Resubmissions

25-08-2021 11:28

210825-3e8bjc7wk2 10

24-08-2021 15:16

210824-gjaqrtfdlx 10

Analysis

  • max time kernel
    156s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    24-08-2021 15:16

General

  • Target

    00ee7ae265bb48ce6ab52a0bcb509bba.exe

  • Size

    151KB

  • MD5

    00ee7ae265bb48ce6ab52a0bcb509bba

  • SHA1

    81eabf190ad78bd544e8dae5e1b47dd95ffb2fb7

  • SHA256

    08ed53a3a85b3f17d9b15fd7e5eaf5184ac569443e42abae9ae5f5bdbf6bec61

  • SHA512

    10409d05d658f12c20527addfb6f290ca1f8f447f3662b0dd910ccf13081520a8f7038c39c7f130af1fbdc7ad8453abf57cef2cfd8c6e284e1f0f3117deb762e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

fe582536ec580228180f270f7cb80a867860e010

Attributes
  • url4cnc

    https://telete.in/xylichanjk

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

40.1

Botnet

824

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    824

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ee7ae265bb48ce6ab52a0bcb509bba.exe
    "C:\Users\Admin\AppData\Local\Temp\00ee7ae265bb48ce6ab52a0bcb509bba.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\00ee7ae265bb48ce6ab52a0bcb509bba.exe
      "C:\Users\Admin\AppData\Local\Temp\00ee7ae265bb48ce6ab52a0bcb509bba.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:876
  • C:\Users\Admin\AppData\Local\Temp\AF71.exe
    C:\Users\Admin\AppData\Local\Temp\AF71.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:1584
  • C:\Users\Admin\AppData\Local\Temp\B07C.exe
    C:\Users\Admin\AppData\Local\Temp\B07C.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:1704
  • C:\Users\Admin\AppData\Local\Temp\B212.exe
    C:\Users\Admin\AppData\Local\Temp\B212.exe
    1⤵
    • Executes dropped EXE
    PID:1528
  • C:\Users\Admin\AppData\Local\Temp\B9C1.exe
    C:\Users\Admin\AppData\Local\Temp\B9C1.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:580
  • C:\Users\Admin\AppData\Local\Temp\BCBE.exe
    C:\Users\Admin\AppData\Local\Temp\BCBE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jkmlrqmw\
      2⤵
        PID:1088
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\uhyhzmoi.exe" C:\Windows\SysWOW64\jkmlrqmw\
        2⤵
          PID:1508
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create jkmlrqmw binPath= "C:\Windows\SysWOW64\jkmlrqmw\uhyhzmoi.exe /d\"C:\Users\Admin\AppData\Local\Temp\BCBE.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:516
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description jkmlrqmw "wifi internet conection"
            2⤵
              PID:1540
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start jkmlrqmw
              2⤵
                PID:2028
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1728
              • C:\Users\Admin\AppData\Local\Temp\C0A6.exe
                C:\Users\Admin\AppData\Local\Temp\C0A6.exe
                1⤵
                • Executes dropped EXE
                PID:1548
              • C:\Users\Admin\AppData\Local\Temp\C8B2.exe
                C:\Users\Admin\AppData\Local\Temp\C8B2.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:980
              • C:\Users\Admin\AppData\Local\Temp\CC1C.exe
                C:\Users\Admin\AppData\Local\Temp\CC1C.exe
                1⤵
                • Executes dropped EXE
                PID:1292
              • C:\Windows\SysWOW64\jkmlrqmw\uhyhzmoi.exe
                C:\Windows\SysWOW64\jkmlrqmw\uhyhzmoi.exe /d"C:\Users\Admin\AppData\Local\Temp\BCBE.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:476
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                    PID:1308
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:1104
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:1836
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:2016
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:1592

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Persistence

                        New Service

                        1
                        T1050

                        Modify Existing Service

                        1
                        T1031

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Privilege Escalation

                        New Service

                        1
                        T1050

                        Defense Evasion

                        Virtualization/Sandbox Evasion

                        1
                        T1497

                        Modify Registry

                        2
                        T1112

                        Install Root Certificate

                        1
                        T1130

                        Credential Access

                        Credentials in Files

                        1
                        T1081

                        Discovery

                        Query Registry

                        3
                        T1012

                        Virtualization/Sandbox Evasion

                        1
                        T1497

                        System Information Discovery

                        4
                        T1082

                        Peripheral Device Discovery

                        1
                        T1120

                        Collection

                        Data from Local System

                        1
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\AF71.exe
                          MD5

                          a69e12607d01237460808fa1709e5e86

                          SHA1

                          4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                          SHA256

                          188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                          SHA512

                          7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                        • C:\Users\Admin\AppData\Local\Temp\B07C.exe
                          MD5

                          160f931b678affb93d3aff2dd5a65734

                          SHA1

                          cbfff062a78f532b4619fbf386ff4b7b9299e690

                          SHA256

                          cc64a8243582378c46ab8b2f3c69a544fe522934856701756cb612492d59085d

                          SHA512

                          1fdfe8e49dff9d16cefe7740faace089ea706e1a9cc8597f27bd7af05ed5902acb0bd238fc514954a1cd069c2869e207d5b32e05dcf61327123465a33f25ff4f

                        • C:\Users\Admin\AppData\Local\Temp\B212.exe
                          MD5

                          bf40705cba9708182b61956985895005

                          SHA1

                          174c659e0d225b1ea0eb5a7e8d30911d17ad06a4

                          SHA256

                          6325c9ffbedd8d4a4d676d6dc5e790e6d99a65f1e3c621df7ec275ab7b047565

                          SHA512

                          f01c4764675238503776b00b0b72e0727c531908499043b4043029f495dc2f8c19db281c98ec00fdc74e5a67ecfbc7f04a2c10fefb0ba03e5d28b9d8de292600

                        • C:\Users\Admin\AppData\Local\Temp\B9C1.exe
                          MD5

                          9aa6dd10e0bfb49baa17f04f44b9dcd3

                          SHA1

                          09ad5a6ae8a6396e7bdf783cd124417cd7515c7a

                          SHA256

                          a07cf8a0e1fadc8ab20dbe35341f1febb3a0b2e42c8f5991c0cc397b130d7621

                          SHA512

                          601f36f703ee396dba325349aa25440270c1cee6e069146c1ed7f03e96fe5fc30dead138e7f3b713549b815635e64aa97a10054e71a415690e622c417bbfbb4d

                        • C:\Users\Admin\AppData\Local\Temp\BCBE.exe
                          MD5

                          af007477429a79870f65d8197e063482

                          SHA1

                          91ac5d115356eaca0d61b9d528913310c08f288c

                          SHA256

                          39a75660bc1eaf33a1f9ab70d757e9e3c39da875f3b7bec38f9e34e635b48d59

                          SHA512

                          52096f47a92b70a6adcc091f7a8ce26b49b92659a6fb07394bbd4a23374b7e2c60c44337688a5cd881bd6a84e157fd981a4b0d7382aeec9d7908e26ad29a56a4

                        • C:\Users\Admin\AppData\Local\Temp\BCBE.exe
                          MD5

                          af007477429a79870f65d8197e063482

                          SHA1

                          91ac5d115356eaca0d61b9d528913310c08f288c

                          SHA256

                          39a75660bc1eaf33a1f9ab70d757e9e3c39da875f3b7bec38f9e34e635b48d59

                          SHA512

                          52096f47a92b70a6adcc091f7a8ce26b49b92659a6fb07394bbd4a23374b7e2c60c44337688a5cd881bd6a84e157fd981a4b0d7382aeec9d7908e26ad29a56a4

                        • C:\Users\Admin\AppData\Local\Temp\C0A6.exe
                          MD5

                          04919ad7122ec564d5dab5eb2a8a1468

                          SHA1

                          6ef8c3ce860d43452c5f4bc64df7c5387df1f095

                          SHA256

                          e78bcc0fa26a3bcf50b639137f2ca0b051d2e50cc059cab51bf6214ca2a03a5f

                          SHA512

                          e939fc1f7b9bff55e8194cddea3c62f4e35ca332599e703c794a50fc6ab909173434a2cbf5043c505bc24f59f1bb43d5ba6f7d8aab72c03475db4be623700e54

                        • C:\Users\Admin\AppData\Local\Temp\C8B2.exe
                          MD5

                          4d15b96e5605683ecc39b4b9bef91f48

                          SHA1

                          42c321262d73b2a96076c31c192be778af53cd79

                          SHA256

                          a166a9cbabe0026a4cc2c03f242e03c533f0ee47e3105a5357eac11693d68d8e

                          SHA512

                          c630464f6cfe447b5d500e595c5f0160773d9cad385ef2ad5dde17bb7bd8f78c2e7048c95737b74cee2826581ca49dc42067e628f5e438f2ec3a9d0115e43f6b

                        • C:\Users\Admin\AppData\Local\Temp\C8B2.exe
                          MD5

                          6d89c423c9dfc634931d3e7868a5d280

                          SHA1

                          b75a2d929d6d18bd0849a02d9e4ef3b32ecd15c5

                          SHA256

                          fb939195d7d78c0b8d0013ca350a4015c5268af172567fb99117f27c430db8fa

                          SHA512

                          d78ec9fff874eb19e604205c4ca500b5fa503e959c7b7a46eb355af9b60184b7b971b405f4ecd7d25d0a877abaa3e379919413013a52de926d0530e2e1d3cc43

                        • C:\Users\Admin\AppData\Local\Temp\CC1C.exe
                          MD5

                          e70ceaf1fc7771d3d791aedc0c2068a7

                          SHA1

                          97912679527c910bdf4c97265656f4c2527245db

                          SHA256

                          0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                          SHA512

                          6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                        • C:\Users\Admin\AppData\Local\Temp\uhyhzmoi.exe
                          MD5

                          faea9c8e0f263b98a535ab0153829052

                          SHA1

                          11f8c50fb4b2b103d12d9ad55530701dc0d060af

                          SHA256

                          bdee851249080ad50a4e9e54d4b3072967164059347e927e94cad33a4468c1c5

                          SHA512

                          b5ee0deb1ea29f07a7e42528563d00ff53dc657ec7fe667c7bfd2b01cb608ba29ad6341928fbec684fae287a3ff9efc4c74b6e0c18a7294db0d52390a277062c

                        • C:\Windows\SysWOW64\jkmlrqmw\uhyhzmoi.exe
                          MD5

                          5bf8d84a1d6f9c0f394149798b0ee1c2

                          SHA1

                          25dfa8f31bc773e877488085d1c46e86c1f54d39

                          SHA256

                          00862cf53535081a7c56332f891190cd3bb953a448ba454d446514bee66ffe5d

                          SHA512

                          7263002543d8aeac089124e9b53d2c6ebf3da555dc4dfe07c35b6068cdb39c12038002d74eb0ab81a925f51c30da8a4beef5d622fc0bfff59156806937acf537

                        • \Users\Admin\AppData\LocalLow\sqlite3.dll
                          MD5

                          f964811b68f9f1487c2b41e1aef576ce

                          SHA1

                          b423959793f14b1416bc3b7051bed58a1034025f

                          SHA256

                          83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                          SHA512

                          565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                        • memory/476-117-0x0000000000400000-0x0000000002CC4000-memory.dmp
                          Filesize

                          40.8MB

                        • memory/516-104-0x0000000000000000-mapping.dmp
                        • memory/580-108-0x0000000005300000-0x0000000005301000-memory.dmp
                          Filesize

                          4KB

                        • memory/580-78-0x0000000000000000-mapping.dmp
                        • memory/580-92-0x0000000000EE0000-0x0000000000EE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/876-63-0x00000000760B1000-0x00000000760B3000-memory.dmp
                          Filesize

                          8KB

                        • memory/876-62-0x0000000000402FAB-mapping.dmp
                        • memory/876-61-0x0000000000400000-0x0000000000409000-memory.dmp
                          Filesize

                          36KB

                        • memory/980-116-0x0000000005000000-0x0000000005001000-memory.dmp
                          Filesize

                          4KB

                        • memory/980-101-0x0000000000DA0000-0x0000000000DA1000-memory.dmp
                          Filesize

                          4KB

                        • memory/980-123-0x0000000000330000-0x0000000000331000-memory.dmp
                          Filesize

                          4KB

                        • memory/980-98-0x0000000000000000-mapping.dmp
                        • memory/1088-94-0x0000000000000000-mapping.dmp
                        • memory/1104-129-0x00000000001D0000-0x0000000000244000-memory.dmp
                          Filesize

                          464KB

                        • memory/1104-130-0x0000000000080000-0x00000000000EB000-memory.dmp
                          Filesize

                          428KB

                        • memory/1104-121-0x00000000731B1000-0x00000000731B3000-memory.dmp
                          Filesize

                          8KB

                        • memory/1104-114-0x0000000000000000-mapping.dmp
                        • memory/1276-64-0x0000000003C00000-0x0000000003C16000-memory.dmp
                          Filesize

                          88KB

                        • memory/1292-105-0x0000000000000000-mapping.dmp
                        • memory/1308-118-0x0000000000080000-0x0000000000095000-memory.dmp
                          Filesize

                          84KB

                        • memory/1308-119-0x0000000000089A6B-mapping.dmp
                        • memory/1508-96-0x0000000000000000-mapping.dmp
                        • memory/1528-83-0x0000000000400000-0x0000000002402000-memory.dmp
                          Filesize

                          32.0MB

                        • memory/1528-77-0x0000000000220000-0x00000000002BD000-memory.dmp
                          Filesize

                          628KB

                        • memory/1528-71-0x0000000000000000-mapping.dmp
                        • memory/1540-109-0x0000000000000000-mapping.dmp
                        • memory/1548-87-0x0000000000000000-mapping.dmp
                        • memory/1548-97-0x0000000002F60000-0x0000000002FEF000-memory.dmp
                          Filesize

                          572KB

                        • memory/1584-65-0x0000000000000000-mapping.dmp
                        • memory/1592-133-0x0000000000000000-mapping.dmp
                        • memory/1704-69-0x0000000000000000-mapping.dmp
                        • memory/1704-74-0x0000000004430000-0x00000000044BF000-memory.dmp
                          Filesize

                          572KB

                        • memory/1704-76-0x0000000000400000-0x0000000002D05000-memory.dmp
                          Filesize

                          41.0MB

                        • memory/1728-111-0x0000000000000000-mapping.dmp
                        • memory/1836-122-0x0000000000000000-mapping.dmp
                        • memory/1836-124-0x00000000000F0000-0x00000000000F7000-memory.dmp
                          Filesize

                          28KB

                        • memory/1836-125-0x00000000000E0000-0x00000000000EC000-memory.dmp
                          Filesize

                          48KB

                        • memory/1944-60-0x0000000000220000-0x000000000022A000-memory.dmp
                          Filesize

                          40KB

                        • memory/2016-126-0x0000000000000000-mapping.dmp
                        • memory/2016-128-0x000000006D1C1000-0x000000006D1C3000-memory.dmp
                          Filesize

                          8KB

                        • memory/2016-131-0x0000000000090000-0x0000000000097000-memory.dmp
                          Filesize

                          28KB

                        • memory/2016-132-0x0000000000080000-0x000000000008B000-memory.dmp
                          Filesize

                          44KB

                        • memory/2028-110-0x0000000000000000-mapping.dmp
                        • memory/2044-80-0x0000000000000000-mapping.dmp
                        • memory/2044-91-0x0000000000400000-0x0000000002CC4000-memory.dmp
                          Filesize

                          40.8MB

                        • memory/2044-90-0x0000000000220000-0x0000000000233000-memory.dmp
                          Filesize

                          76KB