Analysis

  • max time kernel
    152s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    13-08-2021 23:27

General

  • Target

    b8e04f3b9b2d02a74160b5caf3d97920.exe

  • Size

    180KB

  • MD5

    b8e04f3b9b2d02a74160b5caf3d97920

  • SHA1

    a2f3e098063f88753b67757a604d3e7ad488011b

  • SHA256

    997499f31dad747c5fb8258b729752c920af63fba6d0f1bd219a8300c3c23feb

  • SHA512

    a6729a7200dfeed2ca3ea4a3405238d6cf252f796ddef9872d74e69ad555b0fe48dff0c2d73c779d0b802416ece6af25ee4e808eaa675ed5728dac2d0f75f97c

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

MIX#13.08

C2

qusshedrni.xyz:80

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8e04f3b9b2d02a74160b5caf3d97920.exe
    "C:\Users\Admin\AppData\Local\Temp\b8e04f3b9b2d02a74160b5caf3d97920.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\b8e04f3b9b2d02a74160b5caf3d97920.exe
      "C:\Users\Admin\AppData\Local\Temp\b8e04f3b9b2d02a74160b5caf3d97920.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1520
  • C:\Users\Admin\AppData\Local\Temp\B3F4.exe
    C:\Users\Admin\AppData\Local\Temp\B3F4.exe
    1⤵
    • Executes dropped EXE
    PID:3184
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 736
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 784
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 848
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 896
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 852
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3648
  • C:\Users\Admin\AppData\Local\Temp\B52D.exe
    C:\Users\Admin\AppData\Local\Temp\B52D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1376
  • C:\Users\Admin\AppData\Local\Temp\B79F.exe
    C:\Users\Admin\AppData\Local\Temp\B79F.exe
    1⤵
    • Executes dropped EXE
    PID:3068
  • C:\Users\Admin\AppData\Local\Temp\B82D.exe
    C:\Users\Admin\AppData\Local\Temp\B82D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
      C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Users\Admin\Windows Application Manager\winappmgr.exe
        "C:\Users\Admin\Windows Application Manager\winappmgr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\admin\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\admin\windows application manager\winappmgr.exe" program="C:\Users\Admin\Windows Application Manager\winappmgr.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4040
          • C:\Windows\SysWOW64\netsh.exe
            netsh advfirewall firewall show rule name="c:\users\admin\windows application manager\winappmgr.exe"
            5⤵
              PID:3912
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\admin\windows application manager\winappmgr.exe" program="C:\Users\Admin\Windows Application Manager\winappmgr.exe"
              5⤵
                PID:3168
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:1300
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:3836
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:1856
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:2324
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:3992
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:2188
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:2268
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:1184
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:3472

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Persistence

                        Modify Existing Service

                        1
                        T1031

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Defense Evasion

                        Modify Registry

                        1
                        T1112

                        Credential Access

                        Credentials in Files

                        2
                        T1081

                        Discovery

                        Query Registry

                        3
                        T1012

                        System Information Discovery

                        3
                        T1082

                        Peripheral Device Discovery

                        1
                        T1120

                        Collection

                        Data from Local System

                        2
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\B3F4.exe
                          MD5

                          ed20a01ec2d93943bd0664fafb76daa6

                          SHA1

                          4736f0170c32b4757e062eb6b1d47d46c7d5ab29

                          SHA256

                          5bc02ebc009910c9625991d64f2170d0c1ddd2b403d34674e3b48e8fd0f22242

                          SHA512

                          b22360f22bb48529b2b986f7ef37eb9d1cdb42eaaea7fa44b93fc48a0f2b02ee4d4029d1d0e80867ce0a8d8a322f9c463182910c83cc36d4b53fb2c50c470ccf

                        • C:\Users\Admin\AppData\Local\Temp\B3F4.exe
                          MD5

                          ed20a01ec2d93943bd0664fafb76daa6

                          SHA1

                          4736f0170c32b4757e062eb6b1d47d46c7d5ab29

                          SHA256

                          5bc02ebc009910c9625991d64f2170d0c1ddd2b403d34674e3b48e8fd0f22242

                          SHA512

                          b22360f22bb48529b2b986f7ef37eb9d1cdb42eaaea7fa44b93fc48a0f2b02ee4d4029d1d0e80867ce0a8d8a322f9c463182910c83cc36d4b53fb2c50c470ccf

                        • C:\Users\Admin\AppData\Local\Temp\B52D.exe
                          MD5

                          5d7a2f3127f3faa3777e4b61c6d3a650

                          SHA1

                          5d1ee1d08f62309d55f7a9be5d0cbe048455f5aa

                          SHA256

                          0c94e48c304317df32d5a06e21d350ae528276ead8da38b7e33649cfa21f438f

                          SHA512

                          2332d62b943465e2b1409c5d4c1aa2dfe8e3808bd2ec6ad22b3e4136a94ff9d2c90776e74b84226e280e27ef0b36b69eb3a0ddfdc8115540e1f7e50dce6eb7df

                        • C:\Users\Admin\AppData\Local\Temp\B52D.exe
                          MD5

                          5d7a2f3127f3faa3777e4b61c6d3a650

                          SHA1

                          5d1ee1d08f62309d55f7a9be5d0cbe048455f5aa

                          SHA256

                          0c94e48c304317df32d5a06e21d350ae528276ead8da38b7e33649cfa21f438f

                          SHA512

                          2332d62b943465e2b1409c5d4c1aa2dfe8e3808bd2ec6ad22b3e4136a94ff9d2c90776e74b84226e280e27ef0b36b69eb3a0ddfdc8115540e1f7e50dce6eb7df

                        • C:\Users\Admin\AppData\Local\Temp\B79F.exe
                          MD5

                          627fc88e4e32885ef3eb655f353d3d73

                          SHA1

                          d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                          SHA256

                          789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                          SHA512

                          c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                        • C:\Users\Admin\AppData\Local\Temp\B79F.exe
                          MD5

                          627fc88e4e32885ef3eb655f353d3d73

                          SHA1

                          d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                          SHA256

                          789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                          SHA512

                          c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                        • C:\Users\Admin\AppData\Local\Temp\B82D.exe
                          MD5

                          627fc88e4e32885ef3eb655f353d3d73

                          SHA1

                          d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                          SHA256

                          789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                          SHA512

                          c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                        • C:\Users\Admin\AppData\Local\Temp\B82D.exe
                          MD5

                          627fc88e4e32885ef3eb655f353d3d73

                          SHA1

                          d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                          SHA256

                          789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                          SHA512

                          c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                        • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
                          MD5

                          39d6ec1892af37c0fd5c5c2ea89ea782

                          SHA1

                          8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                          SHA256

                          439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                          SHA512

                          fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                        • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
                          MD5

                          39d6ec1892af37c0fd5c5c2ea89ea782

                          SHA1

                          8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                          SHA256

                          439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                          SHA512

                          fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                        • C:\Users\Admin\Windows Application Manager\winappmgr.exe
                          MD5

                          39d6ec1892af37c0fd5c5c2ea89ea782

                          SHA1

                          8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                          SHA256

                          439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                          SHA512

                          fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                        • C:\Users\Admin\Windows Application Manager\winappmgr.exe
                          MD5

                          39d6ec1892af37c0fd5c5c2ea89ea782

                          SHA1

                          8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                          SHA256

                          439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                          SHA512

                          fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                        • memory/1184-169-0x0000000000000000-mapping.dmp
                        • memory/1184-170-0x00000000003A0000-0x00000000003A5000-memory.dmp
                          Filesize

                          20KB

                        • memory/1184-171-0x0000000000390000-0x0000000000399000-memory.dmp
                          Filesize

                          36KB

                        • memory/1300-136-0x0000000003400000-0x0000000003474000-memory.dmp
                          Filesize

                          464KB

                        • memory/1300-130-0x0000000000000000-mapping.dmp
                        • memory/1300-137-0x0000000003180000-0x00000000031EB000-memory.dmp
                          Filesize

                          428KB

                        • memory/1376-149-0x0000000007A10000-0x0000000007A11000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-133-0x0000000000400000-0x0000000002CD5000-memory.dmp
                          Filesize

                          40.8MB

                        • memory/1376-187-0x0000000009C20000-0x0000000009C21000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-186-0x0000000009A40000-0x0000000009A41000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-132-0x0000000002E30000-0x0000000002E5F000-memory.dmp
                          Filesize

                          188KB

                        • memory/1376-185-0x0000000009950000-0x0000000009951000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-184-0x00000000094D0000-0x00000000094D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-139-0x0000000007500000-0x0000000007501000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-183-0x0000000008EA0000-0x0000000008EA1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-141-0x0000000004C20000-0x0000000004C3C000-memory.dmp
                          Filesize

                          112KB

                        • memory/1376-166-0x0000000007504000-0x0000000007506000-memory.dmp
                          Filesize

                          8KB

                        • memory/1376-143-0x0000000007510000-0x0000000007511000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-144-0x0000000007502000-0x0000000007503000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-145-0x0000000007503000-0x0000000007504000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-165-0x0000000007340000-0x0000000007341000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-121-0x0000000000000000-mapping.dmp
                        • memory/1376-148-0x0000000004C90000-0x0000000004CAA000-memory.dmp
                          Filesize

                          104KB

                        • memory/1376-172-0x0000000008020000-0x0000000008021000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-156-0x0000000004E90000-0x0000000004E91000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-181-0x0000000008CD0000-0x0000000008CD1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-154-0x0000000004E70000-0x0000000004E71000-memory.dmp
                          Filesize

                          4KB

                        • memory/1520-114-0x0000000000400000-0x0000000000409000-memory.dmp
                          Filesize

                          36KB

                        • memory/1520-115-0x0000000000402E1A-mapping.dmp
                        • memory/1732-151-0x0000000000000000-mapping.dmp
                        • memory/1856-142-0x0000000000000000-mapping.dmp
                        • memory/1856-146-0x0000000000A60000-0x0000000000A67000-memory.dmp
                          Filesize

                          28KB

                        • memory/1856-147-0x0000000000A50000-0x0000000000A5B000-memory.dmp
                          Filesize

                          44KB

                        • memory/2188-161-0x0000000000000000-mapping.dmp
                        • memory/2188-162-0x00000000009A0000-0x00000000009A6000-memory.dmp
                          Filesize

                          24KB

                        • memory/2188-163-0x0000000000990000-0x000000000099C000-memory.dmp
                          Filesize

                          48KB

                        • memory/2268-164-0x0000000000000000-mapping.dmp
                        • memory/2268-167-0x0000000000810000-0x0000000000814000-memory.dmp
                          Filesize

                          16KB

                        • memory/2268-168-0x0000000000800000-0x0000000000809000-memory.dmp
                          Filesize

                          36KB

                        • memory/2324-157-0x00000000012B0000-0x00000000012BF000-memory.dmp
                          Filesize

                          60KB

                        • memory/2324-155-0x00000000012C0000-0x00000000012C9000-memory.dmp
                          Filesize

                          36KB

                        • memory/2324-150-0x0000000000000000-mapping.dmp
                        • memory/2460-176-0x0000000000000000-mapping.dmp
                        • memory/3016-117-0x00000000012D0000-0x00000000012E6000-memory.dmp
                          Filesize

                          88KB

                        • memory/3068-124-0x0000000000000000-mapping.dmp
                        • memory/3168-182-0x0000000000000000-mapping.dmp
                        • memory/3184-134-0x0000000000400000-0x0000000002D01000-memory.dmp
                          Filesize

                          41.0MB

                        • memory/3184-131-0x0000000002E10000-0x0000000002F5A000-memory.dmp
                          Filesize

                          1.3MB

                        • memory/3184-118-0x0000000000000000-mapping.dmp
                        • memory/3356-127-0x0000000000000000-mapping.dmp
                        • memory/3472-173-0x0000000000000000-mapping.dmp
                        • memory/3472-174-0x00000000031E0000-0x00000000031E5000-memory.dmp
                          Filesize

                          20KB

                        • memory/3472-175-0x00000000031D0000-0x00000000031D9000-memory.dmp
                          Filesize

                          36KB

                        • memory/3836-138-0x0000000000C00000-0x0000000000C07000-memory.dmp
                          Filesize

                          28KB

                        • memory/3836-140-0x00000000009F0000-0x00000000009FC000-memory.dmp
                          Filesize

                          48KB

                        • memory/3836-135-0x0000000000000000-mapping.dmp
                        • memory/3912-180-0x0000000000000000-mapping.dmp
                        • memory/3992-160-0x0000000000BA0000-0x0000000000BA9000-memory.dmp
                          Filesize

                          36KB

                        • memory/3992-158-0x0000000000000000-mapping.dmp
                        • memory/3992-159-0x0000000000BB0000-0x0000000000BB5000-memory.dmp
                          Filesize

                          20KB

                        • memory/4040-179-0x0000000000000000-mapping.dmp
                        • memory/4060-116-0x0000000002DA0000-0x0000000002DAA000-memory.dmp
                          Filesize

                          40KB