Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
29-09-2021 15:04
Static task
static1
Behavioral task
behavioral1
Sample
438215ec552fef4a43a10c331d658c04.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
438215ec552fef4a43a10c331d658c04.exe
Resource
win10-en-20210920
General
-
Target
438215ec552fef4a43a10c331d658c04.exe
-
Size
128KB
-
MD5
438215ec552fef4a43a10c331d658c04
-
SHA1
a4941168e1269993b195b84fa272870c58bd6c10
-
SHA256
e01749cfd587ae7029247ef900df2eb0e89e2fc594ca665d460a73bfa9564647
-
SHA512
a3da5a1969e2166e3c0091c749f171c7c8ac915fe12873fce81af7d4f3fc5fab609f3b5cefbafde4b617fa4c64745b7a7e50d6194acfb1850c13b8e13accf302
Malware Config
Extracted
smokeloader
2020
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
Extracted
redline
5k superstar
narlelalik.xyz:12509
Extracted
redline
@Dcm4Gentoo
5.61.61.168:14462
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Google\\Google Chrome.exe\"," FC98.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral2/memory/3040-140-0x0000000002190000-0x00000000021AF000-memory.dmp family_redline behavioral2/memory/3040-142-0x0000000004980000-0x000000000499E000-memory.dmp family_redline behavioral2/memory/3140-345-0x0000000000540000-0x0000000000562000-memory.dmp family_redline behavioral2/memory/3140-355-0x0000000004AF0000-0x00000000050F6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 3040 E9D9.exe 2244 F38E.exe 884 Mio.exe.com 1460 Mio.exe.com 856 FC98.exe 3140 RegAsm.exe 2704 file.exe 1616 Prime.exe.com 1488 Prime.exe.com 432 MSBuild.exe -
Deletes itself 1 IoCs
pid Process 3028 Process not Found -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oVFtXHlOeQ.url Mio.exe.com File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bLESiALcEm.url Prime.exe.com -
Loads dropped DLL 2 IoCs
pid Process 2244 F38E.exe 2704 file.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2428 set thread context of 2636 2428 438215ec552fef4a43a10c331d658c04.exe 70 PID 1460 set thread context of 3140 1460 Mio.exe.com 89 PID 1488 set thread context of 936 1488 Prime.exe.com 102 PID 856 set thread context of 432 856 FC98.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3696 1488 WerFault.exe 98 -
NSIS installer 8 IoCs
resource yara_rule behavioral2/files/0x000400000001abe2-123.dat nsis_installer_1 behavioral2/files/0x000400000001abe2-123.dat nsis_installer_2 behavioral2/files/0x000400000001abe2-124.dat nsis_installer_1 behavioral2/files/0x000400000001abe2-124.dat nsis_installer_2 behavioral2/files/0x001900000001a29b-681.dat nsis_installer_1 behavioral2/files/0x001900000001a29b-681.dat nsis_installer_2 behavioral2/files/0x001900000001a29b-682.dat nsis_installer_1 behavioral2/files/0x001900000001a29b-682.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 438215ec552fef4a43a10c331d658c04.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 438215ec552fef4a43a10c331d658c04.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 438215ec552fef4a43a10c331d658c04.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1292 PING.EXE 1916 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2636 438215ec552fef4a43a10c331d658c04.exe 2636 438215ec552fef4a43a10c331d658c04.exe 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found 3028 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3028 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2636 438215ec552fef4a43a10c331d658c04.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeDebugPrivilege 856 FC98.exe Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeDebugPrivilege 3756 powershell.exe Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeDebugPrivilege 3040 E9D9.exe Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeDebugPrivilege 3140 RegAsm.exe Token: SeIncreaseQuotaPrivilege 3756 powershell.exe Token: SeSecurityPrivilege 3756 powershell.exe Token: SeTakeOwnershipPrivilege 3756 powershell.exe Token: SeLoadDriverPrivilege 3756 powershell.exe Token: SeSystemProfilePrivilege 3756 powershell.exe Token: SeSystemtimePrivilege 3756 powershell.exe Token: SeProfSingleProcessPrivilege 3756 powershell.exe Token: SeIncBasePriorityPrivilege 3756 powershell.exe Token: SeCreatePagefilePrivilege 3756 powershell.exe Token: SeBackupPrivilege 3756 powershell.exe Token: SeRestorePrivilege 3756 powershell.exe Token: SeShutdownPrivilege 3756 powershell.exe Token: SeDebugPrivilege 3756 powershell.exe Token: SeSystemEnvironmentPrivilege 3756 powershell.exe Token: SeRemoteShutdownPrivilege 3756 powershell.exe Token: SeUndockPrivilege 3756 powershell.exe Token: SeManageVolumePrivilege 3756 powershell.exe Token: 33 3756 powershell.exe Token: 34 3756 powershell.exe Token: 35 3756 powershell.exe Token: 36 3756 powershell.exe Token: SeIncreaseQuotaPrivilege 3756 powershell.exe Token: SeSecurityPrivilege 3756 powershell.exe Token: SeTakeOwnershipPrivilege 3756 powershell.exe Token: SeLoadDriverPrivilege 3756 powershell.exe Token: SeSystemProfilePrivilege 3756 powershell.exe Token: SeSystemtimePrivilege 3756 powershell.exe Token: SeProfSingleProcessPrivilege 3756 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2636 2428 438215ec552fef4a43a10c331d658c04.exe 70 PID 2428 wrote to memory of 2636 2428 438215ec552fef4a43a10c331d658c04.exe 70 PID 2428 wrote to memory of 2636 2428 438215ec552fef4a43a10c331d658c04.exe 70 PID 2428 wrote to memory of 2636 2428 438215ec552fef4a43a10c331d658c04.exe 70 PID 2428 wrote to memory of 2636 2428 438215ec552fef4a43a10c331d658c04.exe 70 PID 2428 wrote to memory of 2636 2428 438215ec552fef4a43a10c331d658c04.exe 70 PID 3028 wrote to memory of 3040 3028 Process not Found 71 PID 3028 wrote to memory of 3040 3028 Process not Found 71 PID 3028 wrote to memory of 3040 3028 Process not Found 71 PID 3028 wrote to memory of 2244 3028 Process not Found 73 PID 3028 wrote to memory of 2244 3028 Process not Found 73 PID 3028 wrote to memory of 2244 3028 Process not Found 73 PID 2244 wrote to memory of 1616 2244 F38E.exe 74 PID 2244 wrote to memory of 1616 2244 F38E.exe 74 PID 2244 wrote to memory of 1616 2244 F38E.exe 74 PID 1616 wrote to memory of 804 1616 cmd.exe 76 PID 1616 wrote to memory of 804 1616 cmd.exe 76 PID 1616 wrote to memory of 804 1616 cmd.exe 76 PID 804 wrote to memory of 1288 804 cmd.exe 77 PID 804 wrote to memory of 1288 804 cmd.exe 77 PID 804 wrote to memory of 1288 804 cmd.exe 77 PID 804 wrote to memory of 884 804 cmd.exe 78 PID 804 wrote to memory of 884 804 cmd.exe 78 PID 804 wrote to memory of 884 804 cmd.exe 78 PID 804 wrote to memory of 1292 804 cmd.exe 79 PID 804 wrote to memory of 1292 804 cmd.exe 79 PID 804 wrote to memory of 1292 804 cmd.exe 79 PID 884 wrote to memory of 1460 884 Mio.exe.com 80 PID 884 wrote to memory of 1460 884 Mio.exe.com 80 PID 884 wrote to memory of 1460 884 Mio.exe.com 80 PID 3028 wrote to memory of 856 3028 Process not Found 81 PID 3028 wrote to memory of 856 3028 Process not Found 81 PID 856 wrote to memory of 3756 856 FC98.exe 83 PID 856 wrote to memory of 3756 856 FC98.exe 83 PID 1460 wrote to memory of 3140 1460 Mio.exe.com 89 PID 1460 wrote to memory of 3140 1460 Mio.exe.com 89 PID 1460 wrote to memory of 3140 1460 Mio.exe.com 89 PID 1460 wrote to memory of 3140 1460 Mio.exe.com 89 PID 1460 wrote to memory of 3140 1460 Mio.exe.com 89 PID 3140 wrote to memory of 2704 3140 RegAsm.exe 91 PID 3140 wrote to memory of 2704 3140 RegAsm.exe 91 PID 3140 wrote to memory of 2704 3140 RegAsm.exe 91 PID 2704 wrote to memory of 2408 2704 file.exe 92 PID 2704 wrote to memory of 2408 2704 file.exe 92 PID 2704 wrote to memory of 2408 2704 file.exe 92 PID 2408 wrote to memory of 1908 2408 cmd.exe 94 PID 2408 wrote to memory of 1908 2408 cmd.exe 94 PID 2408 wrote to memory of 1908 2408 cmd.exe 94 PID 1908 wrote to memory of 2976 1908 cmd.exe 95 PID 1908 wrote to memory of 2976 1908 cmd.exe 95 PID 1908 wrote to memory of 2976 1908 cmd.exe 95 PID 1908 wrote to memory of 1616 1908 cmd.exe 96 PID 1908 wrote to memory of 1616 1908 cmd.exe 96 PID 1908 wrote to memory of 1916 1908 cmd.exe 97 PID 1908 wrote to memory of 1916 1908 cmd.exe 97 PID 1908 wrote to memory of 1916 1908 cmd.exe 97 PID 1616 wrote to memory of 1488 1616 Prime.exe.com 98 PID 1616 wrote to memory of 1488 1616 Prime.exe.com 98 PID 856 wrote to memory of 1252 856 FC98.exe 100 PID 856 wrote to memory of 1252 856 FC98.exe 100 PID 1488 wrote to memory of 936 1488 Prime.exe.com 102 PID 1488 wrote to memory of 936 1488 Prime.exe.com 102 PID 1488 wrote to memory of 936 1488 Prime.exe.com 102 PID 1488 wrote to memory of 936 1488 Prime.exe.com 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\438215ec552fef4a43a10c331d658c04.exe"C:\Users\Admin\AppData\Local\Temp\438215ec552fef4a43a10c331d658c04.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\438215ec552fef4a43a10c331d658c04.exe"C:\Users\Admin\AppData\Local\Temp\438215ec552fef4a43a10c331d658c04.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\E9D9.exeC:\Users\Admin\AppData\Local\Temp\E9D9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
C:\Users\Admin\AppData\Local\Temp\F38E.exeC:\Users\Admin\AppData\Local\Temp\F38E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c cmd < Disegnato.accdt2⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^jdBXEbiICLfWHIEKiKDpCGJMhheipdUFFbTuIYbnunkESZAKxLCvDshGHOJdxqnjRKspPbwohtetxtThNsMbNbwgpjnTfutuZYMoIdVXJxpmgpkCUcCehqnzJrZDZoTuqWycaLEb$" Sottrarre.accdt4⤵PID:1288
-
-
C:\Users\Admin\AppData\Roaming\Mio.exe.comMio.exe.com W4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\Mio.exe.comC:\Users\Admin\AppData\Roaming\Mio.exe.com W5⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Roaming\RegAsm.exeC:\Users\Admin\AppData\Roaming\RegAsm.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c cmd < Fai.docm8⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd9⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^GOSDsHyjVXPbHfUPrvXbfGmmRjqhEkBpmOaXJUKhlpsdBcqWKjtUUPkqgaMyGSIJcGXTWWupMKjygoYcktDaiHgKCaJdiEHaBIUVbiZOuUolCyMyxsU$" Per.docm10⤵PID:2976
-
-
C:\Users\Admin\AppData\Roaming\Prime.exe.comPrime.exe.com P10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\Prime.exe.comC:\Users\Admin\AppData\Roaming\Prime.exe.com P11⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\Prime.exe.comC:\Users\Admin\AppData\Roaming\Prime.exe.com12⤵PID:936
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1488 -s 80012⤵
- Program crash
PID:3696
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost10⤵
- Runs ping.exe
PID:1916
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:1292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FC98.exeC:\Users\Admin\AppData\Local\Temp\FC98.exe1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute twitch.com2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 52⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe2⤵
- Executes dropped EXE
PID:432
-