Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 18:04
Static task
static1
Behavioral task
behavioral1
Sample
2c7373ab965995304bd8b007f66ebad2.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2c7373ab965995304bd8b007f66ebad2.exe
Resource
win10-en-20210920
General
-
Target
2c7373ab965995304bd8b007f66ebad2.exe
-
Size
134KB
-
MD5
2c7373ab965995304bd8b007f66ebad2
-
SHA1
48a6f884b3a5fd51a371f900cbdb1b8651af72b4
-
SHA256
89e3b00acfc8b0904398665280312cf9a2b426db3eb77b2e5303131de48a2dde
-
SHA512
52f52a8c42f40fa6fab49cd303a310cd23513439e97e669b92aaec4a78baa60cebed9b66254770d1fcb6c5783e08d90422b17836ee7175effc0f935fa4cbea4e
Malware Config
Extracted
smokeloader
2020
http://govsurplusstore.com/upload/
http://best-forsale.com/upload/
http://chmxnautoparts.com/upload/
http://kwazone.com/upload/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/824-145-0x00000000058B0000-0x0000000005EB6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
345F.exe4CE9.exepid process 2508 345F.exe 824 4CE9.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4CE9.exe345F.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4CE9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4CE9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 345F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 345F.exe -
Deletes itself 1 IoCs
Processes:
pid process 3036 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\345F.exe themida behavioral2/memory/2508-121-0x00000000009A0000-0x00000000009A1000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\4CE9.exe themida C:\Users\Admin\AppData\Local\Temp\4CE9.exe themida behavioral2/memory/824-135-0x0000000000F00000-0x0000000000F01000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
345F.exe4CE9.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 345F.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4CE9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
345F.exe4CE9.exepid process 2508 345F.exe 824 4CE9.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2c7373ab965995304bd8b007f66ebad2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2c7373ab965995304bd8b007f66ebad2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2c7373ab965995304bd8b007f66ebad2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2c7373ab965995304bd8b007f66ebad2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2c7373ab965995304bd8b007f66ebad2.exepid process 2116 2c7373ab965995304bd8b007f66ebad2.exe 2116 2c7373ab965995304bd8b007f66ebad2.exe 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3036 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
2c7373ab965995304bd8b007f66ebad2.exepid process 2116 2c7373ab965995304bd8b007f66ebad2.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
345F.exe4CE9.exedescription pid process Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeDebugPrivilege 2508 345F.exe Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeDebugPrivilege 824 4CE9.exe Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
description pid process target process PID 3036 wrote to memory of 2508 3036 345F.exe PID 3036 wrote to memory of 2508 3036 345F.exe PID 3036 wrote to memory of 2508 3036 345F.exe PID 3036 wrote to memory of 824 3036 4CE9.exe PID 3036 wrote to memory of 824 3036 4CE9.exe PID 3036 wrote to memory of 824 3036 4CE9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c7373ab965995304bd8b007f66ebad2.exe"C:\Users\Admin\AppData\Local\Temp\2c7373ab965995304bd8b007f66ebad2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2116
-
C:\Users\Admin\AppData\Local\Temp\345F.exeC:\Users\Admin\AppData\Local\Temp\345F.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
C:\Users\Admin\AppData\Local\Temp\4CE9.exeC:\Users\Admin\AppData\Local\Temp\4CE9.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
706e056e6b2aaebd358701538b774fcd
SHA1a528290b1eec45a22587c15d8a0135185832e71a
SHA256c431a09f7c0a0c4ec016f16ca7150c1a6b9227fe5ed216ce004eda4af9878ac8
SHA512a3ff93f0e7f8781c8c4b664a6d33c63a5bd712dc999f69394a4d991bb3d1059aae0c0c001ec16d6c6b72f3054bce3cb2e7030bd81b15360fdee6a1a8f8c39fcc
-
MD5
b8408976630c4ccdeffc0f1164a7960c
SHA19cd12dc965bf3846a44f851328eb2e5c52f8c01c
SHA25646854855604b19ab94433e80a09712b6f4b3d7186c93c9516ee9a1ef37514180
SHA5122ff94576906bcd190bbe8314f64a25c7939c1fe33683e5f7effe6551038c3be4decf86edb476f9c9aa391a1da6a6ccb5c08e2ebba02b9d4ca5dcd622aeb008d4
-
MD5
b8408976630c4ccdeffc0f1164a7960c
SHA19cd12dc965bf3846a44f851328eb2e5c52f8c01c
SHA25646854855604b19ab94433e80a09712b6f4b3d7186c93c9516ee9a1ef37514180
SHA5122ff94576906bcd190bbe8314f64a25c7939c1fe33683e5f7effe6551038c3be4decf86edb476f9c9aa391a1da6a6ccb5c08e2ebba02b9d4ca5dcd622aeb008d4