c1b7bd3746aeedfe8bc89b49753aad2570ebe983a161cae6b6468688a551cd908e51c696e6138568750a1b2bf310d1cc9582
-
Filesize
304KB
MD540500eb5ce5d6015d92fbda138540c1a
SHA14bcdc8d290f0be2df32ae925f5177eb9d7992df9
SHA2563fa29f500c22b6b9cc87cce9cd11d002dc313fbd597761527a8c325373840a24
SHA512d5ad7e44d6b5b182ee4f1d29d7cf6d105e5d6a2267472b160071f03ab3de7d23a49859ff0620b575ca71250d28ee5a3d028b301b5fdd8c765ce3c019e54ea84a