Resubmissions

12-07-2021 16:55

210712-cvz622xsbj 10

10-07-2021 13:25

210710-pdfh7kft96 10

09-07-2021 23:00

210709-hewxkm1xlj 10

09-07-2021 16:08

210709-5ql27kyjqa 10

09-07-2021 14:08

210709-pt977a4bhe 10

08-07-2021 22:09

210708-3ypfnj5j7x 10

08-07-2021 13:30

210708-4hsk7y9f2x 10

08-07-2021 12:14

210708-8t5f9z9egj 10

Analysis

  • max time kernel
    150s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    08-07-2021 13:30

General

  • Target

    toolspab2 (18).exe

  • Size

    315KB

  • MD5

    1d20e1f65938e837ef1b88f10f1bd6c3

  • SHA1

    703d7098dbfc476d2181b7fc041cc23e49c368f1

  • SHA256

    05cd7440851f13dd8f489bb3c06eba385d85d7d9a77a612049c04c541a88593d

  • SHA512

    f9d333abe1f721b8d45d7bc6b5f286af09a8d233bd1d41f0ad891840cf742364aeca2cb6ccd6543f56a8eaf32804f82f72f961d16d5ba663ad706d164915a196

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://999080321newfolder1002002131-service1002.space/

http://999080321newfolder1002002231-service1002.space/

http://999080321newfolder3100231-service1002.space/

http://999080321newfolder1002002431-service1002.space/

http://999080321newfolder1002002531-service1002.space/

http://999080321newfolder33417-012425999080321.space/

http://999080321test125831-service10020125999080321.space/

http://999080321test136831-service10020125999080321.space/

http://999080321test147831-service10020125999080321.space/

http://999080321test146831-service10020125999080321.space/

http://999080321test134831-service10020125999080321.space/

http://999080321est213531-service1002012425999080321.ru/

http://999080321yes1t3481-service10020125999080321.ru/

http://999080321test13561-service10020125999080321.su/

http://999080321test14781-service10020125999080321.info/

http://999080321test13461-service10020125999080321.net/

http://999080321test15671-service10020125999080321.tech/

http://999080321test12671-service10020125999080321.online/

http://999080321utest1341-service10020125999080321.ru/

http://999080321uest71-service100201dom25999080321.ru/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

1

C2

45.32.235.238:45555

Extracted

Family

redline

Botnet

agressor

C2

65.21.122.45:8085

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe
    "C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe
      "C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe"
      2⤵
      • Loads dropped DLL
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:828
  • C:\Users\Admin\AppData\Local\Temp\7A1F.exe
    C:\Users\Admin\AppData\Local\Temp\7A1F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:1464
  • C:\Users\Admin\AppData\Local\Temp\7BC6.exe
    C:\Users\Admin\AppData\Local\Temp\7BC6.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:1948
  • C:\Users\Admin\AppData\Local\Temp\BA4C.exe
    C:\Users\Admin\AppData\Local\Temp\BA4C.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\BA4C.exe
      C:\Users\Admin\AppData\Local\Temp\BA4C.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1716
  • C:\Users\Admin\AppData\Local\Temp\BDE6.exe
    C:\Users\Admin\AppData\Local\Temp\BDE6.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:948
  • C:\Users\Admin\AppData\Local\Temp\C047.exe
    C:\Users\Admin\AppData\Local\Temp\C047.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:564
  • C:\Users\Admin\AppData\Local\Temp\CDB0.exe
    C:\Users\Admin\AppData\Local\Temp\CDB0.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    PID:1584
  • C:\Users\Admin\AppData\Local\Temp\D84B.exe
    C:\Users\Admin\AppData\Local\Temp\D84B.exe
    1⤵
    • Executes dropped EXE
    PID:1996
  • C:\Users\Admin\AppData\Local\Temp\E42F.exe
    C:\Users\Admin\AppData\Local\Temp\E42F.exe
    1⤵
    • Executes dropped EXE
    PID:828
  • C:\Users\Admin\AppData\Local\Temp\F040.exe
    C:\Users\Admin\AppData\Local\Temp\F040.exe
    1⤵
      PID:1700

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7A1F.exe
      MD5

      a69e12607d01237460808fa1709e5e86

      SHA1

      4a12f82aee1c90e70cdf6be863ce1a749c8ae411

      SHA256

      188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

      SHA512

      7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

    • C:\Users\Admin\AppData\Local\Temp\7BC6.exe
      MD5

      a69e12607d01237460808fa1709e5e86

      SHA1

      4a12f82aee1c90e70cdf6be863ce1a749c8ae411

      SHA256

      188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

      SHA512

      7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

    • C:\Users\Admin\AppData\Local\Temp\BA4C.exe
      MD5

      3df352000081d21c5429ff7b1afa7d59

      SHA1

      9499f195ddded99fac37c5b9a62181c504009e8c

      SHA256

      ff72db897e442ba3a8d70e7c469220a6d8f75616c2683a2c57fa1aacf516cb37

      SHA512

      cac3714eaf215de9754bbe06b132dccf8c744de22f300f449eb1c346e48f92eca1421de278242b438d4bd7de8dec3285d0457893ec1a20e90cc172a135fe3534

    • C:\Users\Admin\AppData\Local\Temp\BA4C.exe
      MD5

      3df352000081d21c5429ff7b1afa7d59

      SHA1

      9499f195ddded99fac37c5b9a62181c504009e8c

      SHA256

      ff72db897e442ba3a8d70e7c469220a6d8f75616c2683a2c57fa1aacf516cb37

      SHA512

      cac3714eaf215de9754bbe06b132dccf8c744de22f300f449eb1c346e48f92eca1421de278242b438d4bd7de8dec3285d0457893ec1a20e90cc172a135fe3534

    • C:\Users\Admin\AppData\Local\Temp\BA4C.exe
      MD5

      3df352000081d21c5429ff7b1afa7d59

      SHA1

      9499f195ddded99fac37c5b9a62181c504009e8c

      SHA256

      ff72db897e442ba3a8d70e7c469220a6d8f75616c2683a2c57fa1aacf516cb37

      SHA512

      cac3714eaf215de9754bbe06b132dccf8c744de22f300f449eb1c346e48f92eca1421de278242b438d4bd7de8dec3285d0457893ec1a20e90cc172a135fe3534

    • C:\Users\Admin\AppData\Local\Temp\BDE6.exe
      MD5

      7840b0589e083b566446c5e36664ceb6

      SHA1

      12194db4704f5d4ff191414fbdd88291f8638edc

      SHA256

      3c7b1e3a161822b3d2bfe9106d3ba38f22e93e8fec02fbebe1996177f7987b4e

      SHA512

      7bcea90ee2da6eeb44666f73b403fa909e8d21a6c7d6e2235b23519f1034ca9da2609b4b076bad66eae99aaf76ed9cb05dfdae68a92e1d8762f5656d978e51b6

    • C:\Users\Admin\AppData\Local\Temp\C047.exe
      MD5

      2bf9c104e484e8bd5aef8d97cebc0adf

      SHA1

      cd5f92a01304c3c271e0db0f4af2ad1b6516a25c

      SHA256

      8484b12816a6126065769d5c60d0efe5a495711455e8e2385890efd6e0e4ca0f

      SHA512

      12bab306d0d5778fe08a0aa07e3cb9146a3595499d11e0c04a862a13dc421332eb23d82297378d23c1c6ebc5c2bcc6d94afdc1ea32d8dcfb6332f7296860ac6b

    • C:\Users\Admin\AppData\Local\Temp\CDB0.exe
      MD5

      c0871047e3a9111f30c96495ca01a58e

      SHA1

      f4d74a04b1f47afd5f6f0b93a141a014355d15a5

      SHA256

      12b80bd02735633174a1b1fce499fd2a8d4e47ad2246ec76165b69665a4d1f5a

      SHA512

      cd17bc91d797bffe5c5bc4dabf6dc6d321369986a31e7fde38673e5f6634f0270a56a689e6307e6c092422dfa226c881209f747db5ba5b1d08f126ce04d68f10

    • C:\Users\Admin\AppData\Local\Temp\D84B.exe
      MD5

      2bf9c104e484e8bd5aef8d97cebc0adf

      SHA1

      cd5f92a01304c3c271e0db0f4af2ad1b6516a25c

      SHA256

      8484b12816a6126065769d5c60d0efe5a495711455e8e2385890efd6e0e4ca0f

      SHA512

      12bab306d0d5778fe08a0aa07e3cb9146a3595499d11e0c04a862a13dc421332eb23d82297378d23c1c6ebc5c2bcc6d94afdc1ea32d8dcfb6332f7296860ac6b

    • C:\Users\Admin\AppData\Local\Temp\E42F.exe
      MD5

      7840b0589e083b566446c5e36664ceb6

      SHA1

      12194db4704f5d4ff191414fbdd88291f8638edc

      SHA256

      3c7b1e3a161822b3d2bfe9106d3ba38f22e93e8fec02fbebe1996177f7987b4e

      SHA512

      7bcea90ee2da6eeb44666f73b403fa909e8d21a6c7d6e2235b23519f1034ca9da2609b4b076bad66eae99aaf76ed9cb05dfdae68a92e1d8762f5656d978e51b6

    • \Users\Admin\AppData\LocalLow\sqlite3.dll
      MD5

      f964811b68f9f1487c2b41e1aef576ce

      SHA1

      b423959793f14b1416bc3b7051bed58a1034025f

      SHA256

      83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

      SHA512

      565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

    • \Users\Admin\AppData\Local\Temp\1105.tmp
      MD5

      d124f55b9393c976963407dff51ffa79

      SHA1

      2c7bbedd79791bfb866898c85b504186db610b5d

      SHA256

      ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

      SHA512

      278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

    • \Users\Admin\AppData\Local\Temp\AE30.tmp
      MD5

      d124f55b9393c976963407dff51ffa79

      SHA1

      2c7bbedd79791bfb866898c85b504186db610b5d

      SHA256

      ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

      SHA512

      278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

    • \Users\Admin\AppData\Local\Temp\BA4C.exe
      MD5

      3df352000081d21c5429ff7b1afa7d59

      SHA1

      9499f195ddded99fac37c5b9a62181c504009e8c

      SHA256

      ff72db897e442ba3a8d70e7c469220a6d8f75616c2683a2c57fa1aacf516cb37

      SHA512

      cac3714eaf215de9754bbe06b132dccf8c744de22f300f449eb1c346e48f92eca1421de278242b438d4bd7de8dec3285d0457893ec1a20e90cc172a135fe3534

    • memory/564-96-0x0000000000220000-0x000000000024F000-memory.dmp
      Filesize

      188KB

    • memory/564-94-0x0000000000510000-0x000000000052B000-memory.dmp
      Filesize

      108KB

    • memory/564-83-0x0000000000000000-mapping.dmp
    • memory/564-103-0x00000000020C3000-0x00000000020C4000-memory.dmp
      Filesize

      4KB

    • memory/564-104-0x00000000020C4000-0x00000000020C6000-memory.dmp
      Filesize

      8KB

    • memory/564-101-0x00000000020C2000-0x00000000020C3000-memory.dmp
      Filesize

      4KB

    • memory/564-98-0x0000000001E70000-0x0000000001E89000-memory.dmp
      Filesize

      100KB

    • memory/564-97-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB

    • memory/564-95-0x00000000020C1000-0x00000000020C2000-memory.dmp
      Filesize

      4KB

    • memory/780-77-0x0000000000280000-0x0000000000281000-memory.dmp
      Filesize

      4KB

    • memory/780-82-0x00000000048F0000-0x00000000048F1000-memory.dmp
      Filesize

      4KB

    • memory/780-74-0x0000000000000000-mapping.dmp
    • memory/828-60-0x0000000000402F68-mapping.dmp
    • memory/828-59-0x0000000000400000-0x000000000040C000-memory.dmp
      Filesize

      48KB

    • memory/828-61-0x0000000075551000-0x0000000075553000-memory.dmp
      Filesize

      8KB

    • memory/828-108-0x0000000000000000-mapping.dmp
    • memory/948-105-0x0000000000400000-0x000000000049E000-memory.dmp
      Filesize

      632KB

    • memory/948-93-0x0000000001CD0000-0x0000000001D61000-memory.dmp
      Filesize

      580KB

    • memory/948-80-0x0000000000000000-mapping.dmp
    • memory/1164-63-0x0000000000220000-0x000000000022C000-memory.dmp
      Filesize

      48KB

    • memory/1264-65-0x0000000002AB0000-0x0000000002AC7000-memory.dmp
      Filesize

      92KB

    • memory/1464-66-0x0000000000000000-mapping.dmp
    • memory/1584-90-0x0000000000000000-mapping.dmp
    • memory/1584-112-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/1584-111-0x0000000000220000-0x0000000000229000-memory.dmp
      Filesize

      36KB

    • memory/1700-116-0x0000000000000000-mapping.dmp
    • memory/1716-88-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/1716-85-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/1716-102-0x0000000004D60000-0x0000000004D61000-memory.dmp
      Filesize

      4KB

    • memory/1716-86-0x0000000000417E96-mapping.dmp
    • memory/1948-70-0x0000000000000000-mapping.dmp
    • memory/1996-99-0x0000000000000000-mapping.dmp
    • memory/1996-117-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB

    • memory/1996-119-0x00000000047D1000-0x00000000047D2000-memory.dmp
      Filesize

      4KB

    • memory/1996-120-0x00000000047D2000-0x00000000047D3000-memory.dmp
      Filesize

      4KB

    • memory/1996-121-0x00000000047D3000-0x00000000047D4000-memory.dmp
      Filesize

      4KB