Analysis
-
max time kernel
2s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe
Resource
win7-20231215-en
General
-
Target
f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe
-
Size
5.5MB
-
MD5
0a313a73aac1905c6ef571c4e700554a
-
SHA1
7f2e2d4656ae4a5e6015c51184e19ef26510fb12
-
SHA256
f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be
-
SHA512
b8323f01a915c1e28d9926a07518c798546ab12aa8d8c1038c9f18973beab78fda972aaea1b7a0814b6c3efa0847ee2f89ccc3abfa8bcc239eb12a36a069b576
-
SSDEEP
98304:xorRBQQyUroZi+nTf55/2UJ70UsjVk+io3McLpN3SQXB/uz7h4sWsjFe5qx:xorR3rETfjB70Ush9io3MeDOl4sW8+qx
Malware Config
Extracted
vidar
40.3
706
https://lenko349.tumblr.com/
-
profile_id
706
Extracted
redline
pab777
185.215.113.15:6043
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2068-198-0x0000000001E20000-0x0000000001E46000-memory.dmp family_redline behavioral1/memory/2068-206-0x00000000024E0000-0x0000000002504000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2068-198-0x0000000001E20000-0x0000000001E46000-memory.dmp family_sectoprat behavioral1/memory/2068-206-0x00000000024E0000-0x0000000002504000-memory.dmp family_sectoprat -
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/776-185-0x0000000003B30000-0x0000000003C03000-memory.dmp family_vidar behavioral1/memory/776-187-0x0000000000400000-0x00000000021D9000-memory.dmp family_vidar -
Executes dropped EXE 1 IoCs
pid Process 2840 setup_install.exe -
Loads dropped DLL 10 IoCs
pid Process 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 2840 setup_install.exe 2840 setup_install.exe 2840 setup_install.exe 2840 setup_install.exe 2840 setup_install.exe 2840 setup_install.exe 2840 setup_install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2040 1132 WerFault.exe 1008 776 WerFault.exe 40 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2840 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 61 PID 2856 wrote to memory of 2840 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 61 PID 2856 wrote to memory of 2840 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 61 PID 2856 wrote to memory of 2840 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 61 PID 2856 wrote to memory of 2840 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 61 PID 2856 wrote to memory of 2840 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 61 PID 2856 wrote to memory of 2840 2856 f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe"C:\Users\Admin\AppData\Local\Temp\f25e4213555bb2e557f66fb99d91a03972c1882ca8c2ac8748e25fc09798e2be.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\7zS82B2FE16\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS82B2FE16\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\e6e22792e2586e.exeC:\Users\Admin\AppData\Local\Temp\e6e22792e2586e.exe1⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\setup_install.exe"2⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:1872
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"2⤵PID:2052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1785e69fa9997.exe1⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed1785e69fa9997.exeWed1785e69fa9997.exe2⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed1723a697f7.exeWed1723a697f7.exe1⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KiffApp2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KiffApp2.exe"2⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed171b4c251d7.exeWed171b4c251d7.exe1⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\is-BMN6I.tmp\Wed1714d285085.tmp"C:\Users\Admin\AppData\Local\Temp\is-BMN6I.tmp\Wed1714d285085.tmp" /SL5="$201E4,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed1714d285085.exe"1⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed17f15b7389c9ebf74.exeWed17f15b7389c9ebf74.exe1⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed17dff1d3c799e.exeWed17dff1d3c799e.exe1⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed1714d285085.exeWed1714d285085.exe1⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed17d4eac5c83e204dc.exeWed17d4eac5c83e204dc.exe1⤵PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 9482⤵
- Program crash
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed17f6f9bbb339c2.exe"C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed17f6f9bbb339c2.exe" -u1⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed1744842952dc03a.exeWed1744842952dc03a.exe1⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\7zS41B70E16\Wed17f6f9bbb339c2.exeWed17f6f9bbb339c2.exe1⤵PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 4361⤵
- Program crash
PID:2040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1744842952dc03a.exe1⤵PID:1240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed17dff1d3c799e.exe1⤵PID:1376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed17f15b7389c9ebf74.exe1⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1714d285085.exe1⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed17d4eac5c83e204dc.exe1⤵PID:2944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1723a697f7.exe1⤵PID:1884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed171b4c251d7.exe1⤵PID:1628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed17f6f9bbb339c2.exe1⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\e6e22792e2586e.exe1⤵PID:2608