Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
25-10-2021 04:20
Static task
static1
Behavioral task
behavioral1
Sample
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe
Resource
win10-en-20210920
General
-
Target
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe
-
Size
262KB
-
MD5
fe04a1c950a58c44da9ccc5559408cf6
-
SHA1
22bbb1045738a60f9fa88d26ac00ed4d348ac989
-
SHA256
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8
-
SHA512
aa17ac62381ca1997c27b64d1569fd12611ca3cc0f5e5c7359ce620f49c54cc12d1a4a3ef77f26968b4f855513065e7170b1cd91eed26cb43787c7d089347fe2
Malware Config
Extracted
smokeloader
2020
http://xacokuo8.top/
http://hajezey1.top/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1616-142-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/1616-143-0x000000000043713E-mapping.dmp family_redline behavioral1/memory/2340-156-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2340-157-0x0000000000418D2A-mapping.dmp family_redline behavioral1/memory/2340-167-0x0000000004D50000-0x0000000005356000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\FC1D.exe family_redline C:\Users\Admin\AppData\Local\Temp\FC1D.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
C427.exeC427.exe4A7E.exe4A7E.exe6059.exe4A7E.exe6059.exeFC1D.exepid process 984 C427.exe 2972 C427.exe 1044 4A7E.exe 1508 4A7E.exe 1676 6059.exe 1616 4A7E.exe 2340 6059.exe 5036 FC1D.exe -
Deletes itself 1 IoCs
Processes:
pid process 2452 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exeC427.exe4A7E.exe6059.exedescription pid process target process PID 4044 set thread context of 4340 4044 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe PID 984 set thread context of 2972 984 C427.exe C427.exe PID 1044 set thread context of 1616 1044 4A7E.exe 4A7E.exe PID 1676 set thread context of 2340 1676 6059.exe 6059.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exeC427.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C427.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C427.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C427.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exepid process 4340 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4340 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2452 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exeC427.exepid process 4340 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 2972 C427.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
4A7E.exe6059.exeFC1D.exedescription pid process Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeDebugPrivilege 1616 4A7E.exe Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeDebugPrivilege 2340 6059.exe Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeDebugPrivilege 5036 FC1D.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exeC427.exe4A7E.exe6059.exedescription pid process target process PID 4044 wrote to memory of 4340 4044 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe PID 4044 wrote to memory of 4340 4044 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe PID 4044 wrote to memory of 4340 4044 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe PID 4044 wrote to memory of 4340 4044 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe PID 4044 wrote to memory of 4340 4044 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe PID 4044 wrote to memory of 4340 4044 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe 4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe PID 2452 wrote to memory of 984 2452 C427.exe PID 2452 wrote to memory of 984 2452 C427.exe PID 2452 wrote to memory of 984 2452 C427.exe PID 984 wrote to memory of 2972 984 C427.exe C427.exe PID 984 wrote to memory of 2972 984 C427.exe C427.exe PID 984 wrote to memory of 2972 984 C427.exe C427.exe PID 984 wrote to memory of 2972 984 C427.exe C427.exe PID 984 wrote to memory of 2972 984 C427.exe C427.exe PID 984 wrote to memory of 2972 984 C427.exe C427.exe PID 2452 wrote to memory of 1044 2452 4A7E.exe PID 2452 wrote to memory of 1044 2452 4A7E.exe PID 2452 wrote to memory of 1044 2452 4A7E.exe PID 1044 wrote to memory of 1508 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1508 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1508 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1508 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 2452 wrote to memory of 1676 2452 6059.exe PID 2452 wrote to memory of 1676 2452 6059.exe PID 2452 wrote to memory of 1676 2452 6059.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 1044 wrote to memory of 1616 1044 4A7E.exe 4A7E.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 1676 wrote to memory of 2340 1676 6059.exe 6059.exe PID 2452 wrote to memory of 5036 2452 FC1D.exe PID 2452 wrote to memory of 5036 2452 FC1D.exe PID 2452 wrote to memory of 5036 2452 FC1D.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe"C:\Users\Admin\AppData\Local\Temp\4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe"C:\Users\Admin\AppData\Local\Temp\4c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4340
-
C:\Users\Admin\AppData\Local\Temp\C427.exeC:\Users\Admin\AppData\Local\Temp\C427.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\C427.exeC:\Users\Admin\AppData\Local\Temp\C427.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2972
-
C:\Users\Admin\AppData\Local\Temp\4A7E.exeC:\Users\Admin\AppData\Local\Temp\4A7E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\4A7E.exeC:\Users\Admin\AppData\Local\Temp\4A7E.exe2⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\4A7E.exeC:\Users\Admin\AppData\Local\Temp\4A7E.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
C:\Users\Admin\AppData\Local\Temp\6059.exeC:\Users\Admin\AppData\Local\Temp\6059.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\6059.exeC:\Users\Admin\AppData\Local\Temp\6059.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
C:\Users\Admin\AppData\Local\Temp\FC1D.exeC:\Users\Admin\AppData\Local\Temp\FC1D.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
4ae44e9cb5a3f3d5f40d52c71bdef439
SHA106d591028442b6e18e36f9495ee53d6be6d3a273
SHA256153b903cf8c24a57937304fafc9c77e1abfa650244f29a141c57d1ba391dc1e0
SHA512f42ab8cb503805282a03f6ecbb90d7db65fd057c3f4f9904fa814c488aeae6aa7105ca528c8a7b20d74ebceb4149c9f16c75f07a95db5f2bccbe3b5be2f1febf
-
MD5
4ae44e9cb5a3f3d5f40d52c71bdef439
SHA106d591028442b6e18e36f9495ee53d6be6d3a273
SHA256153b903cf8c24a57937304fafc9c77e1abfa650244f29a141c57d1ba391dc1e0
SHA512f42ab8cb503805282a03f6ecbb90d7db65fd057c3f4f9904fa814c488aeae6aa7105ca528c8a7b20d74ebceb4149c9f16c75f07a95db5f2bccbe3b5be2f1febf
-
MD5
4ae44e9cb5a3f3d5f40d52c71bdef439
SHA106d591028442b6e18e36f9495ee53d6be6d3a273
SHA256153b903cf8c24a57937304fafc9c77e1abfa650244f29a141c57d1ba391dc1e0
SHA512f42ab8cb503805282a03f6ecbb90d7db65fd057c3f4f9904fa814c488aeae6aa7105ca528c8a7b20d74ebceb4149c9f16c75f07a95db5f2bccbe3b5be2f1febf
-
MD5
4ae44e9cb5a3f3d5f40d52c71bdef439
SHA106d591028442b6e18e36f9495ee53d6be6d3a273
SHA256153b903cf8c24a57937304fafc9c77e1abfa650244f29a141c57d1ba391dc1e0
SHA512f42ab8cb503805282a03f6ecbb90d7db65fd057c3f4f9904fa814c488aeae6aa7105ca528c8a7b20d74ebceb4149c9f16c75f07a95db5f2bccbe3b5be2f1febf
-
MD5
0cafd553a0f55d525a5ec0ec6c2c06bd
SHA1621e411916749c72cdc4d97f46b843bb758659c1
SHA2563acca9f2af679c0cba972e71c88871397132c5f389a5beffa7710204b0c81987
SHA512b56e4a59cc314ba533cb0c2d763482de28320f7f2c8eb73d9209745f61b4e22b041756d5c20775a0afab67f86eb68c1267b76b5da1baffbadc75b6ffeda3fdb9
-
MD5
0cafd553a0f55d525a5ec0ec6c2c06bd
SHA1621e411916749c72cdc4d97f46b843bb758659c1
SHA2563acca9f2af679c0cba972e71c88871397132c5f389a5beffa7710204b0c81987
SHA512b56e4a59cc314ba533cb0c2d763482de28320f7f2c8eb73d9209745f61b4e22b041756d5c20775a0afab67f86eb68c1267b76b5da1baffbadc75b6ffeda3fdb9
-
MD5
0cafd553a0f55d525a5ec0ec6c2c06bd
SHA1621e411916749c72cdc4d97f46b843bb758659c1
SHA2563acca9f2af679c0cba972e71c88871397132c5f389a5beffa7710204b0c81987
SHA512b56e4a59cc314ba533cb0c2d763482de28320f7f2c8eb73d9209745f61b4e22b041756d5c20775a0afab67f86eb68c1267b76b5da1baffbadc75b6ffeda3fdb9
-
MD5
fe04a1c950a58c44da9ccc5559408cf6
SHA122bbb1045738a60f9fa88d26ac00ed4d348ac989
SHA2564c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8
SHA512aa17ac62381ca1997c27b64d1569fd12611ca3cc0f5e5c7359ce620f49c54cc12d1a4a3ef77f26968b4f855513065e7170b1cd91eed26cb43787c7d089347fe2
-
MD5
fe04a1c950a58c44da9ccc5559408cf6
SHA122bbb1045738a60f9fa88d26ac00ed4d348ac989
SHA2564c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8
SHA512aa17ac62381ca1997c27b64d1569fd12611ca3cc0f5e5c7359ce620f49c54cc12d1a4a3ef77f26968b4f855513065e7170b1cd91eed26cb43787c7d089347fe2
-
MD5
fe04a1c950a58c44da9ccc5559408cf6
SHA122bbb1045738a60f9fa88d26ac00ed4d348ac989
SHA2564c9f558a0f698f7f8f07f7abd36790abd6611764be6e46a3804e90df5634eef8
SHA512aa17ac62381ca1997c27b64d1569fd12611ca3cc0f5e5c7359ce620f49c54cc12d1a4a3ef77f26968b4f855513065e7170b1cd91eed26cb43787c7d089347fe2
-
MD5
ee7fa94d11e33a49aec16497e6085bb4
SHA196b627914c8f66db127b5d6575c4ff1ea20a4820
SHA2568ca16079011214a3a575e900624f20fd9227791fa2c0bf91e1d081c75b5cd46f
SHA51206fd914ada4748bd762b09e25071c0ddc93683345e882afc133fa2038ab61203c05453160a7f79ac07bce014ebbc5049d3aa7b2d9b2d232a5dc0a198763a5295
-
MD5
ee7fa94d11e33a49aec16497e6085bb4
SHA196b627914c8f66db127b5d6575c4ff1ea20a4820
SHA2568ca16079011214a3a575e900624f20fd9227791fa2c0bf91e1d081c75b5cd46f
SHA51206fd914ada4748bd762b09e25071c0ddc93683345e882afc133fa2038ab61203c05453160a7f79ac07bce014ebbc5049d3aa7b2d9b2d232a5dc0a198763a5295