Analysis

  • max time kernel
    113s
  • max time network
    117s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-12-2022 00:23

General

  • Target

    7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe

  • Size

    1.3MB

  • MD5

    74079c12b9f2aac6e8c6589d02a61bae

  • SHA1

    f3ee1c95814a8bb9f4924219820e84c8b63928b1

  • SHA256

    7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d

  • SHA512

    90a11fd92bab604b2d86a7b0b84b15dc60b68fc8979434930e86e3e7f57eea436ae21f5685ddf8ba9f3f3847ec397340015f32de314f7993e39dcd9b0a7d9e9c

  • SSDEEP

    24576:ZmMuVE/AnaKAHh6akEKtkZf/UUsdAIAtJmzbN9RpMm/fi+oaWuBX/5:ZmMuGJ6nEKqJJxIoJmt97tfi+oa5Bv5

Malware Config

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • c:\windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2740
      • C:\Windows\SYSWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4720
    • C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe
      "C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"
        2⤵
        • Creates scheduled task(s)
        PID:3472
      • C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe
        "C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
          3⤵
            PID:4184
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            3⤵
              PID:4172
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              3⤵
              • Runs ping.exe
              PID:1740

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe

          Filesize

          392.1MB

          MD5

          476bc4d270eb670250b48058132e7e7a

          SHA1

          321b54483af896d6a94c81fecd028190e5082c7f

          SHA256

          85813cda2dc2ffca87c799b2c597505a589a0ae491fd787d42be8211950094d8

          SHA512

          922d6bc909e0460330d3594fb7ab331d55f38c190f4a83e4adb7218c7b586588b841436b6d73429dd4fd5bdf149301327cd2e72639427316777e3913ecddb6ea

        • C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe

          Filesize

          394.8MB

          MD5

          5bb9cf9a5aa42d8a36904dba846bbebb

          SHA1

          63d835b8f6a9da64da620e777b19d8a132cc131e

          SHA256

          6cd05781c1f59dbcb7d2307c5ef0e332d6d5dd95a88f26803aca95ea9427e96f

          SHA512

          469ac12c1cb6c7a8d9c8df2e5293c1b7bd3746aeedfe8bc89b49753aad2570ebe983a161cae6b6468688a551cd908e51c696e6138568750a1b2bf310d1cc9582

        • \Users\Admin\AppData\Local\Temp\advapi32.dll

          Filesize

          304KB

          MD5

          40500eb5ce5d6015d92fbda138540c1a

          SHA1

          4bcdc8d290f0be2df32ae925f5177eb9d7992df9

          SHA256

          3fa29f500c22b6b9cc87cce9cd11d002dc313fbd597761527a8c325373840a24

          SHA512

          d5ad7e44d6b5b182ee4f1d29d7cf6d105e5d6a2267472b160071f03ab3de7d23a49859ff0620b575ca71250d28ee5a3d028b301b5fdd8c765ce3c019e54ea84a

        • memory/1376-193-0x0000000000000000-mapping.dmp

        • memory/1376-291-0x00000000148D0000-0x0000000014963000-memory.dmp

          Filesize

          588KB

        • memory/1376-281-0x0000000006D80000-0x0000000006E7F000-memory.dmp

          Filesize

          1020KB

        • memory/1740-239-0x0000000000000000-mapping.dmp

        • memory/2172-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-141-0x0000000000F70000-0x000000000107A000-memory.dmp

          Filesize

          1.0MB

        • memory/2172-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-149-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-153-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-155-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-154-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-156-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-158-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-161-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-160-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-159-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-163-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-157-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-175-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-178-0x0000000000F70000-0x000000000107A000-memory.dmp

          Filesize

          1.0MB

        • memory/2172-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/2172-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/3020-201-0x0000000000000000-mapping.dmp

        • memory/3472-183-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/3472-185-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/3472-184-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/3472-182-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/3472-181-0x0000000000000000-mapping.dmp

        • memory/3472-186-0x00000000779B0000-0x0000000077B3E000-memory.dmp

          Filesize

          1.6MB

        • memory/4172-231-0x0000000000000000-mapping.dmp

        • memory/4184-348-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/4720-720-0x0000000009450000-0x000000000997C000-memory.dmp

          Filesize

          5.2MB

        • memory/4720-407-0x00000000072A0000-0x00000000072F8000-memory.dmp

          Filesize

          352KB

        • memory/4720-352-0x0000000000000000-mapping.dmp

        • memory/4720-418-0x0000000007930000-0x0000000007F36000-memory.dmp

          Filesize

          6.0MB

        • memory/4720-420-0x00000000074C0000-0x00000000075CA000-memory.dmp

          Filesize

          1.0MB

        • memory/4720-422-0x00000000073F0000-0x0000000007402000-memory.dmp

          Filesize

          72KB

        • memory/4720-424-0x0000000007450000-0x000000000748E000-memory.dmp

          Filesize

          248KB

        • memory/4720-426-0x00000000075D0000-0x000000000761B000-memory.dmp

          Filesize

          300KB

        • memory/4720-456-0x0000000008680000-0x0000000008B7E000-memory.dmp

          Filesize

          5.0MB

        • memory/4720-459-0x0000000008250000-0x00000000082B6000-memory.dmp

          Filesize

          408KB

        • memory/4720-467-0x00000000083B0000-0x0000000008442000-memory.dmp

          Filesize

          584KB

        • memory/4720-719-0x0000000008D50000-0x0000000008F12000-memory.dmp

          Filesize

          1.8MB

        • memory/4720-400-0x0000000003000000-0x000000000302B000-memory.dmp

          Filesize

          172KB