Resubmissions

10-11-2021 14:52

211110-r84p8aedej 10

09-11-2021 13:19

211109-qkrv3sfcg4 10

Analysis

  • max time kernel
    167s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    09-11-2021 13:19

General

  • Target

    3a4e2dfbd7943c7200d7c5ea70c2b0117408d3c1ac3cac7b757d8e05dcc9ff00.exe

  • Size

    3.4MB

  • MD5

    b1e9f93ed954f84cc0144c40c75f178f

  • SHA1

    a11c3dc288597c4139fbcab21474dd69931b8668

  • SHA256

    3a4e2dfbd7943c7200d7c5ea70c2b0117408d3c1ac3cac7b757d8e05dcc9ff00

  • SHA512

    6a3b1f513a5cdabdc6dae142fa9a61f683a2e514e0f4f1a5b20902eeb2d0918f636b600529ebf20020835d8b2b987d4123c94ee4755df1bb31274a5a4ee16da2

Malware Config

Extracted

Family

redline

Botnet

she

C2

135.181.129.119:4805

Extracted

Family

smokeloader

Version

2020

C2

http://bostoc.com/upload/

http://qianyoupj.cn/upload/

http://sleoppen.com/upload/

http://stempelbeton.at/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

media13

C2

91.121.67.60:2151

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 11 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 16 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:464
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:864
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k SystemNetworkService
        2⤵
        • Drops file in System32 directory
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:3008
    • C:\Users\Admin\AppData\Local\Temp\3a4e2dfbd7943c7200d7c5ea70c2b0117408d3c1ac3cac7b757d8e05dcc9ff00.exe
      "C:\Users\Admin\AppData\Local\Temp\3a4e2dfbd7943c7200d7c5ea70c2b0117408d3c1ac3cac7b757d8e05dcc9ff00.exe"
      1⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Users\Admin\AppData\Local\Temp\7zS45378966\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS45378966\setup_install.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1228
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          3⤵
            PID:1944
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:972
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed12bd576e1bf64afb.exe
            3⤵
            • Loads dropped DLL
            PID:1788
            • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed12bd576e1bf64afb.exe
              Wed12bd576e1bf64afb.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:1640
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed1288c00b14.exe
            3⤵
            • Loads dropped DLL
            PID:1612
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed122bc04c857303904.exe
            3⤵
            • Loads dropped DLL
            PID:1952
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed12dc2ddf9464a8.exe /mixone
            3⤵
            • Loads dropped DLL
            PID:612
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed12012a8fb2684.exe
            3⤵
            • Loads dropped DLL
            PID:1600
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 460
            3⤵
            • Loads dropped DLL
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2272
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed1204651d54a.exe
            3⤵
            • Loads dropped DLL
            PID:1768
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed12faf99ad49381f2.exe
            3⤵
              PID:1360
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed12778a2d20b3a2d.exe
              3⤵
              • Loads dropped DLL
              PID:288
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed12cab21f99.exe
              3⤵
              • Loads dropped DLL
              PID:1636
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed1209f30d2721b0.exe
              3⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1616
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed121d95f16c.exe
              3⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1844
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed12d3370475.exe
              3⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1216
        • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed12d3370475.exe
          Wed12d3370475.exe
          1⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1528
          • C:\Users\Admin\Pictures\Adobe Films\v9nyzt6hlrpFldqPqY7E_X7g.exe
            "C:\Users\Admin\Pictures\Adobe Films\v9nyzt6hlrpFldqPqY7E_X7g.exe"
            2⤵
            • Executes dropped EXE
            PID:2844
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1508
            2⤵
            • Program crash
            PID:1756
        • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed1204651d54a.exe
          Wed1204651d54a.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1128
        • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed12012a8fb2684.exe
          Wed12012a8fb2684.exe
          1⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1820
          • C:\Users\Admin\Pictures\Adobe Films\zkMniDUEjOTx3HycWtAeMFRt.exe
            "C:\Users\Admin\Pictures\Adobe Films\zkMniDUEjOTx3HycWtAeMFRt.exe"
            2⤵
            • Executes dropped EXE
            PID:2856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 1500
            2⤵
            • Program crash
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2296
        • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed12dc2ddf9464a8.exe
          Wed12dc2ddf9464a8.exe /mixone
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:896
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\7zS45378966\6uGXtm8hbFPIV.exe" /mixone
            2⤵
            • Loads dropped DLL
            PID:2324
            • C:\Users\Admin\AppData\Local\Temp\7zS45378966\6uGXtm8hbFPIV.exe
              "C:\Users\Admin\AppData\Local\Temp\7zS45378966\6uGXtm8hbFPIV.exe" /mixone
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: GetForegroundWindowSpam
              PID:2408
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c taskkill /im "Wed12dc2ddf9464a8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed12dc2ddf9464a8.exe" & exit
            2⤵
              PID:2356
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /im "Wed12dc2ddf9464a8.exe" /f
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2420
          • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed1288c00b14.exe
            Wed1288c00b14.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2088
          • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed122bc04c857303904.exe
            Wed122bc04c857303904.exe
            1⤵
            • Executes dropped EXE
            PID:2116
          • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed12778a2d20b3a2d.exe
            Wed12778a2d20b3a2d.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1464
          • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed12cab21f99.exe
            Wed12cab21f99.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1744
          • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed121d95f16c.exe
            Wed121d95f16c.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            PID:1508
            • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed121d95f16c.exe
              C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed121d95f16c.exe
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2732
          • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed1209f30d2721b0.exe
            Wed1209f30d2721b0.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            PID:1036
            • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed1209f30d2721b0.exe
              C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed1209f30d2721b0.exe
              2⤵
              • Executes dropped EXE
              PID:2724
            • C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed1209f30d2721b0.exe
              C:\Users\Admin\AppData\Local\Temp\7zS45378966\Wed1209f30d2721b0.exe
              2⤵
              • Executes dropped EXE
              PID:2872
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
            1⤵
            • Process spawned unexpected child process
            PID:2952
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
              2⤵
              • Loads dropped DLL
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              PID:2960

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/852-55-0x00000000765D1000-0x00000000765D3000-memory.dmp

            Filesize

            8KB

          • memory/864-257-0x0000000001E00000-0x0000000001E72000-memory.dmp

            Filesize

            456KB

          • memory/864-255-0x0000000000EE0000-0x0000000000F2D000-memory.dmp

            Filesize

            308KB

          • memory/896-197-0x0000000000400000-0x00000000016D9000-memory.dmp

            Filesize

            18.8MB

          • memory/896-191-0x0000000000300000-0x0000000000329000-memory.dmp

            Filesize

            164KB

          • memory/896-196-0x0000000001850000-0x0000000001899000-memory.dmp

            Filesize

            292KB

          • memory/972-238-0x0000000001E90000-0x0000000002ADA000-memory.dmp

            Filesize

            12.3MB

          • memory/972-227-0x0000000001E90000-0x0000000002ADA000-memory.dmp

            Filesize

            12.3MB

          • memory/972-218-0x0000000001E90000-0x0000000002ADA000-memory.dmp

            Filesize

            12.3MB

          • memory/1036-222-0x0000000000D80000-0x0000000000D81000-memory.dmp

            Filesize

            4KB

          • memory/1036-175-0x0000000001120000-0x0000000001121000-memory.dmp

            Filesize

            4KB

          • memory/1128-209-0x0000000005BF1000-0x0000000005BF2000-memory.dmp

            Filesize

            4KB

          • memory/1128-208-0x00000000016E0000-0x00000000016FF000-memory.dmp

            Filesize

            124KB

          • memory/1128-206-0x00000000002E0000-0x0000000000310000-memory.dmp

            Filesize

            192KB

          • memory/1128-217-0x0000000005BF3000-0x0000000005BF4000-memory.dmp

            Filesize

            4KB

          • memory/1128-207-0x0000000000400000-0x00000000016E0000-memory.dmp

            Filesize

            18.9MB

          • memory/1128-219-0x0000000001990000-0x00000000019AD000-memory.dmp

            Filesize

            116KB

          • memory/1128-216-0x0000000005BF2000-0x0000000005BF3000-memory.dmp

            Filesize

            4KB

          • memory/1128-239-0x0000000005BF4000-0x0000000005BF6000-memory.dmp

            Filesize

            8KB

          • memory/1128-193-0x00000000017C0000-0x00000000017E3000-memory.dmp

            Filesize

            140KB

          • memory/1228-95-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/1228-76-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/1228-78-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/1228-107-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/1228-88-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/1228-77-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/1228-89-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/1228-80-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/1228-79-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/1228-99-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/1228-85-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/1228-83-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/1228-81-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/1228-84-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/1228-82-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/1384-226-0x00000000039E0000-0x00000000039F6000-memory.dmp

            Filesize

            88KB

          • memory/1464-183-0x0000000001280000-0x0000000001281000-memory.dmp

            Filesize

            4KB

          • memory/1464-224-0x0000000004920000-0x0000000004921000-memory.dmp

            Filesize

            4KB

          • memory/1464-211-0x0000000000470000-0x0000000000471000-memory.dmp

            Filesize

            4KB

          • memory/1508-180-0x00000000010C0000-0x00000000010C1000-memory.dmp

            Filesize

            4KB

          • memory/1508-223-0x0000000000440000-0x0000000000441000-memory.dmp

            Filesize

            4KB

          • memory/1528-225-0x0000000004280000-0x00000000043CC000-memory.dmp

            Filesize

            1.3MB

          • memory/1640-192-0x0000000001890000-0x00000000018A0000-memory.dmp

            Filesize

            64KB

          • memory/1640-214-0x0000000000240000-0x0000000000249000-memory.dmp

            Filesize

            36KB

          • memory/1640-215-0x0000000000400000-0x00000000016C0000-memory.dmp

            Filesize

            18.8MB

          • memory/1820-228-0x0000000004210000-0x000000000435C000-memory.dmp

            Filesize

            1.3MB

          • memory/2088-212-0x0000000000B40000-0x0000000000B41000-memory.dmp

            Filesize

            4KB

          • memory/2088-249-0x000000001AA90000-0x000000001AA92000-memory.dmp

            Filesize

            8KB

          • memory/2272-221-0x0000000000370000-0x0000000000371000-memory.dmp

            Filesize

            4KB

          • memory/2296-266-0x0000000000370000-0x0000000000371000-memory.dmp

            Filesize

            4KB

          • memory/2408-220-0x0000000000400000-0x00000000016D9000-memory.dmp

            Filesize

            18.8MB

          • memory/2408-210-0x0000000000340000-0x0000000000369000-memory.dmp

            Filesize

            164KB

          • memory/2732-232-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2732-240-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2732-233-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2732-247-0x00000000003A0000-0x00000000003A1000-memory.dmp

            Filesize

            4KB

          • memory/2732-231-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2732-234-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2732-235-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2872-262-0x0000000004A10000-0x0000000004A11000-memory.dmp

            Filesize

            4KB

          • memory/2960-253-0x0000000001EB0000-0x0000000001F0D000-memory.dmp

            Filesize

            372KB

          • memory/2960-251-0x0000000001DA0000-0x0000000001EA1000-memory.dmp

            Filesize

            1.0MB

          • memory/3008-259-0x00000000004B0000-0x0000000000522000-memory.dmp

            Filesize

            456KB

          • memory/3008-244-0x0000000000060000-0x00000000000AD000-memory.dmp

            Filesize

            308KB

          • memory/3008-268-0x0000000000260000-0x000000000027B000-memory.dmp

            Filesize

            108KB

          • memory/3008-269-0x00000000030E0000-0x00000000031E5000-memory.dmp

            Filesize

            1.0MB