Analysis

  • max time kernel
    152s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    18-11-2021 09:25

General

  • Target

    743f8fec87ebf7c5d6b392261ec3988f.exe

  • Size

    334KB

  • MD5

    743f8fec87ebf7c5d6b392261ec3988f

  • SHA1

    1bc862eecde55f2c1de69bc9e3fdd7468de373d0

  • SHA256

    c9f18cc71c7a1fa61d43a32dfb858f9aa247324a188f8182981b853266d3b1c7

  • SHA512

    59156212c7c800920da3a3f22191799ac4632dda5a3128b4f7bb8a2856a924dedf16c470766ac37ef431df7cc76cc98df4bb1af180c70584caf71cdd28819413

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

185.159.80.90:38637

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

ddf183af4241e3172885cf1b2c4c1fb4ee03d05a

Attributes
  • url4cnc

    http://91.219.236.27/capibar

    http://5.181.156.92/capibar

    http://91.219.236.207/capibar

    http://185.225.19.18/capibar

    http://91.219.237.227/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\743f8fec87ebf7c5d6b392261ec3988f.exe
    "C:\Users\Admin\AppData\Local\Temp\743f8fec87ebf7c5d6b392261ec3988f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\AppData\Local\Temp\743f8fec87ebf7c5d6b392261ec3988f.exe
      "C:\Users\Admin\AppData\Local\Temp\743f8fec87ebf7c5d6b392261ec3988f.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:664
  • C:\Users\Admin\AppData\Local\Temp\4254.exe
    C:\Users\Admin\AppData\Local\Temp\4254.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\4254.exe
      C:\Users\Admin\AppData\Local\Temp\4254.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1060
  • C:\Users\Admin\AppData\Local\Temp\4785.exe
    C:\Users\Admin\AppData\Local\Temp\4785.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Users\Admin\AppData\Local\Temp\4785.exe
      C:\Users\Admin\AppData\Local\Temp\4785.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2368
  • C:\Users\Admin\AppData\Local\Temp\4EF9.exe
    C:\Users\Admin\AppData\Local\Temp\4EF9.exe
    1⤵
    • Executes dropped EXE
    PID:3320
  • C:\Users\Admin\AppData\Local\Temp\5BCB.exe
    C:\Users\Admin\AppData\Local\Temp\5BCB.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1964

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4785.exe.log
    MD5

    41fbed686f5700fc29aaccf83e8ba7fd

    SHA1

    5271bc29538f11e42a3b600c8dc727186e912456

    SHA256

    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

    SHA512

    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

  • C:\Users\Admin\AppData\Local\Temp\4254.exe
    MD5

    8ef1ae58e545946baca2dbc17e135577

    SHA1

    5c885447330a3bfd39a1432e876f5315227dc63a

    SHA256

    0c4f067db78d493cf8966b08555ff8a50e920fe4737786cea5be5348d9785c3c

    SHA512

    35ca7cfedbd9cd70913a57ca1e1b2be976e8fb067471805b70867b232a8b89772d773eafb0fe49aa7bcc14e6a49d85918657ee3ebf2785d15f5e18b5d660eee2

  • C:\Users\Admin\AppData\Local\Temp\4254.exe
    MD5

    8ef1ae58e545946baca2dbc17e135577

    SHA1

    5c885447330a3bfd39a1432e876f5315227dc63a

    SHA256

    0c4f067db78d493cf8966b08555ff8a50e920fe4737786cea5be5348d9785c3c

    SHA512

    35ca7cfedbd9cd70913a57ca1e1b2be976e8fb067471805b70867b232a8b89772d773eafb0fe49aa7bcc14e6a49d85918657ee3ebf2785d15f5e18b5d660eee2

  • C:\Users\Admin\AppData\Local\Temp\4254.exe
    MD5

    8ef1ae58e545946baca2dbc17e135577

    SHA1

    5c885447330a3bfd39a1432e876f5315227dc63a

    SHA256

    0c4f067db78d493cf8966b08555ff8a50e920fe4737786cea5be5348d9785c3c

    SHA512

    35ca7cfedbd9cd70913a57ca1e1b2be976e8fb067471805b70867b232a8b89772d773eafb0fe49aa7bcc14e6a49d85918657ee3ebf2785d15f5e18b5d660eee2

  • C:\Users\Admin\AppData\Local\Temp\4785.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\4785.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\4785.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\4EF9.exe
    MD5

    9733aef1c8ec194a3198ab8e0130b7d4

    SHA1

    cf886d1cbabe2c572edd001c0fa55a13d3e191bd

    SHA256

    fa30571b12211c46fc47639a9d4df6fdeacc8ea6ecffd0a3022f82ffe43d50b1

    SHA512

    49a343a6fc4e4d75f1177ca8d7f65682f853b956a46bb65fa6b22c2a8d5121fd949cfbbb22c44e7fb5631350f97c10ca726260544bcc0b8a706085f9f9f7ff77

  • C:\Users\Admin\AppData\Local\Temp\4EF9.exe
    MD5

    9733aef1c8ec194a3198ab8e0130b7d4

    SHA1

    cf886d1cbabe2c572edd001c0fa55a13d3e191bd

    SHA256

    fa30571b12211c46fc47639a9d4df6fdeacc8ea6ecffd0a3022f82ffe43d50b1

    SHA512

    49a343a6fc4e4d75f1177ca8d7f65682f853b956a46bb65fa6b22c2a8d5121fd949cfbbb22c44e7fb5631350f97c10ca726260544bcc0b8a706085f9f9f7ff77

  • C:\Users\Admin\AppData\Local\Temp\5BCB.exe
    MD5

    a77f1ed5881d44fc95bf3da05c349385

    SHA1

    7a80066b7f8b335ccc1a85d9847a29251f2875ca

    SHA256

    58be03e1a79fedf4f6181c0ce9d819f85cb656b00831c55673e15433183d0206

    SHA512

    308a8bfbc3396c53ab3d38d55238c692eaaf42bfb1fa074cf432f6c980ab790144697a726d7e8b60db82e60a600a280879fb5d833e4dd8eb6eef8198aa368641

  • memory/664-118-0x0000000000402DD8-mapping.dmp
  • memory/664-117-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/1060-137-0x0000000000402DD8-mapping.dmp
  • memory/1964-161-0x0000000003160000-0x0000000003161000-memory.dmp
    Filesize

    4KB

  • memory/1964-139-0x0000000000000000-mapping.dmp
  • memory/1964-180-0x0000000007540000-0x0000000007541000-memory.dmp
    Filesize

    4KB

  • memory/1964-179-0x00000000076E0000-0x00000000076E1000-memory.dmp
    Filesize

    4KB

  • memory/1964-178-0x0000000006FE0000-0x0000000006FE1000-memory.dmp
    Filesize

    4KB

  • memory/1964-174-0x00000000064E0000-0x00000000064E1000-memory.dmp
    Filesize

    4KB

  • memory/1964-168-0x0000000005810000-0x0000000005811000-memory.dmp
    Filesize

    4KB

  • memory/1964-164-0x0000000005510000-0x0000000005511000-memory.dmp
    Filesize

    4KB

  • memory/1964-160-0x00000000778B0000-0x0000000077A3E000-memory.dmp
    Filesize

    1.6MB

  • memory/1964-150-0x0000000000A20000-0x0000000000A21000-memory.dmp
    Filesize

    4KB

  • memory/2368-162-0x0000000004F60000-0x0000000005566000-memory.dmp
    Filesize

    6.0MB

  • memory/2368-142-0x0000000000418EEA-mapping.dmp
  • memory/2368-147-0x0000000005570000-0x0000000005571000-memory.dmp
    Filesize

    4KB

  • memory/2368-141-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/2368-152-0x00000000029F0000-0x00000000029F1000-memory.dmp
    Filesize

    4KB

  • memory/2368-154-0x0000000005070000-0x0000000005071000-memory.dmp
    Filesize

    4KB

  • memory/2368-158-0x0000000004FC0000-0x0000000004FC1000-memory.dmp
    Filesize

    4KB

  • memory/3064-167-0x0000000004200000-0x0000000004216000-memory.dmp
    Filesize

    88KB

  • memory/3064-119-0x0000000000850000-0x0000000000866000-memory.dmp
    Filesize

    88KB

  • memory/3136-116-0x0000000002140000-0x0000000002149000-memory.dmp
    Filesize

    36KB

  • memory/3136-115-0x00000000022D9000-0x00000000022E9000-memory.dmp
    Filesize

    64KB

  • memory/3172-120-0x0000000000000000-mapping.dmp
  • memory/3172-135-0x0000000002128000-0x0000000002139000-memory.dmp
    Filesize

    68KB

  • memory/3320-130-0x0000000000000000-mapping.dmp
  • memory/3320-163-0x00000000024E0000-0x000000000262A000-memory.dmp
    Filesize

    1.3MB

  • memory/3320-166-0x0000000000400000-0x00000000023E7000-memory.dmp
    Filesize

    31.9MB

  • memory/3948-126-0x0000000000890000-0x0000000000891000-memory.dmp
    Filesize

    4KB

  • memory/3948-123-0x0000000000000000-mapping.dmp
  • memory/3948-134-0x0000000002B40000-0x0000000002B41000-memory.dmp
    Filesize

    4KB

  • memory/3948-133-0x00000000056F0000-0x00000000056F1000-memory.dmp
    Filesize

    4KB

  • memory/3948-128-0x0000000005160000-0x0000000005161000-memory.dmp
    Filesize

    4KB

  • memory/3948-129-0x0000000002B10000-0x0000000002B11000-memory.dmp
    Filesize

    4KB