Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:28
Static task
static1
Behavioral task
behavioral1
Sample
15eb5a44613074dee64d6f25eceb66be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15eb5a44613074dee64d6f25eceb66be.exe
Resource
win10v2004-20231215-en
General
-
Target
15eb5a44613074dee64d6f25eceb66be.exe
-
Size
3.4MB
-
MD5
15eb5a44613074dee64d6f25eceb66be
-
SHA1
a414befb2fdf6c508d4936f723f8b142828b2b16
-
SHA256
57f10efc739ec361aebc5282037d8013f39991d2f87ab144dd16e3cd63ed6999
-
SHA512
e749bfd0ccb846547bf2759b6c39515caded7103fb5197059f60321ba26dfc367f9e69f2b7f889173b330ee5342ff94a4b6aec69aee9cedf9eb040dbbafc27a4
-
SSDEEP
98304:xwCvLUBsgQPoIXHs02aorqdKmUzKDwXQXKV9fV:xNLUCgeoIXM0R3nUz8wrPfV
Malware Config
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
pub6
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
nullmixer
http://marisana.xyz/
Extracted
cryptbot
knudqw18.top
morzku01.top
-
payload_url
http://saryek01.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 6 IoCs
resource yara_rule behavioral1/memory/648-289-0x0000000003D80000-0x0000000003E23000-memory.dmp family_cryptbot behavioral1/memory/648-301-0x0000000003D80000-0x0000000003E23000-memory.dmp family_cryptbot behavioral1/memory/648-300-0x0000000003D80000-0x0000000003E23000-memory.dmp family_cryptbot behavioral1/memory/648-299-0x0000000003D80000-0x0000000003E23000-memory.dmp family_cryptbot behavioral1/memory/648-387-0x0000000003D80000-0x0000000003E23000-memory.dmp family_cryptbot behavioral1/memory/648-622-0x0000000003D80000-0x0000000003E23000-memory.dmp family_cryptbot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1568-140-0x00000000047C0000-0x00000000047E2000-memory.dmp family_redline behavioral1/memory/1568-144-0x0000000004D90000-0x0000000004DB0000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/1568-140-0x00000000047C0000-0x00000000047E2000-memory.dmp family_sectoprat behavioral1/memory/1568-144-0x0000000004D90000-0x0000000004DB0000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/1564-134-0x0000000004590000-0x000000000462D000-memory.dmp family_vidar behavioral1/memory/1564-147-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar behavioral1/memory/1568-119-0x0000000003120000-0x0000000003220000-memory.dmp family_vidar behavioral1/memory/1564-309-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar behavioral1/memory/1564-380-0x0000000004590000-0x000000000462D000-memory.dmp family_vidar -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1236 2828 WerFault.exe 1848 1564 WerFault.exe 31 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2528 PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\15eb5a44613074dee64d6f25eceb66be.exe"C:\Users\Admin\AppData\Local\Temp\15eb5a44613074dee64d6f25eceb66be.exe"1⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\setup_install.exe"2⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue021e08b886995.exe1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue021e08b886995.exeTue021e08b886995.exe2⤵PID:2860
-
-
C:\Windows\SysWOW64\cmd.execmd1⤵PID:572
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aXXPLdOdpKvHEwwcALYIInWmgGDtBFsVVodqfjpjFmFfheNjFpLslXxTwbAyMJPDzALcKwugCMepSGkjSsms$" Suoi.xlam2⤵PID:584
-
-
C:\Windows\SysWOW64\PING.EXEping CALKHSYM -n 302⤵
- Runs ping.exe
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comTalune.exe.com K2⤵PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.com K1⤵PID:648
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Conservava.xlam1⤵PID:2064
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe1⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue025ccbbdb1799f42b.exeTue025ccbbdb1799f42b.exe1⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue021b99042c7.exeTue021b99042c7.exe1⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue02693e04f014707bc.exeTue02693e04f014707bc.exe1⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 9402⤵
- Program crash
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue02ef36b3f1289c5.exeTue02ef36b3f1289c5.exe1⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue027536c4694d45.exeTue027536c4694d45.exe1⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue022b0c9446.exe"C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue022b0c9446.exe" -a1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue0237249404942fe.exeTue0237249404942fe.exe1⤵PID:2416
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue022a930da16b.exeTue022a930da16b.exe1⤵PID:3056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue027536c4694d45.exe1⤵PID:3060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue025ccbbdb1799f42b.exe1⤵PID:3044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0237249404942fe.exe1⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\7zSCD8C5F06\Tue022b0c9446.exeTue022b0c9446.exe1⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02ef36b3f1289c5.exe1⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue02693e04f014707bc.exe1⤵PID:3036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue022a930da16b.exe1⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 4321⤵
- Program crash
PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue021b99042c7.exe1⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue022b0c9446.exe1⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD515b744dda515cebaf7c8761f6beb9323
SHA1890947d8e2b078b67b62d9c1d08770bfc7ef3c17
SHA25691cf68352b0edfd2ca67084d83cc44cf100f1a4273566326e076c83abd5daed5
SHA512c4add4f8d0ddeb607270df27c05a887a4724946b01032e5ae56d5d1046a527ce19f8b84a6bae1be0cde62ffcd3d26e1f5ff914853f9fee6b6721f338fe0d2b53