Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
04-10-2021 16:00
Static task
static1
Behavioral task
behavioral1
Sample
fe19ca0e7a58af76deaf8136a332980d.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
fe19ca0e7a58af76deaf8136a332980d.exe
Resource
win10v20210408
General
-
Target
fe19ca0e7a58af76deaf8136a332980d.exe
-
Size
260KB
-
MD5
fe19ca0e7a58af76deaf8136a332980d
-
SHA1
eb2db73c1d1a491c40b117c2cebda8487459d069
-
SHA256
a6e58febc0ae0db669343c61e926780b5c6c121aff886c8d5401ac5740025c45
-
SHA512
5450eebfa571e2b32b7a9f587cc2fbec9fdb9f0bd71591d34126e3e09015180afb4789d830fd2359a252578ef5963ae15e673e28905cb2bd0acb02b334726696
Malware Config
Extracted
smokeloader
2020
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
Extracted
raccoon
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Extracted
redline
Huntington Bank
34.94.44.44:45181
Extracted
redline
@big_tastyyy
87.251.71.44:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\2DF4.exe family_redline C:\Users\Admin\AppData\Local\Temp\2DF4.exe family_redline behavioral1/memory/1228-78-0x00000000020D0000-0x000000000210C000-memory.dmp family_redline behavioral1/memory/1228-79-0x0000000002220000-0x000000000225A000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
2193.exe25B9.exe2DF4.exe3130.exepid process 544 2193.exe 1920 25B9.exe 708 2DF4.exe 1228 3130.exe -
Deletes itself 1 IoCs
Processes:
pid process 1388 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fe19ca0e7a58af76deaf8136a332980d.exedescription pid process target process PID 2040 set thread context of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fe19ca0e7a58af76deaf8136a332980d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe19ca0e7a58af76deaf8136a332980d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe19ca0e7a58af76deaf8136a332980d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe19ca0e7a58af76deaf8136a332980d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fe19ca0e7a58af76deaf8136a332980d.exepid process 1456 fe19ca0e7a58af76deaf8136a332980d.exe 1456 fe19ca0e7a58af76deaf8136a332980d.exe 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 1388 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1388 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
fe19ca0e7a58af76deaf8136a332980d.exepid process 1456 fe19ca0e7a58af76deaf8136a332980d.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
3130.exe25B9.exedescription pid process Token: SeShutdownPrivilege 1388 Token: SeShutdownPrivilege 1388 Token: SeShutdownPrivilege 1388 Token: SeShutdownPrivilege 1388 Token: SeDebugPrivilege 1228 3130.exe Token: SeShutdownPrivilege 1388 Token: SeDebugPrivilege 1920 25B9.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
pid process 1388 1388 1388 1388 1388 1388 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 1388 1388 1388 1388 1388 1388 -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
fe19ca0e7a58af76deaf8136a332980d.exedescription pid process target process PID 2040 wrote to memory of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe PID 2040 wrote to memory of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe PID 2040 wrote to memory of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe PID 2040 wrote to memory of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe PID 2040 wrote to memory of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe PID 2040 wrote to memory of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe PID 2040 wrote to memory of 1456 2040 fe19ca0e7a58af76deaf8136a332980d.exe fe19ca0e7a58af76deaf8136a332980d.exe PID 1388 wrote to memory of 544 1388 2193.exe PID 1388 wrote to memory of 544 1388 2193.exe PID 1388 wrote to memory of 544 1388 2193.exe PID 1388 wrote to memory of 544 1388 2193.exe PID 1388 wrote to memory of 1920 1388 25B9.exe PID 1388 wrote to memory of 1920 1388 25B9.exe PID 1388 wrote to memory of 1920 1388 25B9.exe PID 1388 wrote to memory of 1920 1388 25B9.exe PID 1388 wrote to memory of 1920 1388 25B9.exe PID 1388 wrote to memory of 1920 1388 25B9.exe PID 1388 wrote to memory of 1920 1388 25B9.exe PID 1388 wrote to memory of 708 1388 2DF4.exe PID 1388 wrote to memory of 708 1388 2DF4.exe PID 1388 wrote to memory of 708 1388 2DF4.exe PID 1388 wrote to memory of 708 1388 2DF4.exe PID 1388 wrote to memory of 1228 1388 3130.exe PID 1388 wrote to memory of 1228 1388 3130.exe PID 1388 wrote to memory of 1228 1388 3130.exe PID 1388 wrote to memory of 1228 1388 3130.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe19ca0e7a58af76deaf8136a332980d.exe"C:\Users\Admin\AppData\Local\Temp\fe19ca0e7a58af76deaf8136a332980d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fe19ca0e7a58af76deaf8136a332980d.exe"C:\Users\Admin\AppData\Local\Temp\fe19ca0e7a58af76deaf8136a332980d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\2193.exeC:\Users\Admin\AppData\Local\Temp\2193.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\25B9.exeC:\Users\Admin\AppData\Local\Temp\25B9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\2DF4.exeC:\Users\Admin\AppData\Local\Temp\2DF4.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3130.exeC:\Users\Admin\AppData\Local\Temp\3130.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2193.exeMD5
c4c3ea5a3d2d9b3183dc1273e3fba3cd
SHA1dc04262a72c72551ecd20c7e34835df1a7667eaf
SHA256628d96ad8e61df81aea0f6931e7daaa39ee860051bb15e9721ded124e943dd26
SHA512053265c978d7cb713680fc287d331f477cfd49797c3855df9dd588ffd88942c1556302fcce78857f1a101f94a2d5fd5dd14268672ec6db67a1ef86289bb74768
-
C:\Users\Admin\AppData\Local\Temp\25B9.exeMD5
2a107ba697e9cd191d6c5eac0c08fcc4
SHA10f889386260b97c45dcf54ae26bcc825e372607a
SHA25684c44ba7d14f690096b2b485e6670ec161343506a07200b5ce63843e325b6ef5
SHA5120ade0c0120a1d7feb7cbddbf0c9a4796ba14bd9c3a7464c745b9361cbd1427d29b76610177428ce9ef9257275fbcbb514f6aaa1983a2a19c6aa29639bda9f98b
-
C:\Users\Admin\AppData\Local\Temp\25B9.exeMD5
2a107ba697e9cd191d6c5eac0c08fcc4
SHA10f889386260b97c45dcf54ae26bcc825e372607a
SHA25684c44ba7d14f690096b2b485e6670ec161343506a07200b5ce63843e325b6ef5
SHA5120ade0c0120a1d7feb7cbddbf0c9a4796ba14bd9c3a7464c745b9361cbd1427d29b76610177428ce9ef9257275fbcbb514f6aaa1983a2a19c6aa29639bda9f98b
-
C:\Users\Admin\AppData\Local\Temp\2DF4.exeMD5
6423bf887fb8fdbaa1906bba11683f08
SHA158af34f6f7404da5fe62f6773d604b7f4621ac44
SHA256408a055e76c71a7d5ae8a26127dbaffc51e06962972e03b13d1edea139e941d5
SHA512bfd90454348e5c62949e32e8a129307fe92f62d53814ae74efdb55ba9fd57e3c30d188386571fda403918077fec84d970cfacdff968d532c404bd39bbb2ffe76
-
C:\Users\Admin\AppData\Local\Temp\2DF4.exeMD5
6423bf887fb8fdbaa1906bba11683f08
SHA158af34f6f7404da5fe62f6773d604b7f4621ac44
SHA256408a055e76c71a7d5ae8a26127dbaffc51e06962972e03b13d1edea139e941d5
SHA512bfd90454348e5c62949e32e8a129307fe92f62d53814ae74efdb55ba9fd57e3c30d188386571fda403918077fec84d970cfacdff968d532c404bd39bbb2ffe76
-
C:\Users\Admin\AppData\Local\Temp\3130.exeMD5
2037a37285ac47a43e410b1d5ef2c45e
SHA14634ff6f17e970fa7ba0ef362d0a741dc9dc0fa4
SHA2568fa6934bf0adfebfde78f07fb9fe6de618f83be344f445cd10d4e8f14df10ccc
SHA512fb9840f2478747e8e70b79de648d4b948c6e6d11eb69878b80e79982c648c998f1ab636c3368d75b087d206e54ee9980878e6cf2e19f2a4e74d8a7f026ce0df1
-
memory/544-68-0x0000000000520000-0x00000000005B0000-memory.dmpFilesize
576KB
-
memory/544-59-0x0000000000000000-mapping.dmp
-
memory/544-69-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/708-77-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/708-73-0x0000000001190000-0x0000000001191000-memory.dmpFilesize
4KB
-
memory/708-70-0x0000000000000000-mapping.dmp
-
memory/1228-80-0x0000000000220000-0x0000000000275000-memory.dmpFilesize
340KB
-
memory/1228-85-0x0000000004984000-0x0000000004986000-memory.dmpFilesize
8KB
-
memory/1228-82-0x0000000004981000-0x0000000004982000-memory.dmpFilesize
4KB
-
memory/1228-83-0x0000000004982000-0x0000000004983000-memory.dmpFilesize
4KB
-
memory/1228-84-0x0000000004983000-0x0000000004984000-memory.dmpFilesize
4KB
-
memory/1228-81-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1228-75-0x0000000000000000-mapping.dmp
-
memory/1228-79-0x0000000002220000-0x000000000225A000-memory.dmpFilesize
232KB
-
memory/1228-78-0x00000000020D0000-0x000000000210C000-memory.dmpFilesize
240KB
-
memory/1388-58-0x00000000021C0000-0x00000000021D5000-memory.dmpFilesize
84KB
-
memory/1388-87-0x000007FEF5620000-0x000007FEF5763000-memory.dmpFilesize
1.3MB
-
memory/1388-88-0x000007FE988C0000-0x000007FE988CA000-memory.dmpFilesize
40KB
-
memory/1456-56-0x0000000075BD1000-0x0000000075BD3000-memory.dmpFilesize
8KB
-
memory/1456-54-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1456-55-0x0000000000402F18-mapping.dmp
-
memory/1920-61-0x0000000000000000-mapping.dmp
-
memory/1920-66-0x00000000049C0000-0x00000000049C1000-memory.dmpFilesize
4KB
-
memory/1920-64-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/1920-86-0x0000000002470000-0x0000000002505000-memory.dmpFilesize
596KB
-
memory/2040-57-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB