Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    14-11-2021 21:25

General

  • Target

    db1473e749077ed815a6dd154d1d595fb4ddee5429e3a38192f5c90d6d71e2d6.exe

  • Size

    219KB

  • MD5

    d5f3dad06e57f974c5073a4fbf142eda

  • SHA1

    856a8ab094febdf25336be12bad875399ccb600f

  • SHA256

    db1473e749077ed815a6dd154d1d595fb4ddee5429e3a38192f5c90d6d71e2d6

  • SHA512

    03a3329bb0274ad33ec3d4a245b7e2cb9d92455618c4ec0e3966c2413feed6abef149f484ee10ad8a23e84f29a1dd79b88a17357f79a77c9a7c2d140682dcb9d

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

185.159.80.90:38637

Extracted

Family

redline

Botnet

SuperStar

C2

185.215.113.29:36224

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

ddf183af4241e3172885cf1b2c4c1fb4ee03d05a

Attributes
  • url4cnc

    http://91.219.236.27/capibar

    http://5.181.156.92/capibar

    http://91.219.236.207/capibar

    http://185.225.19.18/capibar

    http://91.219.237.227/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db1473e749077ed815a6dd154d1d595fb4ddee5429e3a38192f5c90d6d71e2d6.exe
    "C:\Users\Admin\AppData\Local\Temp\db1473e749077ed815a6dd154d1d595fb4ddee5429e3a38192f5c90d6d71e2d6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Users\Admin\AppData\Local\Temp\db1473e749077ed815a6dd154d1d595fb4ddee5429e3a38192f5c90d6d71e2d6.exe
      "C:\Users\Admin\AppData\Local\Temp\db1473e749077ed815a6dd154d1d595fb4ddee5429e3a38192f5c90d6d71e2d6.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:692
  • C:\Users\Admin\AppData\Local\Temp\6CD7.exe
    C:\Users\Admin\AppData\Local\Temp\6CD7.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\AppData\Local\Temp\6CD7.exe
      C:\Users\Admin\AppData\Local\Temp\6CD7.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:432
  • C:\Users\Admin\AppData\Local\Temp\7282.exe
    C:\Users\Admin\AppData\Local\Temp\7282.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\7282.exe
      C:\Users\Admin\AppData\Local\Temp\7282.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1192
  • C:\Users\Admin\AppData\Local\Temp\7541.exe
    C:\Users\Admin\AppData\Local\Temp\7541.exe
    1⤵
    • Executes dropped EXE
    PID:1680
  • C:\Users\Admin\AppData\Local\Temp\77A3.exe
    C:\Users\Admin\AppData\Local\Temp\77A3.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Users\Admin\AppData\Local\Temp\77A3.exe
      C:\Users\Admin\AppData\Local\Temp\77A3.exe
      2⤵
      • Executes dropped EXE
      PID:1448
  • C:\Users\Admin\AppData\Local\Temp\7CB3.exe
    C:\Users\Admin\AppData\Local\Temp\7CB3.exe
    1⤵
    • Executes dropped EXE
    PID:1940
  • C:\Users\Admin\AppData\Local\Temp\8BB1.exe
    C:\Users\Admin\AppData\Local\Temp\8BB1.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1220
  • C:\Users\Admin\AppData\Local\Temp\A3B5.exe
    C:\Users\Admin\AppData\Local\Temp\A3B5.exe
    1⤵
    • Executes dropped EXE
    PID:1868
  • C:\Users\Admin\AppData\Local\Temp\AB44.exe
    C:\Users\Admin\AppData\Local\Temp\AB44.exe
    1⤵
    • Executes dropped EXE
    PID:1904

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6CD7.exe
    MD5

    f6839a3fcf7ceceb2de4bc8660cb5217

    SHA1

    94aaa6afb1c45ca26dc8f62d41e9c03218f7ae40

    SHA256

    3d609b245011159c0eeced43065a077488fbdb4273db8e2a93daff79392dc68e

    SHA512

    6369d846155d83f3d8876c685b36904d7a10ce31cb9a5aa58c9a05583316110a827520cd75bbb7eb66e9a8f1f7be41c382803638f61c28b204208f9750c54fd9

  • C:\Users\Admin\AppData\Local\Temp\6CD7.exe
    MD5

    f6839a3fcf7ceceb2de4bc8660cb5217

    SHA1

    94aaa6afb1c45ca26dc8f62d41e9c03218f7ae40

    SHA256

    3d609b245011159c0eeced43065a077488fbdb4273db8e2a93daff79392dc68e

    SHA512

    6369d846155d83f3d8876c685b36904d7a10ce31cb9a5aa58c9a05583316110a827520cd75bbb7eb66e9a8f1f7be41c382803638f61c28b204208f9750c54fd9

  • C:\Users\Admin\AppData\Local\Temp\6CD7.exe
    MD5

    f6839a3fcf7ceceb2de4bc8660cb5217

    SHA1

    94aaa6afb1c45ca26dc8f62d41e9c03218f7ae40

    SHA256

    3d609b245011159c0eeced43065a077488fbdb4273db8e2a93daff79392dc68e

    SHA512

    6369d846155d83f3d8876c685b36904d7a10ce31cb9a5aa58c9a05583316110a827520cd75bbb7eb66e9a8f1f7be41c382803638f61c28b204208f9750c54fd9

  • C:\Users\Admin\AppData\Local\Temp\7282.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\7282.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\7282.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\7541.exe
    MD5

    d985b4cfdceecc3c0fe4f3e4fda4e416

    SHA1

    f3c14a4d87569e54faaf0eac73ec1aafa2621dfa

    SHA256

    a8b37d6b073ee045ae63473cb1a592c974e896b19e3db06d552f955901c06db7

    SHA512

    560a056c076db6893f6407807d9a10d1078c148aa588d9de6ce1874eeac0a4feaf2102b656ba96316a32c89df97986f20cf77e55117e2c9bf97e52ef3381335c

  • C:\Users\Admin\AppData\Local\Temp\77A3.exe
    MD5

    754b7dd3c4ca7a4e3d074cf24a934525

    SHA1

    8dc9a81213bad3423f7e5fb91c445e3263ffd9f8

    SHA256

    4c4a7d533c0e8ef4d071cd62cd87293d839920df94449638ecbe3e25ff0c2d03

    SHA512

    6a27497839c0cad835bbd049be80860bcd594d8d2aa30f5b9a42ee94fd84aa9c76f414514d486d0f8eae0559207f5ef2f860fed45a986820deae0e03787aa771

  • C:\Users\Admin\AppData\Local\Temp\77A3.exe
    MD5

    754b7dd3c4ca7a4e3d074cf24a934525

    SHA1

    8dc9a81213bad3423f7e5fb91c445e3263ffd9f8

    SHA256

    4c4a7d533c0e8ef4d071cd62cd87293d839920df94449638ecbe3e25ff0c2d03

    SHA512

    6a27497839c0cad835bbd049be80860bcd594d8d2aa30f5b9a42ee94fd84aa9c76f414514d486d0f8eae0559207f5ef2f860fed45a986820deae0e03787aa771

  • C:\Users\Admin\AppData\Local\Temp\77A3.exe
    MD5

    754b7dd3c4ca7a4e3d074cf24a934525

    SHA1

    8dc9a81213bad3423f7e5fb91c445e3263ffd9f8

    SHA256

    4c4a7d533c0e8ef4d071cd62cd87293d839920df94449638ecbe3e25ff0c2d03

    SHA512

    6a27497839c0cad835bbd049be80860bcd594d8d2aa30f5b9a42ee94fd84aa9c76f414514d486d0f8eae0559207f5ef2f860fed45a986820deae0e03787aa771

  • C:\Users\Admin\AppData\Local\Temp\7CB3.exe
    MD5

    0f9d1f2e3aaad601bb95a039b0aedcfb

    SHA1

    141e7b7b2a4a31b2a7e599b2d2064239fcc66707

    SHA256

    db4ec306ea32c01cb486566c699b9b88013beb26c2830319785bf5a4ee4735b5

    SHA512

    b68708a0aa425a3f90df3c1639aeb2358f34fa5bfb3691d3010cd528cdce99692269b13cda9f05172d8608fc08b7b7ca5449d495290a5e9e81221edfe9d052e7

  • C:\Users\Admin\AppData\Local\Temp\8BB1.exe
    MD5

    2b981c5d303d855ff0b7784ea7082860

    SHA1

    72638cba4542e5f56f701d9579ba857d1675ee98

    SHA256

    1a320f02f4bb5f3c0464dbf9d3f66939ce25f3683e262dc9326056ab329819cc

    SHA512

    28043fd7c35b0f4f75a36e10da6e5fa868939faf3e223905f15b66fdfdfdf0751c6693ab22cb19917d88ec1f7a4cc33e10401c54554b0434e9a7cae90b8aa9c1

  • C:\Users\Admin\AppData\Local\Temp\A3B5.exe
    MD5

    ea4e92c55ba38780f02876d7b23220db

    SHA1

    c2828d048a98ae4a0b10a0086569f7923ff880f3

    SHA256

    4970975b3596048497e4cd865a66e68b017afddc392ce8de6d1b071846908295

    SHA512

    72521d1f0d6444225405c077d2f28f1dc36847a244beb24bbb7f577e6846fad8ad25b54d104377432e6153a813bfeb1feb6910d447eebb412d49e6131c46c943

  • C:\Users\Admin\AppData\Local\Temp\AB44.exe
    MD5

    0ed76cd7cb14cc30d04802a750bcad22

    SHA1

    ed719729d7025b6d16399c88a7334fdd58b0d603

    SHA256

    f3133b021fd1eb20aa1b624a6295496e0d4cfdad4d6d25ac00ab02ee5cbea8b1

    SHA512

    89452af762b13227bd835a50d8e5d55a0760889699fae5bb7da67fba1b4fa16207c9e395230cb2f3b135266c3dfac98f45bb8df3b8f9391d55696f8f13e64ea6

  • \Users\Admin\AppData\Local\Temp\6CD7.exe
    MD5

    f6839a3fcf7ceceb2de4bc8660cb5217

    SHA1

    94aaa6afb1c45ca26dc8f62d41e9c03218f7ae40

    SHA256

    3d609b245011159c0eeced43065a077488fbdb4273db8e2a93daff79392dc68e

    SHA512

    6369d846155d83f3d8876c685b36904d7a10ce31cb9a5aa58c9a05583316110a827520cd75bbb7eb66e9a8f1f7be41c382803638f61c28b204208f9750c54fd9

  • \Users\Admin\AppData\Local\Temp\7282.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • \Users\Admin\AppData\Local\Temp\77A3.exe
    MD5

    754b7dd3c4ca7a4e3d074cf24a934525

    SHA1

    8dc9a81213bad3423f7e5fb91c445e3263ffd9f8

    SHA256

    4c4a7d533c0e8ef4d071cd62cd87293d839920df94449638ecbe3e25ff0c2d03

    SHA512

    6a27497839c0cad835bbd049be80860bcd594d8d2aa30f5b9a42ee94fd84aa9c76f414514d486d0f8eae0559207f5ef2f860fed45a986820deae0e03787aa771

  • memory/432-66-0x0000000000402DD8-mapping.dmp
  • memory/540-72-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/540-61-0x0000000000000000-mapping.dmp
  • memory/692-55-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/692-57-0x0000000075731000-0x0000000075733000-memory.dmp
    Filesize

    8KB

  • memory/692-56-0x0000000000402DD8-mapping.dmp
  • memory/840-94-0x00000000003C0000-0x00000000003E2000-memory.dmp
    Filesize

    136KB

  • memory/840-95-0x0000000000460000-0x0000000000490000-memory.dmp
    Filesize

    192KB

  • memory/840-78-0x0000000000000000-mapping.dmp
  • memory/964-73-0x0000000000AC0000-0x0000000000AC1000-memory.dmp
    Filesize

    4KB

  • memory/964-80-0x00000000021C0000-0x00000000021C1000-memory.dmp
    Filesize

    4KB

  • memory/964-69-0x0000000000000000-mapping.dmp
  • memory/1192-103-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1192-101-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1192-110-0x0000000004A00000-0x0000000004A01000-memory.dmp
    Filesize

    4KB

  • memory/1192-102-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1192-105-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1192-108-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1192-106-0x0000000000418EEA-mapping.dmp
  • memory/1192-104-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1220-122-0x0000000000F90000-0x0000000000F91000-memory.dmp
    Filesize

    4KB

  • memory/1220-118-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
    Filesize

    4KB

  • memory/1220-112-0x0000000000000000-mapping.dmp
  • memory/1272-60-0x0000000002C20000-0x0000000002C36000-memory.dmp
    Filesize

    88KB

  • memory/1272-111-0x0000000004010000-0x0000000004026000-memory.dmp
    Filesize

    88KB

  • memory/1448-84-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/1448-92-0x00000000047F3000-0x00000000047F4000-memory.dmp
    Filesize

    4KB

  • memory/1448-85-0x000000000040CD2F-mapping.dmp
  • memory/1448-89-0x00000000047F1000-0x00000000047F2000-memory.dmp
    Filesize

    4KB

  • memory/1448-100-0x00000000047F4000-0x00000000047F6000-memory.dmp
    Filesize

    8KB

  • memory/1448-98-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/1448-97-0x0000000001D10000-0x0000000001D2B000-memory.dmp
    Filesize

    108KB

  • memory/1448-88-0x0000000001CA0000-0x0000000001CBC000-memory.dmp
    Filesize

    112KB

  • memory/1448-91-0x00000000047F2000-0x00000000047F3000-memory.dmp
    Filesize

    4KB

  • memory/1588-58-0x00000000003B0000-0x00000000003B8000-memory.dmp
    Filesize

    32KB

  • memory/1588-59-0x00000000003C0000-0x00000000003C9000-memory.dmp
    Filesize

    36KB

  • memory/1680-75-0x0000000000000000-mapping.dmp
  • memory/1680-93-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/1680-90-0x0000000000230000-0x0000000000239000-memory.dmp
    Filesize

    36KB

  • memory/1680-87-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/1868-125-0x0000000000000000-mapping.dmp
  • memory/1868-127-0x0000000000B60000-0x0000000000BC0000-memory.dmp
    Filesize

    384KB

  • memory/1904-128-0x0000000000000000-mapping.dmp
  • memory/1940-120-0x0000000002CDB000-0x0000000002D2A000-memory.dmp
    Filesize

    316KB

  • memory/1940-123-0x0000000000220000-0x00000000002AF000-memory.dmp
    Filesize

    572KB

  • memory/1940-124-0x0000000000400000-0x0000000002B85000-memory.dmp
    Filesize

    39.5MB

  • memory/1940-96-0x0000000000000000-mapping.dmp