Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    11-11-2021 01:13

General

  • Target

    adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588.exe

  • Size

    319KB

  • MD5

    0937813dd391d561cf995a395a93d765

  • SHA1

    a2290a7b1cf30ec4ce2b4e4095c33308d1b5e263

  • SHA256

    adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588

  • SHA512

    3eb91002cc57e4c93b2b2f24770ba4398ed07516f686c8d16a66a3c0832337d4005f4118fdd70345b7411948b696fcb46c1fed970f5762e21829440cf389ded2

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nalirou70.top/

http://xacokuo80.top/

http://nusurtal4f.net/

http://netomishnetojuk.net/

http://escalivrouter.net/

http://nick22doom4.net/

http://wrioshtivsio.su/

http://nusotiso4.su/

http://rickkhtovkka.biz/

http://palisotoliso.net/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

777666777

C2

93.115.20.139:28978

Extracted

Family

redline

Botnet

SuperStar

C2

185.215.113.29:36224

Extracted

Family

icedid

Botnet

1217670233

C2

lakogrefop.rest

hangetilin.top

follytresh.co

zojecurf.store

Attributes
  • auth_var

    14

  • url_path

    /posts/

Extracted

Family

raccoon

Botnet

8dec62c1db2959619dca43e02fa46ad7bd606400

Attributes
  • url4cnc

    http://telegin.top/capibar

    http://ttmirror.top/capibar

    http://teletele.top/capibar

    http://telegalive.top/capibar

    http://toptelete.top/capibar

    http://telegraf.top/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588.exe
    "C:\Users\Admin\AppData\Local\Temp\adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Users\Admin\AppData\Local\Temp\adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588.exe
      "C:\Users\Admin\AppData\Local\Temp\adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4076
  • C:\Users\Admin\AppData\Local\Temp\125.exe
    C:\Users\Admin\AppData\Local\Temp\125.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\125.exe
      C:\Users\Admin\AppData\Local\Temp\125.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4372
  • C:\Users\Admin\AppData\Local\Temp\1B36.exe
    C:\Users\Admin\AppData\Local\Temp\1B36.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3236
  • C:\Users\Admin\AppData\Local\Temp\252A.exe
    C:\Users\Admin\AppData\Local\Temp\252A.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3200
  • C:\Users\Admin\AppData\Local\Temp\34DA.exe
    C:\Users\Admin\AppData\Local\Temp\34DA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Users\Admin\AppData\Local\Temp\34DA.exe
      C:\Users\Admin\AppData\Local\Temp\34DA.exe
      2⤵
      • Executes dropped EXE
      PID:1456
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4381.dll
    1⤵
    • Loads dropped DLL
    PID:1952
  • C:\Users\Admin\AppData\Local\Temp\54F7.exe
    C:\Users\Admin\AppData\Local\Temp\54F7.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Local\Temp\54F7.exe
      C:\Users\Admin\AppData\Local\Temp\54F7.exe
      2⤵
      • Executes dropped EXE
      PID:2664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 968
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4920

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\125.exe
    MD5

    0937813dd391d561cf995a395a93d765

    SHA1

    a2290a7b1cf30ec4ce2b4e4095c33308d1b5e263

    SHA256

    adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588

    SHA512

    3eb91002cc57e4c93b2b2f24770ba4398ed07516f686c8d16a66a3c0832337d4005f4118fdd70345b7411948b696fcb46c1fed970f5762e21829440cf389ded2

  • C:\Users\Admin\AppData\Local\Temp\125.exe
    MD5

    0937813dd391d561cf995a395a93d765

    SHA1

    a2290a7b1cf30ec4ce2b4e4095c33308d1b5e263

    SHA256

    adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588

    SHA512

    3eb91002cc57e4c93b2b2f24770ba4398ed07516f686c8d16a66a3c0832337d4005f4118fdd70345b7411948b696fcb46c1fed970f5762e21829440cf389ded2

  • C:\Users\Admin\AppData\Local\Temp\125.exe
    MD5

    0937813dd391d561cf995a395a93d765

    SHA1

    a2290a7b1cf30ec4ce2b4e4095c33308d1b5e263

    SHA256

    adf5ea14d7aef4596fe3cd4705e65c4037a6cb5bae9080060550ea34a092c588

    SHA512

    3eb91002cc57e4c93b2b2f24770ba4398ed07516f686c8d16a66a3c0832337d4005f4118fdd70345b7411948b696fcb46c1fed970f5762e21829440cf389ded2

  • C:\Users\Admin\AppData\Local\Temp\1B36.exe
    MD5

    605ade73eb76236d94daaea50024fe68

    SHA1

    b8f50f7fb8d667535d13c6209c4c7b0931ac910f

    SHA256

    b0a234a0ddd049c4ae39faf49146ae213163e1d930327b98f1521117f12e3022

    SHA512

    ea6611e9accf6323d6337292cbfa6edc4d08d7c0ed58b41d5a6274b2487ba34d6f80a6b931befb924cfdf22acde223a5a777142146c6001c6179e7a98bcf3926

  • C:\Users\Admin\AppData\Local\Temp\1B36.exe
    MD5

    605ade73eb76236d94daaea50024fe68

    SHA1

    b8f50f7fb8d667535d13c6209c4c7b0931ac910f

    SHA256

    b0a234a0ddd049c4ae39faf49146ae213163e1d930327b98f1521117f12e3022

    SHA512

    ea6611e9accf6323d6337292cbfa6edc4d08d7c0ed58b41d5a6274b2487ba34d6f80a6b931befb924cfdf22acde223a5a777142146c6001c6179e7a98bcf3926

  • C:\Users\Admin\AppData\Local\Temp\252A.exe
    MD5

    435b9c498c170c228aaa2006c59e91d0

    SHA1

    49a3706be6ce2bf71fa72402243737a8c2700396

    SHA256

    1dd7a2de3a100eb6258ba36d8714ab63494934bea8a7ec3756ef40c6655e155a

    SHA512

    2b3659d67c2e6e004378d539199d10c77ed6be6dd0ab9e71f8accc975d3fbf5cf7476cda5eb5e6bbcdeeb844f5c69d3b73223e8d35d4d334ade630244e185734

  • C:\Users\Admin\AppData\Local\Temp\252A.exe
    MD5

    435b9c498c170c228aaa2006c59e91d0

    SHA1

    49a3706be6ce2bf71fa72402243737a8c2700396

    SHA256

    1dd7a2de3a100eb6258ba36d8714ab63494934bea8a7ec3756ef40c6655e155a

    SHA512

    2b3659d67c2e6e004378d539199d10c77ed6be6dd0ab9e71f8accc975d3fbf5cf7476cda5eb5e6bbcdeeb844f5c69d3b73223e8d35d4d334ade630244e185734

  • C:\Users\Admin\AppData\Local\Temp\34DA.exe
    MD5

    b2946ad2dc5f665b57c571478aca0645

    SHA1

    7da7c28d62028f541ba629d3721a06508223c629

    SHA256

    7f72e415f49d5ff97e9a245a1615a472c2d2572865cbe6ca85bb83f793b86b0d

    SHA512

    d9c298f47bd7c25b93f6d223976a971a238d2822c069013703f0cd7b7d4ef8d90df04756d275f13f4a25fbe1b452e76397b97e5af6b80d38556bfcd12e534165

  • C:\Users\Admin\AppData\Local\Temp\34DA.exe
    MD5

    b2946ad2dc5f665b57c571478aca0645

    SHA1

    7da7c28d62028f541ba629d3721a06508223c629

    SHA256

    7f72e415f49d5ff97e9a245a1615a472c2d2572865cbe6ca85bb83f793b86b0d

    SHA512

    d9c298f47bd7c25b93f6d223976a971a238d2822c069013703f0cd7b7d4ef8d90df04756d275f13f4a25fbe1b452e76397b97e5af6b80d38556bfcd12e534165

  • C:\Users\Admin\AppData\Local\Temp\34DA.exe
    MD5

    b2946ad2dc5f665b57c571478aca0645

    SHA1

    7da7c28d62028f541ba629d3721a06508223c629

    SHA256

    7f72e415f49d5ff97e9a245a1615a472c2d2572865cbe6ca85bb83f793b86b0d

    SHA512

    d9c298f47bd7c25b93f6d223976a971a238d2822c069013703f0cd7b7d4ef8d90df04756d275f13f4a25fbe1b452e76397b97e5af6b80d38556bfcd12e534165

  • C:\Users\Admin\AppData\Local\Temp\4381.dll
    MD5

    3766ceff9fad0d5ccd13b060ca5269bb

    SHA1

    8fc8b51db082bc0a34c6088322a070578fb4fb21

    SHA256

    d0ca2f465d8e620742682dbcc955e7a52e20d71333483d31379d776e1ef0be58

    SHA512

    e132814c710195b9993331e9108b08aefe1e0a68572128509329e6747c3c948ebb8d52903b113ebb82a5868d66a0f282c116e05a61fd5c57c09447a8f235a105

  • C:\Users\Admin\AppData\Local\Temp\54F7.exe
    MD5

    bde1dbafbe609f7da66db66356d8f9e3

    SHA1

    a82f4a80f7f0849ecc021855fcbfbf3220982d06

    SHA256

    d17dadc2bb57905c88308f79228810b1f7fd28dfafe07717e2b4bf0d8e014f86

    SHA512

    fa4bc50784e84e1466a055e1a14a46b54903dfe0e3c557bed19f2c003486a9196bf4917c73fac087b471669dd42eebcb7550b0fb18cb8ee3baa2763d4e94c4eb

  • C:\Users\Admin\AppData\Local\Temp\54F7.exe
    MD5

    bde1dbafbe609f7da66db66356d8f9e3

    SHA1

    a82f4a80f7f0849ecc021855fcbfbf3220982d06

    SHA256

    d17dadc2bb57905c88308f79228810b1f7fd28dfafe07717e2b4bf0d8e014f86

    SHA512

    fa4bc50784e84e1466a055e1a14a46b54903dfe0e3c557bed19f2c003486a9196bf4917c73fac087b471669dd42eebcb7550b0fb18cb8ee3baa2763d4e94c4eb

  • C:\Users\Admin\AppData\Local\Temp\54F7.exe
    MD5

    bde1dbafbe609f7da66db66356d8f9e3

    SHA1

    a82f4a80f7f0849ecc021855fcbfbf3220982d06

    SHA256

    d17dadc2bb57905c88308f79228810b1f7fd28dfafe07717e2b4bf0d8e014f86

    SHA512

    fa4bc50784e84e1466a055e1a14a46b54903dfe0e3c557bed19f2c003486a9196bf4917c73fac087b471669dd42eebcb7550b0fb18cb8ee3baa2763d4e94c4eb

  • \Users\Admin\AppData\Local\Temp\1105.tmp
    MD5

    50741b3f2d7debf5d2bed63d88404029

    SHA1

    56210388a627b926162b36967045be06ffb1aad3

    SHA256

    f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

    SHA512

    fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

  • \Users\Admin\AppData\Local\Temp\4381.dll
    MD5

    3766ceff9fad0d5ccd13b060ca5269bb

    SHA1

    8fc8b51db082bc0a34c6088322a070578fb4fb21

    SHA256

    d0ca2f465d8e620742682dbcc955e7a52e20d71333483d31379d776e1ef0be58

    SHA512

    e132814c710195b9993331e9108b08aefe1e0a68572128509329e6747c3c948ebb8d52903b113ebb82a5868d66a0f282c116e05a61fd5c57c09447a8f235a105

  • memory/784-130-0x0000000002C80000-0x0000000002DCA000-memory.dmp
    Filesize

    1.3MB

  • memory/784-123-0x0000000000000000-mapping.dmp
  • memory/1136-164-0x0000000004750000-0x0000000004780000-memory.dmp
    Filesize

    192KB

  • memory/1136-158-0x0000000002DA6000-0x0000000002DC9000-memory.dmp
    Filesize

    140KB

  • memory/1136-152-0x0000000000000000-mapping.dmp
  • memory/1456-159-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/1456-170-0x0000000005020000-0x0000000005021000-memory.dmp
    Filesize

    4KB

  • memory/1456-178-0x0000000004B14000-0x0000000004B16000-memory.dmp
    Filesize

    8KB

  • memory/1456-162-0x0000000002330000-0x000000000234C000-memory.dmp
    Filesize

    112KB

  • memory/1456-177-0x00000000057E0000-0x00000000057E1000-memory.dmp
    Filesize

    4KB

  • memory/1456-174-0x0000000005760000-0x0000000005761000-memory.dmp
    Filesize

    4KB

  • memory/1456-163-0x0000000004B20000-0x0000000004B21000-memory.dmp
    Filesize

    4KB

  • memory/1456-172-0x0000000005650000-0x0000000005651000-memory.dmp
    Filesize

    4KB

  • memory/1456-171-0x0000000005630000-0x0000000005631000-memory.dmp
    Filesize

    4KB

  • memory/1456-160-0x000000000040CD2F-mapping.dmp
  • memory/1456-169-0x0000000004A60000-0x0000000004A7B000-memory.dmp
    Filesize

    108KB

  • memory/1456-168-0x0000000004B13000-0x0000000004B14000-memory.dmp
    Filesize

    4KB

  • memory/1456-166-0x0000000004B10000-0x0000000004B11000-memory.dmp
    Filesize

    4KB

  • memory/1456-167-0x0000000004B12000-0x0000000004B13000-memory.dmp
    Filesize

    4KB

  • memory/1456-165-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/1952-173-0x0000000000000000-mapping.dmp
  • memory/1952-179-0x0000000000B50000-0x0000000000B87000-memory.dmp
    Filesize

    220KB

  • memory/2396-184-0x0000000002190000-0x0000000002213000-memory.dmp
    Filesize

    524KB

  • memory/2396-183-0x0000000001FC0000-0x0000000002037000-memory.dmp
    Filesize

    476KB

  • memory/2396-180-0x0000000000000000-mapping.dmp
  • memory/2396-185-0x0000000000400000-0x00000000004B6000-memory.dmp
    Filesize

    728KB

  • memory/2396-189-0x0000000002220000-0x0000000002283000-memory.dmp
    Filesize

    396KB

  • memory/2396-190-0x0000000002290000-0x0000000002300000-memory.dmp
    Filesize

    448KB

  • memory/2416-157-0x00000000024E0000-0x00000000024F6000-memory.dmp
    Filesize

    88KB

  • memory/2416-142-0x0000000000B00000-0x0000000000B16000-memory.dmp
    Filesize

    88KB

  • memory/2416-122-0x0000000000940000-0x0000000000956000-memory.dmp
    Filesize

    88KB

  • memory/2664-192-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/2664-191-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/2664-194-0x0000000000760000-0x00000000007EE000-memory.dmp
    Filesize

    568KB

  • memory/2664-186-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/2664-187-0x0000000000402998-mapping.dmp
  • memory/2664-193-0x00000000004A0000-0x00000000005EA000-memory.dmp
    Filesize

    1.3MB

  • memory/2664-195-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/2720-121-0x0000000002C70000-0x0000000002C79000-memory.dmp
    Filesize

    36KB

  • memory/3200-147-0x0000000000440000-0x000000000058A000-memory.dmp
    Filesize

    1.3MB

  • memory/3200-148-0x0000000000440000-0x000000000058A000-memory.dmp
    Filesize

    1.3MB

  • memory/3200-143-0x0000000000000000-mapping.dmp
  • memory/3200-149-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/3236-151-0x0000000002BB0000-0x0000000002BB1000-memory.dmp
    Filesize

    4KB

  • memory/3236-140-0x000000001B5D0000-0x000000001B5D1000-memory.dmp
    Filesize

    4KB

  • memory/3236-137-0x0000000002B10000-0x0000000002B2B000-memory.dmp
    Filesize

    108KB

  • memory/3236-136-0x0000000000E50000-0x0000000000E51000-memory.dmp
    Filesize

    4KB

  • memory/3236-150-0x000000001DAD0000-0x000000001DAD1000-memory.dmp
    Filesize

    4KB

  • memory/3236-141-0x000000001B660000-0x000000001B662000-memory.dmp
    Filesize

    8KB

  • memory/3236-134-0x0000000000A00000-0x0000000000A01000-memory.dmp
    Filesize

    4KB

  • memory/3236-131-0x0000000000000000-mapping.dmp
  • memory/3236-139-0x0000000002B50000-0x0000000002B51000-memory.dmp
    Filesize

    4KB

  • memory/3236-138-0x000000001D940000-0x000000001D941000-memory.dmp
    Filesize

    4KB

  • memory/3236-155-0x000000001E030000-0x000000001E031000-memory.dmp
    Filesize

    4KB

  • memory/3236-156-0x000000001E730000-0x000000001E731000-memory.dmp
    Filesize

    4KB

  • memory/4076-120-0x0000000000402DC6-mapping.dmp
  • memory/4076-119-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4372-128-0x0000000000402DC6-mapping.dmp