Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
24-09-2021 21:06
Static task
static1
Behavioral task
behavioral1
Sample
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe
Resource
win10v20210408
General
-
Target
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe
-
Size
287KB
-
MD5
6cbf95206889d06445d284b862cf18bf
-
SHA1
c85b2f93e81da0d5759f195afdf91a645343fe5d
-
SHA256
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cfbf9fc9ed24d8dc7d143
-
SHA512
45d81eddf9e9c38ed9b8ec6510b6b34c752c5ccc01e22028549ef19921308a8531dbb8c5f9f79833e5df350dd47dc2a3edd430926d45f4f1f31fd329c50393e4
Malware Config
Extracted
smokeloader
2020
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Extracted
redline
2k superstar
185.244.180.224:39957
Extracted
raccoon
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1884-70-0x0000000002C90000-0x0000000002CAF000-memory.dmp family_redline behavioral1/memory/1884-71-0x0000000003040000-0x000000000305E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
1006.exe140D.exe195B.exepid Process 1884 1006.exe 964 140D.exe 588 195B.exe -
Deletes itself 1 IoCs
Processes:
pid Process 1400 -
Drops startup file 1 IoCs
Processes:
140D.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\140D.vbs 140D.exe -
Loads dropped DLL 1 IoCs
Processes:
pid Process 1400 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
140D.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\140D = "\"C:\\Users\\Admin\\AppData\\Roaming\\140D.exe\"" 140D.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exedescription pid Process procid_target PID 1504 set thread context of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exepid Process 1572 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 1572 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 1400 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exepid Process 1572 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
1006.exe140D.exedescription pid Process Token: SeShutdownPrivilege 1400 Token: SeShutdownPrivilege 1400 Token: SeShutdownPrivilege 1400 Token: SeShutdownPrivilege 1400 Token: SeShutdownPrivilege 1400 Token: SeDebugPrivilege 1884 1006.exe Token: SeDebugPrivilege 964 140D.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
pid Process 1400 1400 1400 1400 1400 1400 -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
pid Process 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exedescription pid Process procid_target PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1400 wrote to memory of 1884 1400 28 PID 1400 wrote to memory of 1884 1400 28 PID 1400 wrote to memory of 1884 1400 28 PID 1400 wrote to memory of 1884 1400 28 PID 1400 wrote to memory of 964 1400 30 PID 1400 wrote to memory of 964 1400 30 PID 1400 wrote to memory of 964 1400 30 PID 1400 wrote to memory of 588 1400 31 PID 1400 wrote to memory of 588 1400 31 PID 1400 wrote to memory of 588 1400 31 PID 1400 wrote to memory of 588 1400 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\1006.exeC:\Users\Admin\AppData\Local\Temp\1006.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
C:\Users\Admin\AppData\Local\Temp\140D.exeC:\Users\Admin\AppData\Local\Temp\140D.exe1⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:964
-
C:\Users\Admin\AppData\Local\Temp\195B.exeC:\Users\Admin\AppData\Local\Temp\195B.exe1⤵
- Executes dropped EXE
PID:588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4266f72b05afa83f395e890b76eadf69
SHA1489386ba56760821f6e35712028410da476fe258
SHA2566b1e04d8ef0395166da7d784c80ec3b8e85593ec862e54c07976ef14b28c70e4
SHA512a375f17bc9283e7edb8f492d616ec3f192d9943251a4323138c99b565dbb03a5734b4116b7b47830680dea16713155cb96e51ea32ce96f479c48e9bd0bb9556a
-
MD5
0a465be9c75469e6f2398b2668a2c5f2
SHA19b610498a08345fe3280b6c79ed4b5d1945d6a79
SHA256eca0040a928bb7f215b2379bf40b65397d4ead565ab8ad9a19c61740228e9f33
SHA512eaa28aafc65e1d847f292e9e43279913b737bfb6649758548df11ebbb3de7c8c6c8e0568091b7f4261feea14a63e2dac68cb7bc1c4c0c1ef517a14f6a02873c9
-
MD5
0a465be9c75469e6f2398b2668a2c5f2
SHA19b610498a08345fe3280b6c79ed4b5d1945d6a79
SHA256eca0040a928bb7f215b2379bf40b65397d4ead565ab8ad9a19c61740228e9f33
SHA512eaa28aafc65e1d847f292e9e43279913b737bfb6649758548df11ebbb3de7c8c6c8e0568091b7f4261feea14a63e2dac68cb7bc1c4c0c1ef517a14f6a02873c9
-
MD5
1d16e9a8731a898b05829797b937c57d
SHA1fc08c31f5581a1cee371131ec28f02fde864562c
SHA2564237784e386651ca80bf952a1cb3affb27d33ce897336516cc0eca0896eb5bdc
SHA51289a432eaaaf0ee07a1d76f27b6d6d06e99b5850e087d07e1f115dc4c7147a69423cf4922b5337cdf6e18e13c4eda125d0fa640b89391375bc8a89e5649c69a8a
-
MD5
0a465be9c75469e6f2398b2668a2c5f2
SHA19b610498a08345fe3280b6c79ed4b5d1945d6a79
SHA256eca0040a928bb7f215b2379bf40b65397d4ead565ab8ad9a19c61740228e9f33
SHA512eaa28aafc65e1d847f292e9e43279913b737bfb6649758548df11ebbb3de7c8c6c8e0568091b7f4261feea14a63e2dac68cb7bc1c4c0c1ef517a14f6a02873c9