Analysis
-
max time kernel
153s -
max time network
142s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-10-2021 20:55
Static task
static1
Behavioral task
behavioral1
Sample
677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe
Resource
win10v20210408
General
-
Target
677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe
-
Size
222KB
-
MD5
d4c1b28a379541f4863d88626a222b1d
-
SHA1
8ff062a14bc961f8157eb418e5f761a964a4bff5
-
SHA256
677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a
-
SHA512
f96e499098380994b1da9e1d3a77a4e3544ad6c8151b7563862265d0df70ea30c8ba954bebf91c8739e3142f9136aef3f71a34eef11e997092b0a2811f829759
Malware Config
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Extracted
raccoon
1.8.2
27d80aa27e80cd2ef63c638e2752e24242d1b37c
-
url4cnc
http://telemirror.top/ararius809b
http://tgmirror.top/ararius809b
http://telegatt.top/ararius809b
http://telegka.top/ararius809b
http://telegin.top/ararius809b
https://t.me/ararius809b
Extracted
raccoon
1.8.2
676b1a32c7d2ce2aba84e8823871900d67e00049
-
url4cnc
http://telemirror.top/kaba4ello
http://tgmirror.top/kaba4ello
http://telegatt.top/kaba4ello
http://telegka.top/kaba4ello
http://telegin.top/kaba4ello
https://t.me/kaba4ello
Extracted
redline
w1
109.234.34.165:12323
Extracted
redline
MegaProliv
93.115.20.139:28978
Extracted
raccoon
1.8.2
c8fdd015293e99dac71bc0cfc194d3ce612abf3e
-
url4cnc
http://telemirror.top/rocketmanthem2
http://tgmirror.top/rocketmanthem2
http://telegatt.top/rocketmanthem2
http://telegka.top/rocketmanthem2
http://telegin.top/rocketmanthem2
https://t.me/rocketmanthem2
Extracted
raccoon
1.8.2
8d179b9e611eee525425544ee8c6d77360ab7cd9
-
url4cnc
http://teletop.top/agrybirdsgamerept
http://teleta.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral1/memory/3616-133-0x0000000000740000-0x0000000000771000-memory.dmp family_redline behavioral1/memory/3616-140-0x0000000002850000-0x000000000286C000-memory.dmp family_redline behavioral1/memory/3048-178-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3048-179-0x000000000041B25E-mapping.dmp family_redline behavioral1/memory/3048-193-0x0000000005740000-0x0000000005D46000-memory.dmp family_redline -
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2516 created 2632 2516 WerFault.exe 75 -
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2256 D5E3.exe 2632 DBE0.exe 3616 E084.exe 3516 F19C.exe 1708 F576.exe 2352 3A0.exe 3048 F576.exe 3868 C5B.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2536 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 764 set thread context of 496 764 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 73 PID 1708 set thread context of 3048 1708 F576.exe 80 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2516 2632 WerFault.exe 75 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1996 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 496 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 496 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found 2536 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 616 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 496 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeDebugPrivilege 3616 E084.exe Token: SeDebugPrivilege 3048 F576.exe Token: SeDebugPrivilege 3164 powershell.exe Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeDebugPrivilege 3132 powershell.exe Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 360 powershell.exe Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeRestorePrivilege 2516 WerFault.exe Token: SeBackupPrivilege 2516 WerFault.exe Token: SeDebugPrivilege 2516 WerFault.exe Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found Token: SeShutdownPrivilege 2536 Process not Found Token: SeCreatePagefilePrivilege 2536 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2536 Process not Found 2536 Process not Found -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2536 Process not Found 2536 Process not Found 2536 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2536 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 764 wrote to memory of 496 764 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 73 PID 764 wrote to memory of 496 764 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 73 PID 764 wrote to memory of 496 764 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 73 PID 764 wrote to memory of 496 764 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 73 PID 764 wrote to memory of 496 764 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 73 PID 764 wrote to memory of 496 764 677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe 73 PID 2536 wrote to memory of 2256 2536 Process not Found 74 PID 2536 wrote to memory of 2256 2536 Process not Found 74 PID 2536 wrote to memory of 2256 2536 Process not Found 74 PID 2536 wrote to memory of 2632 2536 Process not Found 75 PID 2536 wrote to memory of 2632 2536 Process not Found 75 PID 2536 wrote to memory of 2632 2536 Process not Found 75 PID 2536 wrote to memory of 3616 2536 Process not Found 76 PID 2536 wrote to memory of 3616 2536 Process not Found 76 PID 2536 wrote to memory of 3616 2536 Process not Found 76 PID 2536 wrote to memory of 3516 2536 Process not Found 77 PID 2536 wrote to memory of 3516 2536 Process not Found 77 PID 2536 wrote to memory of 3516 2536 Process not Found 77 PID 2536 wrote to memory of 1708 2536 Process not Found 78 PID 2536 wrote to memory of 1708 2536 Process not Found 78 PID 2536 wrote to memory of 1708 2536 Process not Found 78 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 2536 wrote to memory of 2352 2536 Process not Found 81 PID 2536 wrote to memory of 2352 2536 Process not Found 81 PID 2536 wrote to memory of 2352 2536 Process not Found 81 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 1708 wrote to memory of 3048 1708 F576.exe 80 PID 2536 wrote to memory of 3868 2536 Process not Found 82 PID 2536 wrote to memory of 3868 2536 Process not Found 82 PID 2536 wrote to memory of 3868 2536 Process not Found 82 PID 3516 wrote to memory of 3164 3516 F19C.exe 83 PID 3516 wrote to memory of 3164 3516 F19C.exe 83 PID 3516 wrote to memory of 3164 3516 F19C.exe 83 PID 3164 wrote to memory of 2240 3164 powershell.exe 88 PID 3164 wrote to memory of 2240 3164 powershell.exe 88 PID 3164 wrote to memory of 2240 3164 powershell.exe 88 PID 2240 wrote to memory of 1316 2240 csc.exe 89 PID 2240 wrote to memory of 1316 2240 csc.exe 89 PID 2240 wrote to memory of 1316 2240 csc.exe 89 PID 3164 wrote to memory of 3132 3164 powershell.exe 90 PID 3164 wrote to memory of 3132 3164 powershell.exe 90 PID 3164 wrote to memory of 3132 3164 powershell.exe 90 PID 3164 wrote to memory of 2864 3164 powershell.exe 92 PID 3164 wrote to memory of 2864 3164 powershell.exe 92 PID 3164 wrote to memory of 2864 3164 powershell.exe 92 PID 3164 wrote to memory of 360 3164 powershell.exe 94 PID 3164 wrote to memory of 360 3164 powershell.exe 94 PID 3164 wrote to memory of 360 3164 powershell.exe 94 PID 3164 wrote to memory of 1900 3164 powershell.exe 96 PID 3164 wrote to memory of 1900 3164 powershell.exe 96 PID 3164 wrote to memory of 1900 3164 powershell.exe 96 PID 3164 wrote to memory of 1996 3164 powershell.exe 97 PID 3164 wrote to memory of 1996 3164 powershell.exe 97 PID 3164 wrote to memory of 1996 3164 powershell.exe 97 PID 3164 wrote to memory of 776 3164 powershell.exe 98 PID 3164 wrote to memory of 776 3164 powershell.exe 98 PID 3164 wrote to memory of 776 3164 powershell.exe 98 PID 3164 wrote to memory of 3540 3164 powershell.exe 99 PID 3164 wrote to memory of 3540 3164 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe"C:\Users\Admin\AppData\Local\Temp\677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe"C:\Users\Admin\AppData\Local\Temp\677522504448bf38829bf36ac5f7bec74725370cb77539ce7bb9578da6f5182a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:496
-
-
C:\Users\Admin\AppData\Local\Temp\D5E3.exeC:\Users\Admin\AppData\Local\Temp\D5E3.exe1⤵
- Executes dropped EXE
PID:2256
-
C:\Users\Admin\AppData\Local\Temp\DBE0.exeC:\Users\Admin\AppData\Local\Temp\DBE0.exe1⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 9162⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\E084.exeC:\Users\Admin\AppData\Local\Temp\E084.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
C:\Users\Admin\AppData\Local\Temp\F19C.exeC:\Users\Admin\AppData\Local\Temp\F19C.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tqmznkhv\tqmznkhv.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES442E.tmp" "c:\Users\Admin\AppData\Local\Temp\tqmznkhv\CSCC964AAB5C2D5489489626116283E7EDB.TMP"4⤵PID:1316
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:360
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:1996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:776
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:3540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:1056
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:2592
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:2528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:1724
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:3176
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:2124
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:1144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3136
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:3048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:672
-
-
-
C:\Users\Admin\AppData\Local\Temp\F576.exeC:\Users\Admin\AppData\Local\Temp\F576.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\F576.exeC:\Users\Admin\AppData\Local\Temp\F576.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\3A0.exeC:\Users\Admin\AppData\Local\Temp\3A0.exe1⤵
- Executes dropped EXE
PID:2352
-
C:\Users\Admin\AppData\Local\Temp\C5B.exeC:\Users\Admin\AppData\Local\Temp\C5B.exe1⤵
- Executes dropped EXE
PID:3868