Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
19-11-2021 19:06
Static task
static1
Behavioral task
behavioral1
Sample
bde64a1b356c3eacaf76a9a47893a816.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
bde64a1b356c3eacaf76a9a47893a816.exe
Resource
win10-en-20211014
General
-
Target
bde64a1b356c3eacaf76a9a47893a816.exe
-
Size
169KB
-
MD5
bde64a1b356c3eacaf76a9a47893a816
-
SHA1
5b34858d77fbf9b7e0037175a5448ca3e9466178
-
SHA256
5617cf97967fc9377f8b775f52fe43c8c54f9cab67fa164f6f903d4ebe9b79c2
-
SHA512
a2ba793d200318fd08344c8727fda1ed1427120206a274365495434316e131d05d98ea0d7e23e3b68bcae180fe86889f8727aa793e5a299355b9964212337eff
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
redline
185.159.80.90:38637
Extracted
raccoon
1.8.3-hotfix
ddf183af4241e3172885cf1b2c4c1fb4ee03d05a
-
url4cnc
http://91.219.236.27/capibar
http://5.181.156.92/capibar
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1624-81-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1624-80-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1624-82-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1624-83-0x0000000000418EEA-mapping.dmp family_redline behavioral1/memory/1624-85-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1164-104-0x00000000002E0000-0x0000000000301000-memory.dmp family_arkei behavioral1/memory/1164-105-0x0000000000400000-0x000000000043D000-memory.dmp family_arkei -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
8852.exe8852.exe9FAA.exe9FAA.exeB675.exeD5D9.exeF06B.exepid process 1108 8852.exe 1540 8852.exe 1880 9FAA.exe 1624 9FAA.exe 360 B675.exe 1608 D5D9.exe 1164 F06B.exe -
Deletes itself 1 IoCs
Processes:
pid process 1396 -
Loads dropped DLL 2 IoCs
Processes:
8852.exe9FAA.exepid process 1108 8852.exe 1880 9FAA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
bde64a1b356c3eacaf76a9a47893a816.exe8852.exe9FAA.exedescription pid process target process PID 792 set thread context of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 1108 set thread context of 1540 1108 8852.exe 8852.exe PID 1880 set thread context of 1624 1880 9FAA.exe 9FAA.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bde64a1b356c3eacaf76a9a47893a816.exe8852.exeD5D9.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bde64a1b356c3eacaf76a9a47893a816.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8852.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D5D9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D5D9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bde64a1b356c3eacaf76a9a47893a816.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bde64a1b356c3eacaf76a9a47893a816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8852.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D5D9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bde64a1b356c3eacaf76a9a47893a816.exepid process 872 bde64a1b356c3eacaf76a9a47893a816.exe 872 bde64a1b356c3eacaf76a9a47893a816.exe 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1396 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
bde64a1b356c3eacaf76a9a47893a816.exe8852.exeD5D9.exepid process 872 bde64a1b356c3eacaf76a9a47893a816.exe 1540 8852.exe 1608 D5D9.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
9FAA.exedescription pid process Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeDebugPrivilege 1624 9FAA.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1396 1396 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1396 1396 -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
bde64a1b356c3eacaf76a9a47893a816.exe8852.exe9FAA.exedescription pid process target process PID 792 wrote to memory of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 792 wrote to memory of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 792 wrote to memory of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 792 wrote to memory of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 792 wrote to memory of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 792 wrote to memory of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 792 wrote to memory of 872 792 bde64a1b356c3eacaf76a9a47893a816.exe bde64a1b356c3eacaf76a9a47893a816.exe PID 1396 wrote to memory of 1108 1396 8852.exe PID 1396 wrote to memory of 1108 1396 8852.exe PID 1396 wrote to memory of 1108 1396 8852.exe PID 1396 wrote to memory of 1108 1396 8852.exe PID 1108 wrote to memory of 1540 1108 8852.exe 8852.exe PID 1108 wrote to memory of 1540 1108 8852.exe 8852.exe PID 1108 wrote to memory of 1540 1108 8852.exe 8852.exe PID 1108 wrote to memory of 1540 1108 8852.exe 8852.exe PID 1108 wrote to memory of 1540 1108 8852.exe 8852.exe PID 1108 wrote to memory of 1540 1108 8852.exe 8852.exe PID 1108 wrote to memory of 1540 1108 8852.exe 8852.exe PID 1396 wrote to memory of 1880 1396 9FAA.exe PID 1396 wrote to memory of 1880 1396 9FAA.exe PID 1396 wrote to memory of 1880 1396 9FAA.exe PID 1396 wrote to memory of 1880 1396 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1880 wrote to memory of 1624 1880 9FAA.exe 9FAA.exe PID 1396 wrote to memory of 360 1396 B675.exe PID 1396 wrote to memory of 360 1396 B675.exe PID 1396 wrote to memory of 360 1396 B675.exe PID 1396 wrote to memory of 360 1396 B675.exe PID 1396 wrote to memory of 1608 1396 D5D9.exe PID 1396 wrote to memory of 1608 1396 D5D9.exe PID 1396 wrote to memory of 1608 1396 D5D9.exe PID 1396 wrote to memory of 1608 1396 D5D9.exe PID 1396 wrote to memory of 1164 1396 F06B.exe PID 1396 wrote to memory of 1164 1396 F06B.exe PID 1396 wrote to memory of 1164 1396 F06B.exe PID 1396 wrote to memory of 1164 1396 F06B.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde64a1b356c3eacaf76a9a47893a816.exe"C:\Users\Admin\AppData\Local\Temp\bde64a1b356c3eacaf76a9a47893a816.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bde64a1b356c3eacaf76a9a47893a816.exe"C:\Users\Admin\AppData\Local\Temp\bde64a1b356c3eacaf76a9a47893a816.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\8852.exeC:\Users\Admin\AppData\Local\Temp\8852.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8852.exeC:\Users\Admin\AppData\Local\Temp\8852.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\9FAA.exeC:\Users\Admin\AppData\Local\Temp\9FAA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9FAA.exeC:\Users\Admin\AppData\Local\Temp\9FAA.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\B675.exeC:\Users\Admin\AppData\Local\Temp\B675.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\D5D9.exeC:\Users\Admin\AppData\Local\Temp\D5D9.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F06B.exeC:\Users\Admin\AppData\Local\Temp\F06B.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8852.exeMD5
4ebe441be9489f7b16fef3f98d2f0a91
SHA1ef70bb8c983cacc72fb4d473d1ed3c3a8c7cf0ef
SHA25675f6edf722224fc3097c1ed8be83d4fabff72cbe4480201c2e4fe01dd4c1a231
SHA5126cfa9388bf8ee996aad9723d9bb8e4c2777725b880380ed5caca5a7ae05aeb5b2da2cc4223465e9dc6f6c9d534d364d96a0d1c8d2eb6e732d92d7593e7cba6f1
-
C:\Users\Admin\AppData\Local\Temp\8852.exeMD5
4ebe441be9489f7b16fef3f98d2f0a91
SHA1ef70bb8c983cacc72fb4d473d1ed3c3a8c7cf0ef
SHA25675f6edf722224fc3097c1ed8be83d4fabff72cbe4480201c2e4fe01dd4c1a231
SHA5126cfa9388bf8ee996aad9723d9bb8e4c2777725b880380ed5caca5a7ae05aeb5b2da2cc4223465e9dc6f6c9d534d364d96a0d1c8d2eb6e732d92d7593e7cba6f1
-
C:\Users\Admin\AppData\Local\Temp\8852.exeMD5
4ebe441be9489f7b16fef3f98d2f0a91
SHA1ef70bb8c983cacc72fb4d473d1ed3c3a8c7cf0ef
SHA25675f6edf722224fc3097c1ed8be83d4fabff72cbe4480201c2e4fe01dd4c1a231
SHA5126cfa9388bf8ee996aad9723d9bb8e4c2777725b880380ed5caca5a7ae05aeb5b2da2cc4223465e9dc6f6c9d534d364d96a0d1c8d2eb6e732d92d7593e7cba6f1
-
C:\Users\Admin\AppData\Local\Temp\9FAA.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
C:\Users\Admin\AppData\Local\Temp\9FAA.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
C:\Users\Admin\AppData\Local\Temp\9FAA.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
C:\Users\Admin\AppData\Local\Temp\B675.exeMD5
a93ee3be032ac2a200af6f5673ecc492
SHA1a6fb35b4230ae92ae50a2f3a4e7f0ca7341e9f1c
SHA256f106e2efb90c57289bbe57b3be618c063c1bc70f3eaabd2afa73e53c2168a54d
SHA512d4796fda3e4de570d77ffb5dd9efa8172647832e3e2e491d12578d19b9f8de6b876b349f827050f1aa6f6121cf0a5558e4cd4e4c920a33f2f46732b1ca99e321
-
C:\Users\Admin\AppData\Local\Temp\D5D9.exeMD5
03651bfa0fa57d86e5a612e0cc81bc09
SHA167738024bea02128f0d7a9939e193dc706bcd0d8
SHA25648183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b
SHA512b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4
-
C:\Users\Admin\AppData\Local\Temp\F06B.exeMD5
b0d0e89fde2d4c1c75d96afcf9c045ea
SHA16496236cbf9bf09b9134d839ca2193c505a2ff7d
SHA256029c138b1e48d4016e13e07ce8a336ae4be3a645265c36618afeca3265518a14
SHA512c30dd8bcdcfe32078b4f6ac67f5238d5d8db727de76548a83169d7d750daf7a7ab1f7813fdfdcad8ce61c0ba69f76d1a050cb8a22cac0b7aa6aef501c56a6294
-
\Users\Admin\AppData\Local\Temp\8852.exeMD5
4ebe441be9489f7b16fef3f98d2f0a91
SHA1ef70bb8c983cacc72fb4d473d1ed3c3a8c7cf0ef
SHA25675f6edf722224fc3097c1ed8be83d4fabff72cbe4480201c2e4fe01dd4c1a231
SHA5126cfa9388bf8ee996aad9723d9bb8e4c2777725b880380ed5caca5a7ae05aeb5b2da2cc4223465e9dc6f6c9d534d364d96a0d1c8d2eb6e732d92d7593e7cba6f1
-
\Users\Admin\AppData\Local\Temp\9FAA.exeMD5
5e34695c9f46f1e69ce731d3b7359c88
SHA1e1e5bb43f0c7556bcccc8cb698f854694bdc024a
SHA25697f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc
SHA512659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43
-
memory/360-93-0x00000000004A0000-0x000000000052F000-memory.dmpFilesize
572KB
-
memory/360-91-0x0000000000220000-0x000000000026F000-memory.dmpFilesize
316KB
-
memory/360-92-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/360-88-0x0000000000000000-mapping.dmp
-
memory/792-58-0x0000000000220000-0x0000000000228000-memory.dmpFilesize
32KB
-
memory/792-59-0x0000000000230000-0x0000000000239000-memory.dmpFilesize
36KB
-
memory/872-57-0x00000000760C1000-0x00000000760C3000-memory.dmpFilesize
8KB
-
memory/872-55-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/872-56-0x0000000000402DD8-mapping.dmp
-
memory/1108-61-0x0000000000000000-mapping.dmp
-
memory/1108-69-0x0000000000230000-0x0000000000238000-memory.dmpFilesize
32KB
-
memory/1164-105-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1164-100-0x0000000000000000-mapping.dmp
-
memory/1164-104-0x00000000002E0000-0x0000000000301000-memory.dmpFilesize
132KB
-
memory/1164-103-0x0000000000220000-0x0000000000234000-memory.dmpFilesize
80KB
-
memory/1396-60-0x0000000002610000-0x0000000002626000-memory.dmpFilesize
88KB
-
memory/1396-72-0x0000000002C70000-0x0000000002C86000-memory.dmpFilesize
88KB
-
memory/1396-106-0x0000000004510000-0x0000000004526000-memory.dmpFilesize
88KB
-
memory/1540-66-0x0000000000402DD8-mapping.dmp
-
memory/1608-98-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1608-99-0x0000000000400000-0x0000000001085000-memory.dmpFilesize
12.5MB
-
memory/1608-96-0x000000000119B000-0x00000000011AC000-memory.dmpFilesize
68KB
-
memory/1608-94-0x0000000000000000-mapping.dmp
-
memory/1624-79-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1624-87-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB
-
memory/1624-85-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1624-83-0x0000000000418EEA-mapping.dmp
-
memory/1624-82-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1624-80-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1624-81-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1624-78-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1880-76-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/1880-74-0x0000000001160000-0x0000000001161000-memory.dmpFilesize
4KB
-
memory/1880-70-0x0000000000000000-mapping.dmp