Windows Analysis Report
https://westmaidentrue.click/mirage/magestique

Overview

General Information

Sample URL: https://westmaidentrue.click/mirage/magestique
Analysis ID: 1636623
Infos:

Detection

RedLine
Score: 60
Range: 0 - 100
Confidence: 100%

Signatures

Yara detected RedLine Stealer
Found direct / indirect Syscall (likely to bypass EDR)
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Drops PE files
Found dropped PE file which has not been started or loaded
Queries the volume information (name, serial number etc) of a device
Yara detected Credential Stealer

Classification

Name Description Attribution Blogpost URLs Link
RedLine Stealer RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
Source: C:\Program Files\7-Zip\7zG.exe File opened: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\msvcr80.dll
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49725 version: TLS 1.2
Source: unknown HTTPS traffic detected: 184.86.251.25:443 -> 192.168.2.17:49740 version: TLS 1.2
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 51.132.193.104
Source: unknown TCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknown TCP traffic detected without corresponding DNS query: 52.109.28.46
Source: unknown TCP traffic detected without corresponding DNS query: 51.132.193.104
Source: unknown TCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknown TCP traffic detected without corresponding DNS query: 52.109.28.46
Source: unknown TCP traffic detected without corresponding DNS query: 51.132.193.104
Source: unknown TCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknown TCP traffic detected without corresponding DNS query: 52.109.28.46
Source: unknown TCP traffic detected without corresponding DNS query: 52.123.128.14
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 52.123.128.14
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 51.132.193.104
Source: unknown TCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknown TCP traffic detected without corresponding DNS query: 52.109.28.46
Source: unknown TCP traffic detected without corresponding DNS query: 52.123.128.14
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 52.123.128.14
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 51.132.193.104
Source: unknown TCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknown TCP traffic detected without corresponding DNS query: 52.109.28.46
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 52.123.128.14
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 51.132.193.104
Source: unknown TCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknown TCP traffic detected without corresponding DNS query: 52.109.28.46
Source: unknown TCP traffic detected without corresponding DNS query: 52.123.128.14
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 51.132.193.104
Source: unknown TCP traffic detected without corresponding DNS query: 2.17.190.73
Source: unknown TCP traffic detected without corresponding DNS query: 52.109.28.46
Source: unknown TCP traffic detected without corresponding DNS query: 52.123.128.14
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 142.250.186.131
Source: unknown TCP traffic detected without corresponding DNS query: 142.250.186.131
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.246.60
Source: global traffic HTTP traffic detected: GET /rules/rule702450v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
Source: global traffic HTTP traffic detected: GET /rules/rule701100v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
Source: global traffic HTTP traffic detected: GET /rules/rule701101v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
Source: global traffic HTTP traffic detected: GET /rules/rule120603v8s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
Source: global traffic HTTP traffic detected: GET /rules/rule120128v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
Source: global traffic DNS traffic detected: DNS query: westmaidentrue.click
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49700
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49699 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49672 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49697 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49701 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49682 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 49698 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49699
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49698
Source: unknown Network traffic detected: HTTP traffic on port 49673 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49697
Source: unknown Network traffic detected: HTTP traffic on port 49677 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49671 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49700 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49701
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.17:49725 version: TLS 1.2
Source: unknown HTTPS traffic detected: 184.86.251.25:443 -> 192.168.2.17:49740 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Windows\SystemTemp\scoped_dir4660_2138186876
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File deleted: C:\Windows\SystemTemp\scoped_dir4660_2138186876
Source: classification engine Classification label: mal60.troj.evad.win@32/14@4/102
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\Downloads\d5d6b308-bfbb-4dd4-bf8b-ff8f825d0b61.tmp
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe File created: C:\Users\user\AppData\Local\Temp\c149800b
Source: C:\Windows\SysWOW64\cmd.exe File read: C:\Users\desktop.ini
Source: C:\Windows\System32\rundll32.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknown Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1960,i,14732196840622358889,9722313244404987971,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=1580 /prefetch:3
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://westmaidentrue.click/mirage/magestique"
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1960,i,14732196840622358889,9722313244404987971,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=1580 /prefetch:3
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: unknown Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\Temp1_Stars_pack_version_21.3.1.zip\version_21\zkwindow.exe "C:\Users\user\AppData\Local\Temp\Temp1_Stars_pack_version_21.3.1.zip\version_21\zkwindow.exe"
Source: unknown Process created: C:\Program Files\7-Zip\7zG.exe "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Downloads\Stars_pack_version_21.3.1\" -spe -an -ai#7zMap13774:114:7zEvent31951
Source: unknown Process created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe "C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe"
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
Source: C:\Users\user\AppData\Local\Temp\Temp1_Stars_pack_version_21.3.1.zip\version_21\zkwindow.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\Temp1_Stars_pack_version_21.3.1.zip\version_21\zkwindow.exe Section loaded: qtcore4.dll
Source: C:\Users\user\AppData\Local\Temp\Temp1_Stars_pack_version_21.3.1.zip\version_21\zkwindow.exe Section loaded: qtgui4.dll
Source: C:\Users\user\AppData\Local\Temp\Temp1_Stars_pack_version_21.3.1.zip\version_21\zkwindow.exe Section loaded: qtnetwork4.dll
Source: C:\Users\user\AppData\Local\Temp\Temp1_Stars_pack_version_21.3.1.zip\version_21\zkwindow.exe Section loaded: comn.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: kernel.appcore.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: uxtheme.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: cryptbase.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: explorerframe.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: textshaping.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: textinputframework.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: coreuicomponents.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: coremessaging.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: ntmarta.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: coremessaging.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: wintypes.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: wintypes.dll
Source: C:\Program Files\7-Zip\7zG.exe Section loaded: wintypes.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: apphelp.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: qtcore4.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: qtgui4.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: qtnetwork4.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: comn.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: winmm.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: dnsapi.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: libssl-1_1.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: userenv.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: netapi32.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: libcrypto-1_1.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: netutils.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: samcli.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: dbghelp.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: pla.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: pdh.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: tdh.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: cabinet.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: wevtapi.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: shdocvw.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: ntmarta.dll
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: winhttp.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: winbrand.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: wldp.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: propsys.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: profapi.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: linkinfo.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: ntshrui.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: srvcli.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: cscapi.dll
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: bitsproxy.dll
Source: C:\Program Files\7-Zip\7zG.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\7-Zip\7zG.exe File opened: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\msvcr80.dll
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\msvcp80.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\Comn.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\QtCore4.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\libcrypto-1_1.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\QtGui4.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\libssl-1_1.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\QtNetwork4.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe File created: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\msvcr80.dll Jump to dropped file
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe API/Special instruction interceptor: Address: 6CB27C44
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe API/Special instruction interceptor: Address: 6CB27945
Source: C:\Windows\SysWOW64\cmd.exe API/Special instruction interceptor: Address: 6CB23B54
Source: C:\Program Files\7-Zip\7zG.exe Dropped PE file which has not been started: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\msvcp80.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe Dropped PE file which has not been started: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\libcrypto-1_1.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe Dropped PE file which has not been started: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\libssl-1_1.dll Jump to dropped file
Source: C:\Program Files\7-Zip\7zG.exe Dropped PE file which has not been started: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\msvcr80.dll Jump to dropped file
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Process information queried: ProcessInformation

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe NtProtectVirtualMemory: Direct from: 0x77DF7B2E
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe NtQueryInformationToken: Direct from: 0x6500399D
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe NtSetSecurityObject: Direct from: 0x77DF63E1
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Section loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read write
Source: C:\Users\user\Downloads\Stars_pack_version_21.3.1\version_21\zkwindow.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
Source: C:\Windows\SysWOW64\cmd.exe Queries volume information: C:\ VolumeInformation

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000013.00000002.2319472527.00000000056A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.2319472527.00000000056A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: 00000013.00000002.2319472527.00000000056A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs