Threat name:
Petite Virus, RedLine, SmokeLoader, Sock
Alert
Classification:
troj.spyw.evad
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Petite Virus
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socks5Systemz
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1353040
Sample:
file.exe
Startdate:
04/12/2023
Architecture:
WINDOWS
Score:
100
116
stualialuyastrelia.net
2->116
118
snukerukeutit.org
2->118
120
8 other IPs or domains
2->120
136
Snort IDS alert for
network traffic
2->136
138
Found malware configuration
2->138
140
Malicious sample detected
(through community Yara
rule)
2->140
142
17 other signatures
2->142
13
file.exe
2->13
started
16
wrjvvbu
2->16
started
signatures3
process4
signatures5
170
Detected unpacking (changes
PE section rights)
13->170
172
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
13->172
174
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
13->174
18
explorer.exe
43
15
13->18
injected
23
regsvr32.exe
13->23
started
176
Maps a DLL or memory
area into another process
16->176
178
Checks if the current
machine is a virtual
machine (disk enumeration)
16->178
180
Creates a thread in
another existing process
(thread injection)
16->180
process6
dnsIp7
122
stualialuyastrelia.net
91.215.85.17, 49715, 80
PINDC-ASRU
Russian Federation
18->122
124
sl.himanfast.com
104.21.6.189, 49718, 80
CLOUDFLARENETUS
United States
18->124
126
2 other IPs or domains
18->126
86
C:\Users\user\AppData\Roaming\wrjvvbu, PE32
18->86
dropped
88
C:\Users\user\AppData\Local\Temp\C961.dll, PE32
18->88
dropped
90
C:\Users\user\AppData\Local\Temp\8A63.exe, PE32
18->90
dropped
92
4 other malicious files
18->92
dropped
144
System process connects
to network (likely due
to code injection or
exploit)
18->144
146
Benign windows process
drops PE files
18->146
148
Injects code into the
Windows Explorer (explorer.exe)
18->148
150
3 other signatures
18->150
25
649A.exe
8
18->25
started
28
8A63.exe
2
18->28
started
30
4C6D.exe
8
4
18->30
started
34
4 other processes
18->34
file8
signatures9
process10
dnsIp11
112
C:\Users\user\AppData\Local\Temp\22143\Also, PE32
25->112
dropped
36
cmd.exe
25->36
started
39
conhost.exe
25->39
started
114
C:\Users\user\AppData\Local\Temp\...\8A63.tmp, PE32
28->114
dropped
41
8A63.tmp
1
28->41
started
134
38.47.221.193, 34368, 49717
COGENT-174US
United States
30->134
184
Multi AV Scanner detection
for dropped file
30->184
186
Detected unpacking (changes
PE section rights)
30->186
188
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
30->188
196
7 other signatures
30->196
190
System process connects
to network (likely due
to code injection or
exploit)
34->190
192
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
34->192
194
Tries to steal Mail
credentials (via file
/ registry access)
34->194
43
regsvr32.exe
34->43
started
file12
signatures13
process14
signatures15
152
Uses ping.exe to sleep
36->152
154
Drops PE files with
a suspicious file extension
36->154
156
Uses ping.exe to check
the status of other
devices and networks
36->156
45
cmd.exe
36->45
started
48
conhost.exe
36->48
started
50
8A63.exe
41->50
started
158
Tries to detect sandboxes
/ dynamic malware analysis
system (file name check)
43->158
process16
file17
182
Uses ping.exe to sleep
45->182
53
V.pif
45->53
started
58
cmd.exe
45->58
started
60
tasklist.exe
45->60
started
64
6 other processes
45->64
82
C:\Users\user\AppData\Local\Temp\...\8A63.tmp, PE32
50->82
dropped
62
8A63.tmp
50->62
started
signatures18
process19
dnsIp20
128
dskflherlkhopihsf.com
104.21.7.188
CLOUDFLARENETUS
United States
53->128
94
C:\Users\user\AppData\...\softokn3[1].dll, PE32
53->94
dropped
96
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
53->96
dropped
98
C:\Users\user\AppData\...\mozglue[1].dll, PE32
53->98
dropped
108
9 other files (5 malicious)
53->108
dropped
160
Found many strings related
to Crypto-Wallets (likely
being stolen)
53->160
162
Found API chain indicative
of sandbox detection
53->162
164
Tries to harvest and
steal ftp login credentials
53->164
168
2 other signatures
53->168
100
C:\Users\user\AppData\Local\Temp\...\V.pif, PE32
58->100
dropped
102
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
62->102
dropped
104
C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32
62->104
dropped
106
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
62->106
dropped
110
56 other files (4 malicious)
62->110
dropped
166
Uses schtasks.exe or
at.exe to add and modify
task schedules
62->166
66
qtwasapi.exe
62->66
started
69
net.exe
62->69
started
71
qtwasapi.exe
62->71
started
74
schtasks.exe
62->74
started
file21
signatures22
process23
dnsIp24
84
C:\ProgramData\...\SVGAHelperSvc.exe, PE32
66->84
dropped
76
conhost.exe
69->76
started
78
net1.exe
69->78
started
130
bzjeolw.com
185.196.8.22
SIMPLECARRER2IT
Switzerland
71->130
132
95.216.227.177
HETZNER-ASDE
Germany
71->132
80
conhost.exe
74->80
started
file25
process26
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.