Analysis
-
max time kernel
161s -
max time network
170s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
18-11-2021 14:53
Static task
static1
Behavioral task
behavioral1
Sample
4c72e48b856d03386fe5d7f0af228f34.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
4c72e48b856d03386fe5d7f0af228f34.exe
Resource
win10-en-20211014
General
-
Target
4c72e48b856d03386fe5d7f0af228f34.exe
-
Size
255KB
-
MD5
4c72e48b856d03386fe5d7f0af228f34
-
SHA1
6a9b57f02965c7673e41b8605dad98dfa7220cdd
-
SHA256
364e6eb302ea9226c69d3efc8485f827e61bab6e2ea34fb85c8a87a604e3ed5c
-
SHA512
4ea405285989cf0b4fec6b492c0bf59f29056e2bf83da60a2b284cdca4191e4d4b64fd72555fad82aeea76e2760ec303f28a488d5ae1cf2c0ec45fc54629c363
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
raccoon
1.8.3-hotfix
ddf183af4241e3172885cf1b2c4c1fb4ee03d05a
-
url4cnc
http://91.219.236.27/capibar
http://5.181.156.92/capibar
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Extracted
redline
185.159.80.90:38637
Extracted
redline
Alex
178.238.8.72:49214
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/980-105-0x0000000003C00000-0x0000000003C2E000-memory.dmp family_redline behavioral1/memory/980-106-0x0000000003C30000-0x0000000003C5C000-memory.dmp family_redline behavioral1/memory/1272-116-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1272-117-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1272-115-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1272-118-0x0000000000418EEA-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
169C.exe251E.exe169C.exe2C60.exe340E.exe44B2.exe549B.exe251E.exepid process 1840 169C.exe 1704 251E.exe 1556 169C.exe 1492 2C60.exe 308 340E.exe 980 44B2.exe 1712 549B.exe 1272 251E.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
340E.exe549B.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 340E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 340E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 549B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 549B.exe -
Deletes itself 1 IoCs
Processes:
pid process 1360 -
Loads dropped DLL 2 IoCs
Processes:
169C.exe251E.exepid process 1840 169C.exe 1704 251E.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\340E.exe themida behavioral1/memory/308-84-0x0000000000AA0000-0x0000000000AA1000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\549B.exe themida behavioral1/memory/1712-99-0x0000000000DC0000-0x0000000000DC1000-memory.dmp themida -
Processes:
340E.exe549B.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 340E.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 549B.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
340E.exe549B.exepid process 308 340E.exe 1712 549B.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
4c72e48b856d03386fe5d7f0af228f34.exe169C.exe251E.exedescription pid process target process PID 1640 set thread context of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1840 set thread context of 1556 1840 169C.exe 169C.exe PID 1704 set thread context of 1272 1704 251E.exe 251E.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
169C.exe4c72e48b856d03386fe5d7f0af228f34.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 169C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4c72e48b856d03386fe5d7f0af228f34.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4c72e48b856d03386fe5d7f0af228f34.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4c72e48b856d03386fe5d7f0af228f34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 169C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 169C.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4c72e48b856d03386fe5d7f0af228f34.exepid process 1060 4c72e48b856d03386fe5d7f0af228f34.exe 1060 4c72e48b856d03386fe5d7f0af228f34.exe 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1360 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
4c72e48b856d03386fe5d7f0af228f34.exe169C.exepid process 1060 4c72e48b856d03386fe5d7f0af228f34.exe 1556 169C.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
44B2.exedescription pid process Token: SeShutdownPrivilege 1360 Token: SeShutdownPrivilege 1360 Token: SeDebugPrivilege 980 44B2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1360 1360 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1360 1360 -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
4c72e48b856d03386fe5d7f0af228f34.exe169C.exe251E.exedescription pid process target process PID 1640 wrote to memory of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1640 wrote to memory of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1640 wrote to memory of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1640 wrote to memory of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1640 wrote to memory of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1640 wrote to memory of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1640 wrote to memory of 1060 1640 4c72e48b856d03386fe5d7f0af228f34.exe 4c72e48b856d03386fe5d7f0af228f34.exe PID 1360 wrote to memory of 1840 1360 169C.exe PID 1360 wrote to memory of 1840 1360 169C.exe PID 1360 wrote to memory of 1840 1360 169C.exe PID 1360 wrote to memory of 1840 1360 169C.exe PID 1360 wrote to memory of 1704 1360 251E.exe PID 1360 wrote to memory of 1704 1360 251E.exe PID 1360 wrote to memory of 1704 1360 251E.exe PID 1360 wrote to memory of 1704 1360 251E.exe PID 1840 wrote to memory of 1556 1840 169C.exe 169C.exe PID 1840 wrote to memory of 1556 1840 169C.exe 169C.exe PID 1840 wrote to memory of 1556 1840 169C.exe 169C.exe PID 1840 wrote to memory of 1556 1840 169C.exe 169C.exe PID 1840 wrote to memory of 1556 1840 169C.exe 169C.exe PID 1840 wrote to memory of 1556 1840 169C.exe 169C.exe PID 1840 wrote to memory of 1556 1840 169C.exe 169C.exe PID 1360 wrote to memory of 1492 1360 2C60.exe PID 1360 wrote to memory of 1492 1360 2C60.exe PID 1360 wrote to memory of 1492 1360 2C60.exe PID 1360 wrote to memory of 1492 1360 2C60.exe PID 1360 wrote to memory of 308 1360 340E.exe PID 1360 wrote to memory of 308 1360 340E.exe PID 1360 wrote to memory of 308 1360 340E.exe PID 1360 wrote to memory of 308 1360 340E.exe PID 1360 wrote to memory of 980 1360 44B2.exe PID 1360 wrote to memory of 980 1360 44B2.exe PID 1360 wrote to memory of 980 1360 44B2.exe PID 1360 wrote to memory of 980 1360 44B2.exe PID 1360 wrote to memory of 1712 1360 549B.exe PID 1360 wrote to memory of 1712 1360 549B.exe PID 1360 wrote to memory of 1712 1360 549B.exe PID 1360 wrote to memory of 1712 1360 549B.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe PID 1704 wrote to memory of 1272 1704 251E.exe 251E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c72e48b856d03386fe5d7f0af228f34.exe"C:\Users\Admin\AppData\Local\Temp\4c72e48b856d03386fe5d7f0af228f34.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4c72e48b856d03386fe5d7f0af228f34.exe"C:\Users\Admin\AppData\Local\Temp\4c72e48b856d03386fe5d7f0af228f34.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\169C.exeC:\Users\Admin\AppData\Local\Temp\169C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\169C.exeC:\Users\Admin\AppData\Local\Temp\169C.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\251E.exeC:\Users\Admin\AppData\Local\Temp\251E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\251E.exeC:\Users\Admin\AppData\Local\Temp\251E.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2C60.exeC:\Users\Admin\AppData\Local\Temp\2C60.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\340E.exeC:\Users\Admin\AppData\Local\Temp\340E.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\44B2.exeC:\Users\Admin\AppData\Local\Temp\44B2.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\549B.exeC:\Users\Admin\AppData\Local\Temp\549B.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\169C.exeMD5
649bf4cc2f084402cebbb0ff1b310c9f
SHA176ff401d21f44188f506579136de8d7d205558f5
SHA256168b4fd6bf9762ba14225a9ac46f47687c5d8e6c10d15e8af611245d53cbd49f
SHA512000b5454d02caee2667242a73f35b5dbdf4b5fffdf773bae035537a578b525092be228a3a91b3ecc3745293b3add808a739bad5cc16f3a4a8c466066f73c0eae
-
C:\Users\Admin\AppData\Local\Temp\169C.exeMD5
649bf4cc2f084402cebbb0ff1b310c9f
SHA176ff401d21f44188f506579136de8d7d205558f5
SHA256168b4fd6bf9762ba14225a9ac46f47687c5d8e6c10d15e8af611245d53cbd49f
SHA512000b5454d02caee2667242a73f35b5dbdf4b5fffdf773bae035537a578b525092be228a3a91b3ecc3745293b3add808a739bad5cc16f3a4a8c466066f73c0eae
-
C:\Users\Admin\AppData\Local\Temp\169C.exeMD5
649bf4cc2f084402cebbb0ff1b310c9f
SHA176ff401d21f44188f506579136de8d7d205558f5
SHA256168b4fd6bf9762ba14225a9ac46f47687c5d8e6c10d15e8af611245d53cbd49f
SHA512000b5454d02caee2667242a73f35b5dbdf4b5fffdf773bae035537a578b525092be228a3a91b3ecc3745293b3add808a739bad5cc16f3a4a8c466066f73c0eae
-
C:\Users\Admin\AppData\Local\Temp\251E.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
C:\Users\Admin\AppData\Local\Temp\251E.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
C:\Users\Admin\AppData\Local\Temp\251E.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
C:\Users\Admin\AppData\Local\Temp\2C60.exeMD5
9733aef1c8ec194a3198ab8e0130b7d4
SHA1cf886d1cbabe2c572edd001c0fa55a13d3e191bd
SHA256fa30571b12211c46fc47639a9d4df6fdeacc8ea6ecffd0a3022f82ffe43d50b1
SHA51249a343a6fc4e4d75f1177ca8d7f65682f853b956a46bb65fa6b22c2a8d5121fd949cfbbb22c44e7fb5631350f97c10ca726260544bcc0b8a706085f9f9f7ff77
-
C:\Users\Admin\AppData\Local\Temp\340E.exeMD5
3f79ca6d82c7aacf18ceed20d8e452fc
SHA1f934df2ccbc2470aacc4b82a1385399b1a5c7aa8
SHA256a32cf739c0a3abeb915bef11aaecd03c13ac1081389a2154139b7de70abb9a73
SHA512d83f33d0770430d698fc91dea3caaf8b10478765fe69c0562a1dc9c3037860c7a39820ebc40a76fb0fdbaa4f77b6272afafc92f709da87bc73cb65f1f811e455
-
C:\Users\Admin\AppData\Local\Temp\44B2.exeMD5
6c0c449942113645b0d136302838f028
SHA101a8326a28c73848507a251c5f61071490aa46eb
SHA256c325d98c7689964cadb138bf351b863372ee464a350f3d1fc11fe0906c8a1cb4
SHA512b86ac767441d558263643600a9382157cdcbd5e3f1044e111107f1a2d188e8dfbae537334b21ef9d9c0a0076766d66185733a46f76f9b80e716a1e6b5f03af52
-
C:\Users\Admin\AppData\Local\Temp\549B.exeMD5
fccd9abbf0a8935615a5925e5eeef393
SHA172398d1a783eabf22f573deda7e2600757317af5
SHA256196102f3eacabc8103d5efa4cd30acd10491232f4798c5c6fd03892253e0abc6
SHA512ece1641ccd5a28352383e2fc179f1b98785999f4be5c9f7333935ce3c40d56f89c5479756e67dd92b37d60e30b0279d2da6ab2030e7c2fcc29bb6ff35665784e
-
\Users\Admin\AppData\Local\Temp\169C.exeMD5
649bf4cc2f084402cebbb0ff1b310c9f
SHA176ff401d21f44188f506579136de8d7d205558f5
SHA256168b4fd6bf9762ba14225a9ac46f47687c5d8e6c10d15e8af611245d53cbd49f
SHA512000b5454d02caee2667242a73f35b5dbdf4b5fffdf773bae035537a578b525092be228a3a91b3ecc3745293b3add808a739bad5cc16f3a4a8c466066f73c0eae
-
\Users\Admin\AppData\Local\Temp\251E.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
memory/308-77-0x0000000000000000-mapping.dmp
-
memory/308-84-0x0000000000AA0000-0x0000000000AA1000-memory.dmpFilesize
4KB
-
memory/308-111-0x0000000005330000-0x0000000005331000-memory.dmpFilesize
4KB
-
memory/980-105-0x0000000003C00000-0x0000000003C2E000-memory.dmpFilesize
184KB
-
memory/980-109-0x00000000063F3000-0x00000000063F4000-memory.dmpFilesize
4KB
-
memory/980-112-0x00000000063F4000-0x00000000063F6000-memory.dmpFilesize
8KB
-
memory/980-107-0x00000000063F1000-0x00000000063F2000-memory.dmpFilesize
4KB
-
memory/980-108-0x00000000063F2000-0x00000000063F3000-memory.dmpFilesize
4KB
-
memory/980-106-0x0000000003C30000-0x0000000003C5C000-memory.dmpFilesize
176KB
-
memory/980-103-0x0000000000400000-0x0000000001FE7000-memory.dmpFilesize
27.9MB
-
memory/980-102-0x0000000000220000-0x0000000000259000-memory.dmpFilesize
228KB
-
memory/980-101-0x00000000021BD000-0x00000000021E9000-memory.dmpFilesize
176KB
-
memory/980-91-0x0000000000000000-mapping.dmp
-
memory/1060-59-0x0000000075F41000-0x0000000075F43000-memory.dmpFilesize
8KB
-
memory/1060-58-0x0000000000402DD8-mapping.dmp
-
memory/1060-57-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1272-118-0x0000000000418EEA-mapping.dmp
-
memory/1272-113-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1272-116-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1272-114-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1272-117-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1272-115-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1360-88-0x0000000003EE0000-0x0000000003EF6000-memory.dmpFilesize
88KB
-
memory/1360-60-0x00000000025A0000-0x00000000025B6000-memory.dmpFilesize
88KB
-
memory/1492-80-0x000000000286B000-0x00000000028BA000-memory.dmpFilesize
316KB
-
memory/1492-87-0x0000000002660000-0x00000000026EF000-memory.dmpFilesize
572KB
-
memory/1492-73-0x0000000000000000-mapping.dmp
-
memory/1492-90-0x0000000000400000-0x00000000023E7000-memory.dmpFilesize
31.9MB
-
memory/1556-69-0x0000000000402DD8-mapping.dmp
-
memory/1640-55-0x000000000117D000-0x000000000118E000-memory.dmpFilesize
68KB
-
memory/1640-56-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1704-63-0x0000000000000000-mapping.dmp
-
memory/1704-75-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/1704-89-0x0000000002230000-0x0000000002231000-memory.dmpFilesize
4KB
-
memory/1712-110-0x00000000054F0000-0x00000000054F1000-memory.dmpFilesize
4KB
-
memory/1712-99-0x0000000000DC0000-0x0000000000DC1000-memory.dmpFilesize
4KB
-
memory/1712-93-0x0000000000000000-mapping.dmp
-
memory/1840-65-0x000000000118D000-0x000000000119E000-memory.dmpFilesize
68KB
-
memory/1840-61-0x0000000000000000-mapping.dmp