Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-08-2021 13:56
Static task
static1
Behavioral task
behavioral1
Sample
b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe
Resource
win10v20210410
General
-
Target
b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe
-
Size
277KB
-
MD5
417141e9d2e0fed64579e7ae12507eac
-
SHA1
51142084ed69f120bd232ee82aebb7aa45382359
-
SHA256
b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3
-
SHA512
bc15667948b9afce15a8f8142f06c5a60f75827a5ca0bd1e4790cd92de76adfa4de15a3c3bff0eac6663f7e2df9c42a1635d67d73f86905a77dff70ba0064c52
Malware Config
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\15D2.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
15D2.exepid process 432 15D2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
15D2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15D2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15D2.exe -
Deletes itself 1 IoCs
Processes:
pid process 1288 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\15D2.exe themida behavioral1/memory/432-68-0x00000000013C0000-0x00000000013C1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
15D2.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 15D2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
15D2.exepid process 432 15D2.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exepid process 1420 b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe 1420 b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1288 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exepid process 1420 b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
15D2.exedescription pid process Token: SeShutdownPrivilege 1288 Token: SeShutdownPrivilege 1288 Token: SeDebugPrivilege 432 15D2.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1288 1288 1288 1288 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1288 1288 1288 1288 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
description pid process target process PID 1288 wrote to memory of 432 1288 15D2.exe PID 1288 wrote to memory of 432 1288 15D2.exe PID 1288 wrote to memory of 432 1288 15D2.exe PID 1288 wrote to memory of 432 1288 15D2.exe PID 1288 wrote to memory of 432 1288 15D2.exe PID 1288 wrote to memory of 432 1288 15D2.exe PID 1288 wrote to memory of 432 1288 15D2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe"C:\Users\Admin\AppData\Local\Temp\b87200fd33230fb9a0c284b030ca1c07f5b63c379531de918c7da6288281c5e3.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1420
-
C:\Users\Admin\AppData\Local\Temp\15D2.exeC:\Users\Admin\AppData\Local\Temp\15D2.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1f6e49e83b13758948915b43fb388a94
SHA1c38876024e6e3cf46f804fc3d0aca553a263ffaf
SHA256624cfab55296eb7e9d73d9478455f96d4861ca92d45677909a7f2fb8532b1f63
SHA512462ed0fe61a8884bc337f7f970ab29c5e3b9dbe29a075fa385630febebfc8d0c0075cec46f4138c89667d4320c63fe296ec48fe6e82a895c02c33ea3441ca85f