Overview
overview
10Static
static
1data/chrome_elf.dll
windows7-x64
1data/chrome_elf.dll
windows10-2004-x64
1data/d3dco...47.dll
windows7-x64
3data/d3dco...47.dll
windows10-2004-x64
1data/d9.dll
windows7-x64
5data/d9.dll
windows10-2004-x64
5data/dddd.dll
windows7-x64
5data/dddd.dll
windows10-2004-x64
5data/event...er.dll
windows7-x64
1data/event...er.dll
windows10-2004-x64
1data/libEGL.dll
windows7-x64
1data/libEGL.dll
windows10-2004-x64
1data/libGLESv2.dll
windows7-x64
3data/libGLESv2.dll
windows10-2004-x64
3data/mojo_core.dll
windows7-x64
1data/mojo_core.dll
windows10-2004-x64
1data/sfvstwrap.dll
windows7-x64
1data/sfvstwrap.dll
windows10-2004-x64
1data/so4me...ib.dll
windows7-x64
3data/so4me...ib.dll
windows10-2004-x64
3data/sonym...xp.dll
windows7-x64
1data/sonym...xp.dll
windows10-2004-x64
1data/vdlxi...64.dll
windows7-x64
3data/vdlxi...64.dll
windows10-2004-x64
3data/vk_sw...er.dll
windows7-x64
3data/vk_sw...er.dll
windows10-2004-x64
3data/vulkan-1.dll
windows7-x64
3data/vulkan-1.dll
windows10-2004-x64
3setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
109s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2023 03:32
Static task
static1
Behavioral task
behavioral1
Sample
data/chrome_elf.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
data/chrome_elf.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
data/d3dcompiler_47.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
data/d3dcompiler_47.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
data/d9.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
data/d9.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
data/dddd.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
data/dddd.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
data/eventlog_provider.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
data/eventlog_provider.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
data/libEGL.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
data/libEGL.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
data/libGLESv2.dll
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
data/libGLESv2.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
data/mojo_core.dll
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
data/mojo_core.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
data/sfvstwrap.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
data/sfvstwrap.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
data/so4mediainfolib.dll
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
data/so4mediainfolib.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
data/sonymvd2pro_xp.dll
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
data/sonymvd2pro_xp.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
data/vdlxipp61_x64.dll
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
data/vdlxipp61_x64.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
data/vk_swiftshader.dll
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
data/vk_swiftshader.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
data/vulkan-1.dll
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
data/vulkan-1.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
setup.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
setup.exe
Resource
win10v2004-20221111-en
General
-
Target
setup.exe
-
Size
565.8MB
-
MD5
b34cf82d7d10a1c8421ef3fe65e4de46
-
SHA1
574c8dd9986952916786b03c0261230a933f3e9d
-
SHA256
7e73c496079d96e4ccec427679b791518f25aaca20585a5d54f632064ff880ae
-
SHA512
69fb1cb2e37c7b3321ff898aac936233521026834c07b92a7c8fa7885a363f5b2a6d6d455309435802f70827bc7ecb955ed9e4c7a8fdbcde212bc479748647ed
-
SSDEEP
1536:8rae78zjORCDGwfdCSog01313fs5gG8m:kahKyd2n31E5d
Malware Config
Extracted
purecrypter
https://speedysecurity.com.br/images/css/waves/bo/Upjcuf.bmp
Extracted
redline
@fjiif563
45.15.157.131:36457
-
auth_value
ef361597d90539bf547a8edad2ebafde
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation setup_ovl11.exe -
Executes dropped EXE 2 IoCs
pid Process 1284 setup_ovl11.exe 3448 setup_ovl11.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1284 set thread context of 3448 1284 setup_ovl11.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3852 powershell.exe 3852 powershell.exe 4504 powershell.exe 4504 powershell.exe 3448 setup_ovl11.exe 3448 setup_ovl11.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1284 setup_ovl11.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 3448 setup_ovl11.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1284 2644 setup.exe 81 PID 2644 wrote to memory of 1284 2644 setup.exe 81 PID 2644 wrote to memory of 1284 2644 setup.exe 81 PID 1284 wrote to memory of 3852 1284 setup_ovl11.exe 87 PID 1284 wrote to memory of 3852 1284 setup_ovl11.exe 87 PID 1284 wrote to memory of 3852 1284 setup_ovl11.exe 87 PID 1284 wrote to memory of 2972 1284 setup_ovl11.exe 89 PID 1284 wrote to memory of 2972 1284 setup_ovl11.exe 89 PID 1284 wrote to memory of 2972 1284 setup_ovl11.exe 89 PID 2972 wrote to memory of 4504 2972 cmd.exe 91 PID 2972 wrote to memory of 4504 2972 cmd.exe 91 PID 2972 wrote to memory of 4504 2972 cmd.exe 91 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92 PID 1284 wrote to memory of 3448 1284 setup_ovl11.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl11.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl11.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56195a91754effb4df74dbc72cdf4f7a6
SHA1aba262f5726c6d77659fe0d3195e36a85046b427
SHA2563254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5
SHA512ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89
-
Filesize
1KB
MD53a9188331a78f1dbce606db64b841fcb
SHA18e2c99b7c477d06591a856a4ea3e1e214719eee8
SHA256db4137e258a0f6159fda559a5f6dd2704be0582c3f0586f65040c7ad1eb68451
SHA512d1a994610a045d89d5d306866c24ae56bf16555414b8f63f632552568e67b5586f26d5a17a1f0a55ada376730298e6d856e9161828d4eae9decfa4e015e0e90a
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5f685e9b0f43c1189696bf0640d15b56c
SHA1689589b14fd631686f6316ea33fac80eb59a7e45
SHA256f39d33224a92a60962c7dfac653f2522e828eacfd77baf4d1ec4ccc895704777
SHA5128067c05f00da665ef73b1f9e3ec2f27b628e7f7d39bf882d8295e95729e03742e880f37e78f0a105306a91f14dbe30c0977d0157b0389404d3886fea0fcdd3c5
-
Filesize
362.4MB
MD586953017061f31e70b969e6c7f572c7f
SHA13bebe208120c374bc63b80b76d47caefabdca19a
SHA2569412c0bf2b0d8f61bf6e8df011bd32f3a5be8a6d96bc0b0e4eee1bb3a43fe9da
SHA5125a5afd57382e44034832f66d92b0d180d8e525ec4f22c54be4bf391604370814c622b4210e5f8f8c3c595dc63753d0dffc180ec1697a663a15598dae5491fa7c
-
Filesize
362.4MB
MD586953017061f31e70b969e6c7f572c7f
SHA13bebe208120c374bc63b80b76d47caefabdca19a
SHA2569412c0bf2b0d8f61bf6e8df011bd32f3a5be8a6d96bc0b0e4eee1bb3a43fe9da
SHA5125a5afd57382e44034832f66d92b0d180d8e525ec4f22c54be4bf391604370814c622b4210e5f8f8c3c595dc63753d0dffc180ec1697a663a15598dae5491fa7c
-
Filesize
362.4MB
MD586953017061f31e70b969e6c7f572c7f
SHA13bebe208120c374bc63b80b76d47caefabdca19a
SHA2569412c0bf2b0d8f61bf6e8df011bd32f3a5be8a6d96bc0b0e4eee1bb3a43fe9da
SHA5125a5afd57382e44034832f66d92b0d180d8e525ec4f22c54be4bf391604370814c622b4210e5f8f8c3c595dc63753d0dffc180ec1697a663a15598dae5491fa7c