Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
24-09-2021 21:06
Static task
static1
Behavioral task
behavioral1
Sample
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe
Resource
win10v20210408
General
-
Target
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe
-
Size
287KB
-
MD5
6cbf95206889d06445d284b862cf18bf
-
SHA1
c85b2f93e81da0d5759f195afdf91a645343fe5d
-
SHA256
e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cfbf9fc9ed24d8dc7d143
-
SHA512
45d81eddf9e9c38ed9b8ec6510b6b34c752c5ccc01e22028549ef19921308a8531dbb8c5f9f79833e5df350dd47dc2a3edd430926d45f4f1f31fd329c50393e4
Malware Config
Extracted
smokeloader
2020
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Extracted
redline
2k superstar
185.244.180.224:39957
Extracted
raccoon
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral1/memory/1884-70-0x0000000002C90000-0x0000000002CAF000-memory.dmp family_redline behavioral1/memory/1884-71-0x0000000003040000-0x000000000305E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1884 1006.exe 964 140D.exe 588 195B.exe -
Deletes itself 1 IoCs
pid Process 1400 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\140D.vbs 140D.exe -
Loads dropped DLL 1 IoCs
pid Process 1400 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\140D = "\"C:\\Users\\Admin\\AppData\\Roaming\\140D.exe\"" 140D.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1572 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 1572 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1400 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1572 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeDebugPrivilege 1884 1006.exe Token: SeDebugPrivilege 964 140D.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1504 wrote to memory of 1572 1504 e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe 27 PID 1400 wrote to memory of 1884 1400 Process not Found 28 PID 1400 wrote to memory of 1884 1400 Process not Found 28 PID 1400 wrote to memory of 1884 1400 Process not Found 28 PID 1400 wrote to memory of 1884 1400 Process not Found 28 PID 1400 wrote to memory of 964 1400 Process not Found 30 PID 1400 wrote to memory of 964 1400 Process not Found 30 PID 1400 wrote to memory of 964 1400 Process not Found 30 PID 1400 wrote to memory of 588 1400 Process not Found 31 PID 1400 wrote to memory of 588 1400 Process not Found 31 PID 1400 wrote to memory of 588 1400 Process not Found 31 PID 1400 wrote to memory of 588 1400 Process not Found 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"C:\Users\Admin\AppData\Local\Temp\e3d023e5f6f2e7eebfb12204edd3ac526e830ecc051cf.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\1006.exeC:\Users\Admin\AppData\Local\Temp\1006.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
C:\Users\Admin\AppData\Local\Temp\140D.exeC:\Users\Admin\AppData\Local\Temp\140D.exe1⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:964
-
C:\Users\Admin\AppData\Local\Temp\195B.exeC:\Users\Admin\AppData\Local\Temp\195B.exe1⤵
- Executes dropped EXE
PID:588