Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-08-2021 17:11
Static task
static1
Behavioral task
behavioral1
Sample
5984c5c2b4ccc824c196ad3a9f966013.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
5984c5c2b4ccc824c196ad3a9f966013.exe
Resource
win10v20210408
General
-
Target
5984c5c2b4ccc824c196ad3a9f966013.exe
-
Size
151KB
-
MD5
5984c5c2b4ccc824c196ad3a9f966013
-
SHA1
6f5c96fb67b4b88d08d0b4e28001421366c4cd66
-
SHA256
7e92233d9ad854b672068825a64c442ed8e6f4f283729c874296278e235d7241
-
SHA512
443ba4a8df892f3d0a6a7bc70233c639e92af87e9beb38dbdd4396f0896dd640a1fde3e513a73de6b13c6add3801bc34b90659bcd0e71cc05eb7fdb0c1c573b8
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
raccoon
fe582536ec580228180f270f7cb80a867860e010
-
url4cnc
https://telete.in/xylichanjk
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral1/files/0x00040000000130cb-72.dat family_redline behavioral1/files/0x00040000000130ce-93.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
resource yara_rule behavioral1/files/0x00030000000130d6-112.dat Nirsoft behavioral1/files/0x00030000000130d6-113.dat Nirsoft behavioral1/files/0x00030000000130d6-115.dat Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 1512 BF97.exe 912 C0C1.exe 820 C3DD.exe 1564 CF72.exe 924 D6F2.exe 904 DBC4.exe 1276 E566.exe 684 EBFB.exe 1648 AdvancedRun.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CF72.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion D6F2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion D6F2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DBC4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DBC4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C3DD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C3DD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CF72.exe -
Deletes itself 1 IoCs
pid Process 1200 Process not Found -
Loads dropped DLL 3 IoCs
pid Process 912 C0C1.exe 1276 E566.exe 1276 E566.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00040000000130cb-72.dat themida behavioral1/memory/820-76-0x0000000000F30000-0x0000000000F31000-memory.dmp themida behavioral1/files/0x00040000000130cc-81.dat themida behavioral1/memory/1564-85-0x00000000001A0000-0x00000000001A1000-memory.dmp themida behavioral1/files/0x00040000000130cd-88.dat themida behavioral1/files/0x00040000000130ce-93.dat themida behavioral1/memory/924-94-0x00000000001D0000-0x00000000001D1000-memory.dmp themida behavioral1/memory/904-98-0x0000000000930000-0x0000000000931000-memory.dmp themida behavioral1/files/0x00040000000130d8-111.dat themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA D6F2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DBC4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C3DD.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CF72.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 820 C3DD.exe 1564 CF72.exe 924 D6F2.exe 904 DBC4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1828 set thread context of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5984c5c2b4ccc824c196ad3a9f966013.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5984c5c2b4ccc824c196ad3a9f966013.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5984c5c2b4ccc824c196ad3a9f966013.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 C0C1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 C0C1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1808 5984c5c2b4ccc824c196ad3a9f966013.exe 1808 5984c5c2b4ccc824c196ad3a9f966013.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1808 5984c5c2b4ccc824c196ad3a9f966013.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeDebugPrivilege 924 D6F2.exe Token: SeDebugPrivilege 1564 CF72.exe Token: SeShutdownPrivilege 1200 Process not Found Token: SeDebugPrivilege 1648 AdvancedRun.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1512 BF97.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 PID 1828 wrote to memory of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 PID 1828 wrote to memory of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 PID 1828 wrote to memory of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 PID 1828 wrote to memory of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 PID 1828 wrote to memory of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 PID 1828 wrote to memory of 1808 1828 5984c5c2b4ccc824c196ad3a9f966013.exe 25 PID 1200 wrote to memory of 1512 1200 Process not Found 30 PID 1200 wrote to memory of 1512 1200 Process not Found 30 PID 1200 wrote to memory of 1512 1200 Process not Found 30 PID 1200 wrote to memory of 1512 1200 Process not Found 30 PID 1200 wrote to memory of 912 1200 Process not Found 31 PID 1200 wrote to memory of 912 1200 Process not Found 31 PID 1200 wrote to memory of 912 1200 Process not Found 31 PID 1200 wrote to memory of 912 1200 Process not Found 31 PID 1200 wrote to memory of 820 1200 Process not Found 32 PID 1200 wrote to memory of 820 1200 Process not Found 32 PID 1200 wrote to memory of 820 1200 Process not Found 32 PID 1200 wrote to memory of 820 1200 Process not Found 32 PID 1200 wrote to memory of 820 1200 Process not Found 32 PID 1200 wrote to memory of 820 1200 Process not Found 32 PID 1200 wrote to memory of 820 1200 Process not Found 32 PID 1200 wrote to memory of 1564 1200 Process not Found 34 PID 1200 wrote to memory of 1564 1200 Process not Found 34 PID 1200 wrote to memory of 1564 1200 Process not Found 34 PID 1200 wrote to memory of 1564 1200 Process not Found 34 PID 1200 wrote to memory of 1564 1200 Process not Found 34 PID 1200 wrote to memory of 1564 1200 Process not Found 34 PID 1200 wrote to memory of 1564 1200 Process not Found 34 PID 1200 wrote to memory of 924 1200 Process not Found 36 PID 1200 wrote to memory of 924 1200 Process not Found 36 PID 1200 wrote to memory of 924 1200 Process not Found 36 PID 1200 wrote to memory of 924 1200 Process not Found 36 PID 1200 wrote to memory of 924 1200 Process not Found 36 PID 1200 wrote to memory of 924 1200 Process not Found 36 PID 1200 wrote to memory of 924 1200 Process not Found 36 PID 1200 wrote to memory of 904 1200 Process not Found 38 PID 1200 wrote to memory of 904 1200 Process not Found 38 PID 1200 wrote to memory of 904 1200 Process not Found 38 PID 1200 wrote to memory of 904 1200 Process not Found 38 PID 1200 wrote to memory of 904 1200 Process not Found 38 PID 1200 wrote to memory of 904 1200 Process not Found 38 PID 1200 wrote to memory of 904 1200 Process not Found 38 PID 1200 wrote to memory of 1276 1200 Process not Found 40 PID 1200 wrote to memory of 1276 1200 Process not Found 40 PID 1200 wrote to memory of 1276 1200 Process not Found 40 PID 1200 wrote to memory of 1276 1200 Process not Found 40 PID 1200 wrote to memory of 684 1200 Process not Found 42 PID 1200 wrote to memory of 684 1200 Process not Found 42 PID 1200 wrote to memory of 684 1200 Process not Found 42 PID 1200 wrote to memory of 684 1200 Process not Found 42 PID 1200 wrote to memory of 684 1200 Process not Found 42 PID 1200 wrote to memory of 684 1200 Process not Found 42 PID 1200 wrote to memory of 684 1200 Process not Found 42 PID 1276 wrote to memory of 1648 1276 E566.exe 44 PID 1276 wrote to memory of 1648 1276 E566.exe 44 PID 1276 wrote to memory of 1648 1276 E566.exe 44 PID 1276 wrote to memory of 1648 1276 E566.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\5984c5c2b4ccc824c196ad3a9f966013.exe"C:\Users\Admin\AppData\Local\Temp\5984c5c2b4ccc824c196ad3a9f966013.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\5984c5c2b4ccc824c196ad3a9f966013.exe"C:\Users\Admin\AppData\Local\Temp\5984c5c2b4ccc824c196ad3a9f966013.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\BF97.exeC:\Users\Admin\AppData\Local\Temp\BF97.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
C:\Users\Admin\AppData\Local\Temp\C0C1.exeC:\Users\Admin\AppData\Local\Temp\C0C1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:912
-
C:\Users\Admin\AppData\Local\Temp\C3DD.exeC:\Users\Admin\AppData\Local\Temp\C3DD.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:820
-
C:\Users\Admin\AppData\Local\Temp\CF72.exeC:\Users\Admin\AppData\Local\Temp\CF72.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
C:\Users\Admin\AppData\Local\Temp\D6F2.exeC:\Users\Admin\AppData\Local\Temp\D6F2.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:924
-
C:\Users\Admin\AppData\Local\Temp\DBC4.exeC:\Users\Admin\AppData\Local\Temp\DBC4.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:904
-
C:\Users\Admin\AppData\Local\Temp\E566.exeC:\Users\Admin\AppData\Local\Temp\E566.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\805a9b90-ee3c-4f12-bec0-f2b94c59f31a\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\805a9b90-ee3c-4f12-bec0-f2b94c59f31a\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\805a9b90-ee3c-4f12-bec0-f2b94c59f31a\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\EBFB.exeC:\Users\Admin\AppData\Local\Temp\EBFB.exe1⤵
- Executes dropped EXE
PID:684
-
C:\Users\Admin\AppData\Local\Temp\EDB1.exeC:\Users\Admin\AppData\Local\Temp\EDB1.exe1⤵PID:1088