Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    18-11-2021 20:32

General

  • Target

    d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415.exe

  • Size

    254KB

  • MD5

    0e85af002e97350076fb267344653f59

  • SHA1

    f643c9829205f56cb4c71845dd3f2c36bb083a5f

  • SHA256

    d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415

  • SHA512

    f337ebc4fa8de69184c75eb045790c7d5e3dedc860185e0ffc26ee9c85acbc51e93619f7c88bad9d85f7433c9e6a206f7462d9269168aaff03e1ad52a1cd95f4

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

C2

185.159.80.90:38637

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

ddf183af4241e3172885cf1b2c4c1fb4ee03d05a

Attributes
  • url4cnc

    http://91.219.236.27/capibar

    http://5.181.156.92/capibar

    http://91.219.236.207/capibar

    http://185.225.19.18/capibar

    http://91.219.237.227/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

easymoneydontshiny

C2

45.153.186.153:56675

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

    suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415.exe
    "C:\Users\Admin\AppData\Local\Temp\d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415.exe
      "C:\Users\Admin\AppData\Local\Temp\d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3780
  • C:\Users\Admin\AppData\Local\Temp\FC62.exe
    C:\Users\Admin\AppData\Local\Temp\FC62.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Users\Admin\AppData\Local\Temp\FC62.exe
      C:\Users\Admin\AppData\Local\Temp\FC62.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1112
  • C:\Users\Admin\AppData\Local\Temp\F7.exe
    C:\Users\Admin\AppData\Local\Temp\F7.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\F7.exe
      C:\Users\Admin\AppData\Local\Temp\F7.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:612
  • C:\Users\Admin\AppData\Local\Temp\81C.exe
    C:\Users\Admin\AppData\Local\Temp\81C.exe
    1⤵
    • Executes dropped EXE
    PID:820
  • C:\Users\Admin\AppData\Local\Temp\16B3.exe
    C:\Users\Admin\AppData\Local\Temp\16B3.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3824
  • C:\Users\Admin\AppData\Local\Temp\22F9.exe
    C:\Users\Admin\AppData\Local\Temp\22F9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\22F9.exe
      C:\Users\Admin\AppData\Local\Temp\22F9.exe
      2⤵
      • Executes dropped EXE
      PID:3472
    • C:\Users\Admin\AppData\Local\Temp\22F9.exe
      C:\Users\Admin\AppData\Local\Temp\22F9.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3788
  • C:\Users\Admin\AppData\Local\Temp\30FF.exe
    C:\Users\Admin\AppData\Local\Temp\30FF.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1168

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\22F9.exe.log
    MD5

    daa436d058b25bdde9e2d6fe53c6ccf6

    SHA1

    3fc5d1eab28db05865915d8f6d9ecf85d9cc1d9e

    SHA256

    afb0ed8659b214fe4251a87a1c0a362c123363497fbd50737c1ae36a9376c4cd

    SHA512

    84f13582070ae4a3a9bb5e4b29620e659c258ab282e43e9bfa50528c08aae875d8c33cf3647fbb1253102af39b89f3b97f316e62f544355cc9c379e04fba960a

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\F7.exe.log
    MD5

    41fbed686f5700fc29aaccf83e8ba7fd

    SHA1

    5271bc29538f11e42a3b600c8dc727186e912456

    SHA256

    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

    SHA512

    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

  • C:\Users\Admin\AppData\Local\Temp\16B3.exe
    MD5

    03651bfa0fa57d86e5a612e0cc81bc09

    SHA1

    67738024bea02128f0d7a9939e193dc706bcd0d8

    SHA256

    48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

    SHA512

    b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

  • C:\Users\Admin\AppData\Local\Temp\16B3.exe
    MD5

    03651bfa0fa57d86e5a612e0cc81bc09

    SHA1

    67738024bea02128f0d7a9939e193dc706bcd0d8

    SHA256

    48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

    SHA512

    b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

  • C:\Users\Admin\AppData\Local\Temp\22F9.exe
    MD5

    6b9b7cbe70891c32b9fa7ec3d4737d09

    SHA1

    2e4a6fbbc37102bbe5a31a8f1f45f68f8755229a

    SHA256

    fe0f1fd4a510707f64b904fc422649f8ce38cefa77e13d9607abf19b7d6be83d

    SHA512

    597f6c5077cdaaa1dcc795bb2b653020566d217283e03dd7f1bd56b0f79edc6a262ee7e68d6d43f00d76453ee6abcd5f584a316661346545af80076e180f4eb2

  • C:\Users\Admin\AppData\Local\Temp\22F9.exe
    MD5

    6b9b7cbe70891c32b9fa7ec3d4737d09

    SHA1

    2e4a6fbbc37102bbe5a31a8f1f45f68f8755229a

    SHA256

    fe0f1fd4a510707f64b904fc422649f8ce38cefa77e13d9607abf19b7d6be83d

    SHA512

    597f6c5077cdaaa1dcc795bb2b653020566d217283e03dd7f1bd56b0f79edc6a262ee7e68d6d43f00d76453ee6abcd5f584a316661346545af80076e180f4eb2

  • C:\Users\Admin\AppData\Local\Temp\22F9.exe
    MD5

    6b9b7cbe70891c32b9fa7ec3d4737d09

    SHA1

    2e4a6fbbc37102bbe5a31a8f1f45f68f8755229a

    SHA256

    fe0f1fd4a510707f64b904fc422649f8ce38cefa77e13d9607abf19b7d6be83d

    SHA512

    597f6c5077cdaaa1dcc795bb2b653020566d217283e03dd7f1bd56b0f79edc6a262ee7e68d6d43f00d76453ee6abcd5f584a316661346545af80076e180f4eb2

  • C:\Users\Admin\AppData\Local\Temp\22F9.exe
    MD5

    6b9b7cbe70891c32b9fa7ec3d4737d09

    SHA1

    2e4a6fbbc37102bbe5a31a8f1f45f68f8755229a

    SHA256

    fe0f1fd4a510707f64b904fc422649f8ce38cefa77e13d9607abf19b7d6be83d

    SHA512

    597f6c5077cdaaa1dcc795bb2b653020566d217283e03dd7f1bd56b0f79edc6a262ee7e68d6d43f00d76453ee6abcd5f584a316661346545af80076e180f4eb2

  • C:\Users\Admin\AppData\Local\Temp\30FF.exe
    MD5

    ab3c98248ec517c1e1fdcf46ecb701df

    SHA1

    c41c7832d51277503cf249a0f8a05371fc0bca3c

    SHA256

    14424fc9333267762f5ab6133a7a36a58624682276bd0e37c9107baa86ca5804

    SHA512

    350b2d5d47a4db9b1f2d2abf54ee7e145f261de4afcc9c72eb6c2871cd8cc84a51c8fad95a614316446bc12376b5e23f62e1bb90290d58cb9b20c8cb24e42475

  • C:\Users\Admin\AppData\Local\Temp\30FF.exe
    MD5

    ab3c98248ec517c1e1fdcf46ecb701df

    SHA1

    c41c7832d51277503cf249a0f8a05371fc0bca3c

    SHA256

    14424fc9333267762f5ab6133a7a36a58624682276bd0e37c9107baa86ca5804

    SHA512

    350b2d5d47a4db9b1f2d2abf54ee7e145f261de4afcc9c72eb6c2871cd8cc84a51c8fad95a614316446bc12376b5e23f62e1bb90290d58cb9b20c8cb24e42475

  • C:\Users\Admin\AppData\Local\Temp\81C.exe
    MD5

    9733aef1c8ec194a3198ab8e0130b7d4

    SHA1

    cf886d1cbabe2c572edd001c0fa55a13d3e191bd

    SHA256

    fa30571b12211c46fc47639a9d4df6fdeacc8ea6ecffd0a3022f82ffe43d50b1

    SHA512

    49a343a6fc4e4d75f1177ca8d7f65682f853b956a46bb65fa6b22c2a8d5121fd949cfbbb22c44e7fb5631350f97c10ca726260544bcc0b8a706085f9f9f7ff77

  • C:\Users\Admin\AppData\Local\Temp\81C.exe
    MD5

    9733aef1c8ec194a3198ab8e0130b7d4

    SHA1

    cf886d1cbabe2c572edd001c0fa55a13d3e191bd

    SHA256

    fa30571b12211c46fc47639a9d4df6fdeacc8ea6ecffd0a3022f82ffe43d50b1

    SHA512

    49a343a6fc4e4d75f1177ca8d7f65682f853b956a46bb65fa6b22c2a8d5121fd949cfbbb22c44e7fb5631350f97c10ca726260544bcc0b8a706085f9f9f7ff77

  • C:\Users\Admin\AppData\Local\Temp\F7.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\F7.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\F7.exe
    MD5

    5e34695c9f46f1e69ce731d3b7359c88

    SHA1

    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

    SHA256

    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

    SHA512

    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

  • C:\Users\Admin\AppData\Local\Temp\FC62.exe
    MD5

    0e85af002e97350076fb267344653f59

    SHA1

    f643c9829205f56cb4c71845dd3f2c36bb083a5f

    SHA256

    d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415

    SHA512

    f337ebc4fa8de69184c75eb045790c7d5e3dedc860185e0ffc26ee9c85acbc51e93619f7c88bad9d85f7433c9e6a206f7462d9269168aaff03e1ad52a1cd95f4

  • C:\Users\Admin\AppData\Local\Temp\FC62.exe
    MD5

    0e85af002e97350076fb267344653f59

    SHA1

    f643c9829205f56cb4c71845dd3f2c36bb083a5f

    SHA256

    d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415

    SHA512

    f337ebc4fa8de69184c75eb045790c7d5e3dedc860185e0ffc26ee9c85acbc51e93619f7c88bad9d85f7433c9e6a206f7462d9269168aaff03e1ad52a1cd95f4

  • C:\Users\Admin\AppData\Local\Temp\FC62.exe
    MD5

    0e85af002e97350076fb267344653f59

    SHA1

    f643c9829205f56cb4c71845dd3f2c36bb083a5f

    SHA256

    d9eb1912feef4acc695a1a10050c7615bdc4ce9d3a41620efa3bca20b63d5415

    SHA512

    f337ebc4fa8de69184c75eb045790c7d5e3dedc860185e0ffc26ee9c85acbc51e93619f7c88bad9d85f7433c9e6a206f7462d9269168aaff03e1ad52a1cd95f4

  • memory/612-144-0x0000000000418EEA-mapping.dmp
  • memory/612-180-0x0000000006BB0000-0x0000000006BB1000-memory.dmp
    Filesize

    4KB

  • memory/612-177-0x00000000060D0000-0x00000000060D1000-memory.dmp
    Filesize

    4KB

  • memory/612-154-0x0000000005080000-0x0000000005686000-memory.dmp
    Filesize

    6.0MB

  • memory/612-143-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/612-174-0x00000000055D0000-0x00000000055D1000-memory.dmp
    Filesize

    4KB

  • memory/612-181-0x00000000072B0000-0x00000000072B1000-memory.dmp
    Filesize

    4KB

  • memory/612-153-0x00000000051D0000-0x00000000051D1000-memory.dmp
    Filesize

    4KB

  • memory/612-149-0x0000000005690000-0x0000000005691000-memory.dmp
    Filesize

    4KB

  • memory/612-150-0x0000000005130000-0x0000000005131000-memory.dmp
    Filesize

    4KB

  • memory/612-151-0x0000000005260000-0x0000000005261000-memory.dmp
    Filesize

    4KB

  • memory/612-152-0x0000000005190000-0x0000000005191000-memory.dmp
    Filesize

    4KB

  • memory/820-159-0x00000000024E0000-0x000000000262A000-memory.dmp
    Filesize

    1.3MB

  • memory/820-135-0x0000000000000000-mapping.dmp
  • memory/820-158-0x00000000025E6000-0x0000000002636000-memory.dmp
    Filesize

    320KB

  • memory/820-160-0x0000000000400000-0x00000000023E7000-memory.dmp
    Filesize

    31.9MB

  • memory/920-133-0x0000000005CC0000-0x0000000005CC1000-memory.dmp
    Filesize

    4KB

  • memory/920-129-0x0000000000D50000-0x0000000000D51000-memory.dmp
    Filesize

    4KB

  • memory/920-126-0x0000000000000000-mapping.dmp
  • memory/920-131-0x0000000005580000-0x0000000005581000-memory.dmp
    Filesize

    4KB

  • memory/920-132-0x0000000005520000-0x0000000005521000-memory.dmp
    Filesize

    4KB

  • memory/920-134-0x00000000057B0000-0x00000000057B1000-memory.dmp
    Filesize

    4KB

  • memory/1112-140-0x0000000000402DD8-mapping.dmp
  • memory/1168-223-0x00000000056C3000-0x00000000056C4000-memory.dmp
    Filesize

    4KB

  • memory/1168-219-0x0000000001130000-0x000000000127A000-memory.dmp
    Filesize

    1.3MB

  • memory/1168-220-0x0000000000400000-0x00000000010A1000-memory.dmp
    Filesize

    12.6MB

  • memory/1168-213-0x0000000002FB0000-0x0000000002FDC000-memory.dmp
    Filesize

    176KB

  • memory/1168-211-0x0000000002DD0000-0x0000000002DFE000-memory.dmp
    Filesize

    184KB

  • memory/1168-210-0x00000000012B6000-0x00000000012E2000-memory.dmp
    Filesize

    176KB

  • memory/1168-207-0x0000000000000000-mapping.dmp
  • memory/1168-221-0x00000000056C0000-0x00000000056C1000-memory.dmp
    Filesize

    4KB

  • memory/1168-222-0x00000000056C2000-0x00000000056C3000-memory.dmp
    Filesize

    4KB

  • memory/1168-224-0x00000000056C4000-0x00000000056C6000-memory.dmp
    Filesize

    8KB

  • memory/2340-184-0x0000000004FB0000-0x0000000004FD7000-memory.dmp
    Filesize

    156KB

  • memory/2340-162-0x0000000000000000-mapping.dmp
  • memory/2340-172-0x0000000007E80000-0x0000000007EE1000-memory.dmp
    Filesize

    388KB

  • memory/2340-167-0x0000000001270000-0x0000000001271000-memory.dmp
    Filesize

    4KB

  • memory/2340-168-0x0000000005080000-0x0000000005081000-memory.dmp
    Filesize

    4KB

  • memory/2340-165-0x00000000012B0000-0x00000000012B1000-memory.dmp
    Filesize

    4KB

  • memory/2460-118-0x0000000001396000-0x00000000013A7000-memory.dmp
    Filesize

    68KB

  • memory/2460-119-0x0000000001170000-0x0000000001179000-memory.dmp
    Filesize

    36KB

  • memory/3040-122-0x00000000009B0000-0x00000000009C6000-memory.dmp
    Filesize

    88KB

  • memory/3040-161-0x0000000004B60000-0x0000000004B76000-memory.dmp
    Filesize

    88KB

  • memory/3040-182-0x0000000004E30000-0x0000000004E46000-memory.dmp
    Filesize

    88KB

  • memory/3708-123-0x0000000000000000-mapping.dmp
  • memory/3708-142-0x00000000011C0000-0x000000000130A000-memory.dmp
    Filesize

    1.3MB

  • memory/3780-120-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/3780-121-0x0000000000402DD8-mapping.dmp
  • memory/3788-204-0x0000000006920000-0x0000000006921000-memory.dmp
    Filesize

    4KB

  • memory/3788-198-0x00000000052A0000-0x00000000052A1000-memory.dmp
    Filesize

    4KB

  • memory/3788-197-0x00000000052B0000-0x00000000052B1000-memory.dmp
    Filesize

    4KB

  • memory/3788-192-0x00000000011E0000-0x00000000011E1000-memory.dmp
    Filesize

    4KB

  • memory/3788-187-0x0000000000436F6E-mapping.dmp
  • memory/3788-186-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/3824-170-0x00000000011C0000-0x000000000130A000-memory.dmp
    Filesize

    1.3MB

  • memory/3824-171-0x0000000000400000-0x0000000001085000-memory.dmp
    Filesize

    12.5MB

  • memory/3824-155-0x0000000000000000-mapping.dmp