Analysis

  • max time kernel
    144s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-12-2022 04:50

General

  • Target

    e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe

  • Size

    7.1MB

  • MD5

    51dae8d6208cc255aea7ad0eaba77014

  • SHA1

    dd949ae42f7bc491ac29d9d68b8d12379270bb1a

  • SHA256

    e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b

  • SHA512

    c3ab44e3e69e8baee8f215ab2297cab20d2fb9a56e375ae86e8e1102f7d43f683cee64bcd3bfcf59d60742bab80b371de3b18fd5519414787d1cf4eb2e992ed5

  • SSDEEP

    196608:F7nmjqCE8cpmmTVPuF2O8ET7pbO0yA7GO:F7nYRE8cQmTVP2vnl7L

Malware Config

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Extracted

Family

vidar

Version

56.1

Botnet

1569

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    1569

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • c:\windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2544
      • C:\Windows\SYSWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1912
      • C:\Windows\SYSWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Windows\SysWOW64\fontview.exe" & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 6
            4⤵
            • Delays execution with timeout.exe
            PID:4352
    • C:\Users\Admin\AppData\Local\Temp\e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe
      "C:\Users\Admin\AppData\Local\Temp\e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe"
        2⤵
        • Creates scheduled task(s)
        PID:3500
      • C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe
        "C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4168
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
          3⤵
            PID:4496
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
            3⤵
              PID:4420
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4960
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              3⤵
                PID:3752
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1
                3⤵
                • Runs ping.exe
                PID:3956

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Credential Access

          Credentials in Files

          2
          T1081

          Discovery

          System Information Discovery

          2
          T1082

          Query Registry

          1
          T1012

          Remote System Discovery

          1
          T1018

          Collection

          Data from Local System

          2
          T1005

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe
            Filesize

            777.1MB

            MD5

            d583b72bee5ae4b1ba5a0e1c964bdb13

            SHA1

            a09ae95c58ec47422e6acf15ca557c400da58f35

            SHA256

            a5429a9145dbc884b4aa06188634d21f064634b156abf3edc5f55e8db4a4e134

            SHA512

            56c0586445334fb9b3a14a196b0498bebbdccd4257a076fb513b5bd821211fadc663b07e939f0ec32567b6a912a3d8cd02cdd09d381f963b46f9e4a0cec3762f

          • C:\Users\Admin\Bel migomota yexiquiv tisax-newanax fab cegom\Bovawata quaj kokeley gacebe meda loy bogodime vexevi.exe
            Filesize

            777.1MB

            MD5

            d583b72bee5ae4b1ba5a0e1c964bdb13

            SHA1

            a09ae95c58ec47422e6acf15ca557c400da58f35

            SHA256

            a5429a9145dbc884b4aa06188634d21f064634b156abf3edc5f55e8db4a4e134

            SHA512

            56c0586445334fb9b3a14a196b0498bebbdccd4257a076fb513b5bd821211fadc663b07e939f0ec32567b6a912a3d8cd02cdd09d381f963b46f9e4a0cec3762f

          • \ProgramData\mozglue.dll
            Filesize

            133KB

            MD5

            8f73c08a9660691143661bf7332c3c27

            SHA1

            37fa65dd737c50fda710fdbde89e51374d0c204a

            SHA256

            3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

            SHA512

            0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

          • \ProgramData\nss3.dll
            Filesize

            1.2MB

            MD5

            bfac4e3c5908856ba17d41edcd455a51

            SHA1

            8eec7e888767aa9e4cca8ff246eb2aacb9170428

            SHA256

            e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

            SHA512

            2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

          • \Users\Admin\AppData\Local\Temp\advapi32.dll
            Filesize

            254KB

            MD5

            8529f3bbc40abfeb2dfc9f839ecefbab

            SHA1

            d6e538cea6d8a37da3d5d2c405711a692c8e1dcb

            SHA256

            ee87abe96eb5a35a6482e5db35c13327ea5ed37e4be35bdf51eb8d24745d7baf

            SHA512

            3af93662939cd97af798fb87a0e247acdcfdf09a624826f5eea0e163fd28b7247559df6f7d663f5ee41a719311cc08695051ff121211861558d6698b6e307553

          • memory/1324-566-0x0000000000000000-mapping.dmp
          • memory/1912-432-0x00000000072E0000-0x00000000078E6000-memory.dmp
            Filesize

            6.0MB

          • memory/1912-628-0x0000000007C40000-0x0000000007CD2000-memory.dmp
            Filesize

            584KB

          • memory/1912-639-0x0000000008CE0000-0x000000000920C000-memory.dmp
            Filesize

            5.2MB

          • memory/1912-617-0x0000000007F10000-0x000000000840E000-memory.dmp
            Filesize

            5.0MB

          • memory/1912-620-0x0000000007AE0000-0x0000000007B46000-memory.dmp
            Filesize

            408KB

          • memory/1912-638-0x00000000085E0000-0x00000000087A2000-memory.dmp
            Filesize

            1.8MB

          • memory/1912-366-0x0000000000000000-mapping.dmp
          • memory/1912-410-0x0000000000870000-0x0000000000894000-memory.dmp
            Filesize

            144KB

          • memory/1912-441-0x0000000006D50000-0x0000000006D9B000-memory.dmp
            Filesize

            300KB

          • memory/1912-438-0x0000000006D10000-0x0000000006D4E000-memory.dmp
            Filesize

            248KB

          • memory/1912-436-0x0000000006C70000-0x0000000006C82000-memory.dmp
            Filesize

            72KB

          • memory/1912-434-0x0000000006DE0000-0x0000000006EEA000-memory.dmp
            Filesize

            1.0MB

          • memory/1912-421-0x0000000006B00000-0x0000000006B56000-memory.dmp
            Filesize

            344KB

          • memory/2220-444-0x0000000000000000-mapping.dmp
          • memory/2220-568-0x0000000000880000-0x00000000008E0000-memory.dmp
            Filesize

            384KB

          • memory/2220-519-0x0000000000880000-0x00000000008E0000-memory.dmp
            Filesize

            384KB

          • memory/3500-183-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/3500-185-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/3500-186-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/3500-184-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/3500-182-0x0000000000000000-mapping.dmp
          • memory/3752-238-0x0000000000000000-mapping.dmp
          • memory/3956-250-0x0000000000000000-mapping.dmp
          • memory/4168-202-0x0000000000000000-mapping.dmp
          • memory/4168-243-0x0000000000400000-0x0000000000D33000-memory.dmp
            Filesize

            9.2MB

          • memory/4168-256-0x0000000002B70000-0x0000000002C70000-memory.dmp
            Filesize

            1024KB

          • memory/4168-300-0x000000000FA50000-0x000000000FAD0000-memory.dmp
            Filesize

            512KB

          • memory/4168-351-0x0000000000400000-0x0000000000D33000-memory.dmp
            Filesize

            9.2MB

          • memory/4168-360-0x0000000002B70000-0x0000000002C70000-memory.dmp
            Filesize

            1024KB

          • memory/4168-451-0x0000000000400000-0x0000000000D33000-memory.dmp
            Filesize

            9.2MB

          • memory/4168-393-0x000000000FA50000-0x000000000FAD0000-memory.dmp
            Filesize

            512KB

          • memory/4352-573-0x0000000000000000-mapping.dmp
          • memory/4420-361-0x0000000000400000-0x0000000000407000-memory.dmp
            Filesize

            28KB

          • memory/4528-146-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-231-0x0000000000400000-0x0000000000D33000-memory.dmp
            Filesize

            9.2MB

          • memory/4528-161-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-163-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-162-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-164-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-165-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-166-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-167-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-169-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-170-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-168-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-171-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-172-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-173-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-174-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-175-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-176-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-177-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-178-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-179-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-181-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-159-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-158-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-157-0x0000000002D60000-0x0000000002E58000-memory.dmp
            Filesize

            992KB

          • memory/4528-147-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-156-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-180-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-197-0x0000000000400000-0x0000000000D33000-memory.dmp
            Filesize

            9.2MB

          • memory/4528-198-0x0000000002D60000-0x0000000002E58000-memory.dmp
            Filesize

            992KB

          • memory/4528-151-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-153-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-155-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-121-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-160-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-154-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-152-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-150-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-149-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-148-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-120-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-145-0x0000000000400000-0x0000000000D33000-memory.dmp
            Filesize

            9.2MB

          • memory/4528-144-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-143-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-142-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-141-0x0000000000400000-0x0000000000D33000-memory.dmp
            Filesize

            9.2MB

          • memory/4528-140-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-139-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-138-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-135-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-137-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-136-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-134-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-133-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-132-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-131-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-130-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-129-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-128-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-127-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-126-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-125-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-124-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-123-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4528-122-0x0000000077530000-0x00000000776BE000-memory.dmp
            Filesize

            1.6MB

          • memory/4960-227-0x0000000000000000-mapping.dmp