Analysis

  • max time kernel
    151s
  • max time network
    103s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-09-2021 16:16

General

  • Target

    c30c528c3c3d33903c598ef03b799e58.exe

  • Size

    222KB

  • MD5

    c30c528c3c3d33903c598ef03b799e58

  • SHA1

    8551c666ae37a03fd61cded18a9d3227c745d0cd

  • SHA256

    85450b08c8b089b5a642511b086c838e568dbc5a30174a398bb44eb62db6fdb6

  • SHA512

    70c46d9a53a895131ad3d1a35dfb682637ff75a61d909a66de7bf4abe6b7dc20aa106538b97adda89dcba977e81c3e3bdb5aa69f808f7d484f20c42f11988d18

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://fiskahlilian16.top/

http://paishancho17.top/

http://ydiannetter18.top/

http://azarehanelle19.top/

http://quericeriant20.top/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

5k superstar

C2

narlelalik.xyz:12509

Extracted

Family

redline

Botnet

Spectrum

C2

190.2.145.73:16827

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE Amadey CnC Check-In

    suricata: ET MALWARE Amadey CnC Check-In

  • suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

    suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 18 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c30c528c3c3d33903c598ef03b799e58.exe
    "C:\Users\Admin\AppData\Local\Temp\c30c528c3c3d33903c598ef03b799e58.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Users\Admin\AppData\Local\Temp\c30c528c3c3d33903c598ef03b799e58.exe
      "C:\Users\Admin\AppData\Local\Temp\c30c528c3c3d33903c598ef03b799e58.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4820
  • C:\Users\Admin\AppData\Local\Temp\D155.exe
    C:\Users\Admin\AppData\Local\Temp\D155.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management 1.7.3.2\install\97C955F\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\D155.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632939281 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:740
  • C:\Users\Admin\AppData\Local\Temp\DD3C.exe
    C:\Users\Admin\AppData\Local\Temp\DD3C.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:992
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\DD3C.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 10 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:3992
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 68A3D530BA46C36A289A1AF316A688DE C
      2⤵
      • Loads dropped DLL
      PID:2872
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 27499773E77E17BDC3455E75A6455C81
      2⤵
      • Loads dropped DLL
      PID:1504
    • C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe
      "C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      PID:2972
  • C:\Users\Admin\AppData\Local\Temp\E59A.exe
    C:\Users\Admin\AppData\Local\Temp\E59A.exe
    1⤵
    • Executes dropped EXE
    PID:748
  • C:\Users\Admin\AppData\Local\Temp\F182.exe
    C:\Users\Admin\AppData\Local\Temp\F182.exe
    1⤵
    • Executes dropped EXE
    PID:1808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/748-172-0x00000000050C0000-0x00000000050C1000-memory.dmp

    Filesize

    4KB

  • memory/748-157-0x0000000000460000-0x000000000050E000-memory.dmp

    Filesize

    696KB

  • memory/748-168-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

    Filesize

    4KB

  • memory/748-163-0x0000000002270000-0x000000000228F000-memory.dmp

    Filesize

    124KB

  • memory/748-169-0x0000000004BB2000-0x0000000004BB3000-memory.dmp

    Filesize

    4KB

  • memory/748-170-0x0000000004BB3000-0x0000000004BB4000-memory.dmp

    Filesize

    4KB

  • memory/748-158-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/748-167-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

    Filesize

    4KB

  • memory/748-171-0x0000000002420000-0x000000000243E000-memory.dmp

    Filesize

    120KB

  • memory/748-205-0x0000000004BB4000-0x0000000004BB6000-memory.dmp

    Filesize

    8KB

  • memory/748-181-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

    Filesize

    4KB

  • memory/748-223-0x0000000002610000-0x0000000002611000-memory.dmp

    Filesize

    4KB

  • memory/748-235-0x0000000007110000-0x0000000007111000-memory.dmp

    Filesize

    4KB

  • memory/992-143-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/992-142-0x0000000001FA0000-0x0000000002030000-memory.dmp

    Filesize

    576KB

  • memory/1808-222-0x0000000004AE3000-0x0000000004AE4000-memory.dmp

    Filesize

    4KB

  • memory/1808-242-0x00000000078E0000-0x00000000078E1000-memory.dmp

    Filesize

    4KB

  • memory/1808-219-0x0000000004AE4000-0x0000000004AE6000-memory.dmp

    Filesize

    8KB

  • memory/1808-220-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

    Filesize

    4KB

  • memory/1808-175-0x00000000023E0000-0x00000000023FE000-memory.dmp

    Filesize

    120KB

  • memory/1808-187-0x0000000002070000-0x00000000020A0000-memory.dmp

    Filesize

    192KB

  • memory/1808-230-0x0000000006930000-0x0000000006931000-memory.dmp

    Filesize

    4KB

  • memory/1808-179-0x0000000004A30000-0x0000000004A31000-memory.dmp

    Filesize

    4KB

  • memory/1808-221-0x0000000004AE2000-0x0000000004AE3000-memory.dmp

    Filesize

    4KB

  • memory/1808-237-0x0000000005E80000-0x0000000005E81000-memory.dmp

    Filesize

    4KB

  • memory/1808-173-0x0000000002330000-0x000000000234F000-memory.dmp

    Filesize

    124KB

  • memory/1808-236-0x0000000007240000-0x0000000007241000-memory.dmp

    Filesize

    4KB

  • memory/1808-189-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/1808-234-0x0000000007120000-0x0000000007121000-memory.dmp

    Filesize

    4KB

  • memory/1808-225-0x0000000005710000-0x0000000005711000-memory.dmp

    Filesize

    4KB

  • memory/1808-232-0x0000000006B00000-0x0000000006B01000-memory.dmp

    Filesize

    4KB

  • memory/2900-117-0x0000000001020000-0x0000000001035000-memory.dmp

    Filesize

    84KB

  • memory/4796-114-0x00000000004A0000-0x00000000005EA000-memory.dmp

    Filesize

    1.3MB

  • memory/4820-115-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB