Analysis

  • max time kernel
    181s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 16:38

General

  • Target

    be9695fa887849fc75b8962b036c96f235fd2ac0bc35518eb7f373d1c33d0fa1.exe

  • Size

    375KB

  • MD5

    88e7660b4aeafcaefc324b7a34da5c27

  • SHA1

    44ad99397d6a4d1f7b2a67458ee7a1859a63416f

  • SHA256

    be9695fa887849fc75b8962b036c96f235fd2ac0bc35518eb7f373d1c33d0fa1

  • SHA512

    c0a12fcd3d359c6f25007db21d7cef542bd70953b10afa7d3d91868e95db786193bcbc812e7ba914a53e617c6071d58fbc5a0e10fb6be15bf3659754c4f41e50

  • SSDEEP

    6144:mbi1uZNobLHMULBcrwWlQYtxTs5eLx9WcoBlCFULLfOaV:mbdZmbLMU9uYQIEucWCFazO

Malware Config

Extracted

Family

vidar

Version

56.1

Botnet

1148

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    1148

Extracted

Family

redline

Botnet

YT

C2

65.21.5.58:48811

Attributes
  • auth_value

    fb878dde7f3b4ad1e1bc26d24db36d28

Signatures

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Uses the VBS compiler for execution 1 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 5 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be9695fa887849fc75b8962b036c96f235fd2ac0bc35518eb7f373d1c33d0fa1.exe
    "C:\Users\Admin\AppData\Local\Temp\be9695fa887849fc75b8962b036c96f235fd2ac0bc35518eb7f373d1c33d0fa1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1464
  • C:\Users\Admin\AppData\Local\Temp\6116.exe
    C:\Users\Admin\AppData\Local\Temp\6116.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\6116.exe
      "C:\Users\Admin\AppData\Local\Temp\6116.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4924
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 300
      2⤵
      • Program crash
      PID:3508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1792 -ip 1792
    1⤵
      PID:4968
    • C:\Users\Admin\AppData\Local\Temp\6686.exe
      C:\Users\Admin\AppData\Local\Temp\6686.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
          PID:4532
      • C:\Users\Admin\AppData\Local\Temp\689A.exe
        C:\Users\Admin\AppData\Local\Temp\689A.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          2⤵
            PID:4256
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 508
            2⤵
            • Program crash
            PID:2988
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:3208
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:3572
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:4348
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:4408
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:2580
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:3872
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3972
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:4040
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:3888
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1492 -ip 1492
                            1⤵
                              PID:316

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Execution

                            Scripting

                            1
                            T1064

                            Defense Evasion

                            Virtualization/Sandbox Evasion

                            1
                            T1497

                            Scripting

                            1
                            T1064

                            Discovery

                            Query Registry

                            3
                            T1012

                            Virtualization/Sandbox Evasion

                            1
                            T1497

                            System Information Discovery

                            3
                            T1082

                            Peripheral Device Discovery

                            1
                            T1120

                            Command and Control

                            Web Service

                            1
                            T1102

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\nss3.dll
                              Filesize

                              1.2MB

                              MD5

                              bfac4e3c5908856ba17d41edcd455a51

                              SHA1

                              8eec7e888767aa9e4cca8ff246eb2aacb9170428

                              SHA256

                              e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                              SHA512

                              2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                            • C:\Users\Admin\AppData\Local\Temp\6116.exe
                              Filesize

                              2.8MB

                              MD5

                              0fd3c8d453f4ced35d4fa84cf66ae24d

                              SHA1

                              a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                              SHA256

                              2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                              SHA512

                              ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                            • C:\Users\Admin\AppData\Local\Temp\6116.exe
                              Filesize

                              2.8MB

                              MD5

                              0fd3c8d453f4ced35d4fa84cf66ae24d

                              SHA1

                              a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                              SHA256

                              2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                              SHA512

                              ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                            • C:\Users\Admin\AppData\Local\Temp\6116.exe
                              Filesize

                              2.8MB

                              MD5

                              0fd3c8d453f4ced35d4fa84cf66ae24d

                              SHA1

                              a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                              SHA256

                              2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                              SHA512

                              ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                            • C:\Users\Admin\AppData\Local\Temp\6686.exe
                              Filesize

                              1.5MB

                              MD5

                              d1964c1b30d01262eccaee06c600d726

                              SHA1

                              e213ef1a963cc1825b9183742bb2af555da72efe

                              SHA256

                              06ece311c226daf62863e5791def4efee02dacfeacc6b7635095d0a63b715a99

                              SHA512

                              02d5f5d71ef785dbc9a2c7bf960d60a19a7eeba3ae8227442c21ba153fc2443e0d1e5ec8319e70a55defcb1057f43d4f41602ba2089a64615dc3aaa8569d47a5

                            • C:\Users\Admin\AppData\Local\Temp\6686.exe
                              Filesize

                              1.5MB

                              MD5

                              d1964c1b30d01262eccaee06c600d726

                              SHA1

                              e213ef1a963cc1825b9183742bb2af555da72efe

                              SHA256

                              06ece311c226daf62863e5791def4efee02dacfeacc6b7635095d0a63b715a99

                              SHA512

                              02d5f5d71ef785dbc9a2c7bf960d60a19a7eeba3ae8227442c21ba153fc2443e0d1e5ec8319e70a55defcb1057f43d4f41602ba2089a64615dc3aaa8569d47a5

                            • C:\Users\Admin\AppData\Local\Temp\689A.exe
                              Filesize

                              510KB

                              MD5

                              2c7867a1749edef10274f3e34b047865

                              SHA1

                              c2009f052e54f3c788e1872e7ac6f4d5fea218f9

                              SHA256

                              8845215ed3299ff3381580ab3c1e1feb69d8c44361bc15d64b57a597147a74c7

                              SHA512

                              60b503650f7f4ca7d14cfa7dabc1cda68eee8f0e34800fb160f44b3af9135bf27b15c57e26f19301baa1eb4eb6a6191cfa70d8ca28361db71969f7c0c3435e68

                            • C:\Users\Admin\AppData\Local\Temp\689A.exe
                              Filesize

                              510KB

                              MD5

                              2c7867a1749edef10274f3e34b047865

                              SHA1

                              c2009f052e54f3c788e1872e7ac6f4d5fea218f9

                              SHA256

                              8845215ed3299ff3381580ab3c1e1feb69d8c44361bc15d64b57a597147a74c7

                              SHA512

                              60b503650f7f4ca7d14cfa7dabc1cda68eee8f0e34800fb160f44b3af9135bf27b15c57e26f19301baa1eb4eb6a6191cfa70d8ca28361db71969f7c0c3435e68

                            • memory/1464-132-0x00000000007A2000-0x00000000007B7000-memory.dmp
                              Filesize

                              84KB

                            • memory/1464-135-0x0000000000400000-0x0000000000463000-memory.dmp
                              Filesize

                              396KB

                            • memory/1464-134-0x0000000000400000-0x0000000000463000-memory.dmp
                              Filesize

                              396KB

                            • memory/1464-133-0x00000000001F0000-0x00000000001F9000-memory.dmp
                              Filesize

                              36KB

                            • memory/1492-179-0x0000000000000000-mapping.dmp
                            • memory/1792-160-0x0000000000000000-mapping.dmp
                            • memory/2580-197-0x0000000000880000-0x00000000008A2000-memory.dmp
                              Filesize

                              136KB

                            • memory/2580-196-0x0000000000850000-0x0000000000877000-memory.dmp
                              Filesize

                              156KB

                            • memory/2580-193-0x0000000000000000-mapping.dmp
                            • memory/2580-219-0x0000000000880000-0x00000000008A2000-memory.dmp
                              Filesize

                              136KB

                            • memory/3040-155-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-214-0x00000000013A0000-0x00000000013B0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-152-0x0000000003760000-0x0000000003770000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-153-0x0000000003770000-0x0000000003780000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-154-0x00000000013A0000-0x00000000013B0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-150-0x0000000002E50000-0x0000000002E60000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-156-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-157-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-158-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-159-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-149-0x0000000003770000-0x0000000003780000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-164-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-161-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-148-0x0000000003760000-0x0000000003770000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-165-0x00000000033C0000-0x00000000033D0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-136-0x00000000013A0000-0x00000000013B0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-147-0x0000000003760000-0x0000000003770000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-137-0x0000000002E50000-0x0000000002E60000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-216-0x00000000093D0000-0x00000000093E0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-146-0x0000000002E50000-0x0000000002E60000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-215-0x00000000093D0000-0x00000000093E0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-140-0x00000000033A0000-0x00000000033B0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-139-0x0000000003390000-0x00000000033A0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-145-0x00000000013A0000-0x00000000013B0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-144-0x00000000033A0000-0x00000000033B0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-138-0x0000000003390000-0x00000000033A0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-141-0x0000000002E50000-0x0000000002E60000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-151-0x0000000003760000-0x0000000003770000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-143-0x0000000003390000-0x00000000033A0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3040-142-0x0000000003390000-0x00000000033A0000-memory.dmp
                              Filesize

                              64KB

                            • memory/3208-183-0x0000000000000000-mapping.dmp
                            • memory/3208-185-0x0000000001050000-0x0000000001057000-memory.dmp
                              Filesize

                              28KB

                            • memory/3208-186-0x0000000001040000-0x000000000104B000-memory.dmp
                              Filesize

                              44KB

                            • memory/3208-212-0x0000000001050000-0x0000000001057000-memory.dmp
                              Filesize

                              28KB

                            • memory/3572-184-0x0000000000000000-mapping.dmp
                            • memory/3572-187-0x0000000000E80000-0x0000000000E89000-memory.dmp
                              Filesize

                              36KB

                            • memory/3572-188-0x0000000000BF0000-0x0000000000BFF000-memory.dmp
                              Filesize

                              60KB

                            • memory/3572-213-0x0000000000E80000-0x0000000000E89000-memory.dmp
                              Filesize

                              36KB

                            • memory/3872-204-0x0000000000880000-0x0000000000889000-memory.dmp
                              Filesize

                              36KB

                            • memory/3872-203-0x0000000000890000-0x0000000000895000-memory.dmp
                              Filesize

                              20KB

                            • memory/3872-199-0x0000000000000000-mapping.dmp
                            • memory/3888-211-0x0000000000000000-mapping.dmp
                            • memory/3972-206-0x0000000000470000-0x0000000000476000-memory.dmp
                              Filesize

                              24KB

                            • memory/3972-207-0x0000000000460000-0x000000000046B000-memory.dmp
                              Filesize

                              44KB

                            • memory/3972-205-0x0000000000000000-mapping.dmp
                            • memory/4004-182-0x00007FFAB8B90000-0x00007FFAB9651000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4004-172-0x0000000000000000-mapping.dmp
                            • memory/4004-176-0x0000000000AB0000-0x0000000000FB0000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/4004-177-0x00007FFAD8690000-0x00007FFAD8885000-memory.dmp
                              Filesize

                              2.0MB

                            • memory/4004-178-0x0000000000AB0000-0x0000000000FB0000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/4004-200-0x0000000000AB0000-0x0000000000FB0000-memory.dmp
                              Filesize

                              5.0MB

                            • memory/4004-201-0x00007FFAD8690000-0x00007FFAD8885000-memory.dmp
                              Filesize

                              2.0MB

                            • memory/4004-202-0x00007FFAB8B90000-0x00007FFAB9651000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4040-210-0x0000000000700000-0x000000000070D000-memory.dmp
                              Filesize

                              52KB

                            • memory/4040-208-0x0000000000000000-mapping.dmp
                            • memory/4040-209-0x0000000000710000-0x0000000000717000-memory.dmp
                              Filesize

                              28KB

                            • memory/4256-235-0x0000000000400000-0x0000000000432000-memory.dmp
                              Filesize

                              200KB

                            • memory/4256-234-0x0000000000000000-mapping.dmp
                            • memory/4348-217-0x0000000001050000-0x0000000001055000-memory.dmp
                              Filesize

                              20KB

                            • memory/4348-192-0x0000000001040000-0x0000000001049000-memory.dmp
                              Filesize

                              36KB

                            • memory/4348-190-0x0000000001050000-0x0000000001055000-memory.dmp
                              Filesize

                              20KB

                            • memory/4348-189-0x0000000000000000-mapping.dmp
                            • memory/4408-195-0x0000000000550000-0x000000000055C000-memory.dmp
                              Filesize

                              48KB

                            • memory/4408-191-0x0000000000000000-mapping.dmp
                            • memory/4408-194-0x0000000000560000-0x0000000000566000-memory.dmp
                              Filesize

                              24KB

                            • memory/4408-218-0x0000000000560000-0x0000000000566000-memory.dmp
                              Filesize

                              24KB

                            • memory/4532-222-0x000000000041B576-mapping.dmp
                            • memory/4532-220-0x0000000000400000-0x000000000043A000-memory.dmp
                              Filesize

                              232KB

                            • memory/4924-169-0x0000000000400000-0x000000000045F000-memory.dmp
                              Filesize

                              380KB

                            • memory/4924-167-0x0000000000400000-0x000000000045F000-memory.dmp
                              Filesize

                              380KB

                            • memory/4924-170-0x0000000000400000-0x000000000045F000-memory.dmp
                              Filesize

                              380KB

                            • memory/4924-171-0x0000000000400000-0x000000000045F000-memory.dmp
                              Filesize

                              380KB

                            • memory/4924-198-0x0000000000400000-0x000000000045F000-memory.dmp
                              Filesize

                              380KB

                            • memory/4924-245-0x0000000060900000-0x0000000060992000-memory.dmp
                              Filesize

                              584KB

                            • memory/4924-166-0x0000000000000000-mapping.dmp