Analysis
-
max time kernel
131s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
24-08-2021 22:57
Static task
static1
Behavioral task
behavioral1
Sample
b6ca7f11696f8c92f087336db50badff.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b6ca7f11696f8c92f087336db50badff.exe
Resource
win10v20210410
General
-
Target
b6ca7f11696f8c92f087336db50badff.exe
-
Size
270KB
-
MD5
b6ca7f11696f8c92f087336db50badff
-
SHA1
4535360e33b766a08a3dfa2627473a61c40e01b6
-
SHA256
144b62852807332093289be1ce09dfe1f0cced88cf19f54537befbfbea053627
-
SHA512
31d60231b46dc1422ae7c7773b88f5664e34962fd8f384ff36720d1b8eebdceb84f23a5e86dc3fd1023e035bc51ab17a2452c30b908c77202b782a3d6b08aed8
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/files/0x00050000000130f5-66.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
XMRig Miner Payload 1 IoCs
resource yara_rule behavioral1/memory/2912-231-0x00000000001F0000-0x00000000002E1000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 328 EF10.exe 340 EFBD.exe 1116 F46F.exe 1060 FB33.exe 1816 FCDA.exe 1536 3DD.exe 1940 bwlvafxv.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EF10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EF10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FB33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FB33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3DD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3DD.exe -
Deletes itself 1 IoCs
pid Process 1220 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 1116 F46F.exe -
resource yara_rule behavioral1/files/0x00050000000130f5-66.dat themida behavioral1/memory/328-71-0x0000000000A90000-0x0000000000A91000-memory.dmp themida behavioral1/files/0x00040000000130fe-89.dat themida behavioral1/memory/1060-97-0x0000000000EB0000-0x0000000000EB1000-memory.dmp themida behavioral1/files/0x0004000000013100-103.dat themida behavioral1/files/0x0004000000013100-111.dat themida behavioral1/memory/1536-114-0x00000000011D0000-0x00000000011D1000-memory.dmp themida behavioral1/files/0x000300000001310e-153.dat themida behavioral1/files/0x000300000001310e-155.dat themida behavioral1/files/0x000300000001310e-157.dat themida behavioral1/files/0x000300000001310e-163.dat themida behavioral1/files/0x000300000001310e-165.dat themida behavioral1/files/0x000300000001310e-162.dat themida behavioral1/files/0x0003000000013111-214.dat themida behavioral1/files/0x0003000000013111-207.dat themida behavioral1/files/0x0003000000013111-220.dat themida behavioral1/files/0x0003000000013111-219.dat themida behavioral1/files/0x0003000000013111-218.dat themida behavioral1/memory/2500-224-0x0000000001390000-0x0000000001391000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EF10.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FB33.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3DD.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 geoiptool.com 45 freegeoip.app 46 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 328 EF10.exe 1060 FB33.exe 1536 3DD.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1880 set thread context of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1940 set thread context of 936 1940 bwlvafxv.exe 56 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b6ca7f11696f8c92f087336db50badff.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b6ca7f11696f8c92f087336db50badff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b6ca7f11696f8c92f087336db50badff.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2084 PING.EXE 2144 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 b6ca7f11696f8c92f087336db50badff.exe 1912 b6ca7f11696f8c92f087336db50badff.exe 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1220 Process not Found -
Suspicious behavior: MapViewOfSection 11 IoCs
pid Process 1912 b6ca7f11696f8c92f087336db50badff.exe 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1220 Process not Found Token: SeShutdownPrivilege 1220 Process not Found Token: SeDebugPrivilege 1116 F46F.exe Token: SeShutdownPrivilege 1220 Process not Found Token: SeShutdownPrivilege 1220 Process not Found Token: SeDebugPrivilege 1536 3DD.exe Token: SeDebugPrivilege 328 EF10.exe Token: SeDebugPrivilege 1060 FB33.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1880 wrote to memory of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1880 wrote to memory of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1880 wrote to memory of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1880 wrote to memory of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1880 wrote to memory of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1880 wrote to memory of 1912 1880 b6ca7f11696f8c92f087336db50badff.exe 28 PID 1220 wrote to memory of 328 1220 Process not Found 30 PID 1220 wrote to memory of 328 1220 Process not Found 30 PID 1220 wrote to memory of 328 1220 Process not Found 30 PID 1220 wrote to memory of 328 1220 Process not Found 30 PID 1220 wrote to memory of 328 1220 Process not Found 30 PID 1220 wrote to memory of 328 1220 Process not Found 30 PID 1220 wrote to memory of 328 1220 Process not Found 30 PID 1220 wrote to memory of 340 1220 Process not Found 32 PID 1220 wrote to memory of 340 1220 Process not Found 32 PID 1220 wrote to memory of 340 1220 Process not Found 32 PID 1220 wrote to memory of 340 1220 Process not Found 32 PID 1220 wrote to memory of 1116 1220 Process not Found 33 PID 1220 wrote to memory of 1116 1220 Process not Found 33 PID 1220 wrote to memory of 1116 1220 Process not Found 33 PID 340 wrote to memory of 1420 340 EFBD.exe 34 PID 340 wrote to memory of 1420 340 EFBD.exe 34 PID 340 wrote to memory of 1420 340 EFBD.exe 34 PID 340 wrote to memory of 1420 340 EFBD.exe 34 PID 340 wrote to memory of 564 340 EFBD.exe 36 PID 340 wrote to memory of 564 340 EFBD.exe 36 PID 340 wrote to memory of 564 340 EFBD.exe 36 PID 340 wrote to memory of 564 340 EFBD.exe 36 PID 1220 wrote to memory of 1060 1220 Process not Found 38 PID 1220 wrote to memory of 1060 1220 Process not Found 38 PID 1220 wrote to memory of 1060 1220 Process not Found 38 PID 1220 wrote to memory of 1060 1220 Process not Found 38 PID 1220 wrote to memory of 1060 1220 Process not Found 38 PID 1220 wrote to memory of 1060 1220 Process not Found 38 PID 1220 wrote to memory of 1060 1220 Process not Found 38 PID 1220 wrote to memory of 1816 1220 Process not Found 40 PID 1220 wrote to memory of 1816 1220 Process not Found 40 PID 1220 wrote to memory of 1816 1220 Process not Found 40 PID 1220 wrote to memory of 1816 1220 Process not Found 40 PID 340 wrote to memory of 1604 340 EFBD.exe 41 PID 340 wrote to memory of 1604 340 EFBD.exe 41 PID 340 wrote to memory of 1604 340 EFBD.exe 41 PID 340 wrote to memory of 1604 340 EFBD.exe 41 PID 340 wrote to memory of 1576 340 EFBD.exe 43 PID 340 wrote to memory of 1576 340 EFBD.exe 43 PID 340 wrote to memory of 1576 340 EFBD.exe 43 PID 340 wrote to memory of 1576 340 EFBD.exe 43 PID 340 wrote to memory of 1960 340 EFBD.exe 45 PID 340 wrote to memory of 1960 340 EFBD.exe 45 PID 340 wrote to memory of 1960 340 EFBD.exe 45 PID 340 wrote to memory of 1960 340 EFBD.exe 45 PID 1220 wrote to memory of 1536 1220 Process not Found 46 PID 1220 wrote to memory of 1536 1220 Process not Found 46 PID 1220 wrote to memory of 1536 1220 Process not Found 46 PID 1220 wrote to memory of 1536 1220 Process not Found 46 PID 1220 wrote to memory of 1288 1220 Process not Found 48 PID 1220 wrote to memory of 1288 1220 Process not Found 48 PID 1220 wrote to memory of 1288 1220 Process not Found 48 PID 1220 wrote to memory of 1288 1220 Process not Found 48 PID 1220 wrote to memory of 1288 1220 Process not Found 48 PID 340 wrote to memory of 1508 340 EFBD.exe 49 PID 340 wrote to memory of 1508 340 EFBD.exe 49 PID 340 wrote to memory of 1508 340 EFBD.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ca7f11696f8c92f087336db50badff.exe"C:\Users\Admin\AppData\Local\Temp\b6ca7f11696f8c92f087336db50badff.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\b6ca7f11696f8c92f087336db50badff.exe"C:\Users\Admin\AppData\Local\Temp\b6ca7f11696f8c92f087336db50badff.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\EF10.exeC:\Users\Admin\AppData\Local\Temp\EF10.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:328
-
C:\Users\Admin\AppData\Local\Temp\EFBD.exeC:\Users\Admin\AppData\Local\Temp\EFBD.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jwgytffi\2⤵PID:1420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bwlvafxv.exe" C:\Windows\SysWOW64\jwgytffi\2⤵PID:564
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jwgytffi binPath= "C:\Windows\SysWOW64\jwgytffi\bwlvafxv.exe /d\"C:\Users\Admin\AppData\Local\Temp\EFBD.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1604
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jwgytffi "wifi internet conection"2⤵PID:1576
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jwgytffi2⤵PID:1960
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\F46F.exeC:\Users\Admin\AppData\Local\Temp\F46F.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
C:\Users\Admin\AppData\Local\Temp\FB33.exeC:\Users\Admin\AppData\Local\Temp\FB33.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
C:\Users\Admin\AppData\Local\Temp\FCDA.exeC:\Users\Admin\AppData\Local\Temp\FCDA.exe1⤵
- Executes dropped EXE
PID:1816 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -start2⤵PID:1656
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\3DD.exeC:\Users\Admin\AppData\Local\Temp\3DD.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Users\Admin\Documents\Update.exe"C:\Users\Admin\Documents\Update.exe"2⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\Clip_.exe"C:\Users\Admin\AppData\Local\Temp\Clip_.exe"3⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\Red1_.exe"C:\Users\Admin\AppData\Local\Temp\Red1_.exe"3⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"3⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"3⤵PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"3⤵PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3DD.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3DD.exe"2⤵PID:1604
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 1003⤵
- Runs ping.exe
PID:2084
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 9003⤵
- Runs ping.exe
PID:2144
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1288
-
C:\Windows\SysWOW64\jwgytffi\bwlvafxv.exeC:\Windows\SysWOW64\jwgytffi\bwlvafxv.exe /d"C:\Users\Admin\AppData\Local\Temp\EFBD.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1940 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:936
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:2912
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1088
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:300
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:920
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:656
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1068
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1588
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2192
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2252