Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    21-11-2021 15:54

General

  • Target

    f071a9a50163c04aa45daae82b852f72.exe

  • Size

    338KB

  • MD5

    f071a9a50163c04aa45daae82b852f72

  • SHA1

    0aefaad339329762ac863043993a52f2aa10b60b

  • SHA256

    09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

  • SHA512

    00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Extracted

Family

redline

C2

185.159.80.90:38637

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe
    "C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe
      "C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:472
  • C:\Users\Admin\AppData\Local\Temp\BF3A.exe
    C:\Users\Admin\AppData\Local\Temp\BF3A.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\BF3A.exe
      C:\Users\Admin\AppData\Local\Temp\BF3A.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1636
  • C:\Users\Admin\AppData\Local\Temp\CE48.exe
    C:\Users\Admin\AppData\Local\Temp\CE48.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ckuybxct\
      2⤵
        PID:1704
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\inxnbg.exe" C:\Windows\SysWOW64\ckuybxct\
        2⤵
          PID:364
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create ckuybxct binPath= "C:\Windows\SysWOW64\ckuybxct\inxnbg.exe /d\"C:\Users\Admin\AppData\Local\Temp\CE48.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:1944
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description ckuybxct "wifi internet conection"
            2⤵
              PID:1960
          • C:\Users\Admin\AppData\Local\Temp\DC6C.exe
            C:\Users\Admin\AppData\Local\Temp\DC6C.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Users\Admin\AppData\Local\Temp\DC6C.exe
              C:\Users\Admin\AppData\Local\Temp\DC6C.exe
              2⤵
              • Executes dropped EXE
              PID:884
            • C:\Users\Admin\AppData\Local\Temp\DC6C.exe
              C:\Users\Admin\AppData\Local\Temp\DC6C.exe
              2⤵
              • Executes dropped EXE
              PID:1200
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {AC825901-CBA2-4FAC-B408-31477A0C2B2C} S-1-5-21-2955169046-2371869340-1800780948-1000:UKNHJUQT\Admin:Interactive:[1]
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:944
            • C:\Users\Admin\AppData\Roaming\fcubrjv
              C:\Users\Admin\AppData\Roaming\fcubrjv
              2⤵
              • Executes dropped EXE
              PID:1912
              • C:\Users\Admin\AppData\Roaming\fcubrjv
                C:\Users\Admin\AppData\Roaming\fcubrjv
                3⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: MapViewOfSection
                PID:960

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          New Service

          1
          T1050

          Privilege Escalation

          New Service

          1
          T1050

          Discovery

          System Information Discovery

          2
          T1082

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\BF3A.exe
            MD5

            b595f73148a774b00160998be099258b

            SHA1

            13182fcebcf31316b1d2021663aa0b2ccc3a2c82

            SHA256

            1044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4

            SHA512

            8b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4

          • C:\Users\Admin\AppData\Local\Temp\BF3A.exe
            MD5

            b595f73148a774b00160998be099258b

            SHA1

            13182fcebcf31316b1d2021663aa0b2ccc3a2c82

            SHA256

            1044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4

            SHA512

            8b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4

          • C:\Users\Admin\AppData\Local\Temp\BF3A.exe
            MD5

            b595f73148a774b00160998be099258b

            SHA1

            13182fcebcf31316b1d2021663aa0b2ccc3a2c82

            SHA256

            1044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4

            SHA512

            8b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4

          • C:\Users\Admin\AppData\Local\Temp\CE48.exe
            MD5

            64765141b86d4bce1470e9b8b9de492d

            SHA1

            8497035ee193ff0351f8ca6a5b924bf6db8f706d

            SHA256

            e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e

            SHA512

            f8404a22092a659585eafa2f5504e630abe0302713e3ad13848f4809d92c39f284d85eb4db6c9cf9dc660ebe22b397e97b116cc196d698ab2ccdf1836b48507a

          • C:\Users\Admin\AppData\Local\Temp\CE48.exe
            MD5

            64765141b86d4bce1470e9b8b9de492d

            SHA1

            8497035ee193ff0351f8ca6a5b924bf6db8f706d

            SHA256

            e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e

            SHA512

            f8404a22092a659585eafa2f5504e630abe0302713e3ad13848f4809d92c39f284d85eb4db6c9cf9dc660ebe22b397e97b116cc196d698ab2ccdf1836b48507a

          • C:\Users\Admin\AppData\Local\Temp\DC6C.exe
            MD5

            a50ee9aad29943a28a90270c948aa700

            SHA1

            188bfab768eb5d04f6d637838ebdc4e5583febd0

            SHA256

            162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

            SHA512

            556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

          • C:\Users\Admin\AppData\Local\Temp\DC6C.exe
            MD5

            a50ee9aad29943a28a90270c948aa700

            SHA1

            188bfab768eb5d04f6d637838ebdc4e5583febd0

            SHA256

            162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

            SHA512

            556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

          • C:\Users\Admin\AppData\Local\Temp\DC6C.exe
            MD5

            a50ee9aad29943a28a90270c948aa700

            SHA1

            188bfab768eb5d04f6d637838ebdc4e5583febd0

            SHA256

            162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

            SHA512

            556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

          • C:\Users\Admin\AppData\Local\Temp\DC6C.exe
            MD5

            a50ee9aad29943a28a90270c948aa700

            SHA1

            188bfab768eb5d04f6d637838ebdc4e5583febd0

            SHA256

            162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

            SHA512

            556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

          • C:\Users\Admin\AppData\Local\Temp\inxnbg.exe
            MD5

            906cd68dac748cfdf0b2ee426572898f

            SHA1

            86913c6390ae3826d708c8dbd82658369ae2b281

            SHA256

            a4774d262ae145887ad7700aee8cd454ee306c120c99a12fdd7e4a8e78a743c1

            SHA512

            76299dcf3fb4f7494acb5d3c230939c46c748c4a41419ef6f8174afc02c745a3a3769d980868975e7d08f463886a67b5b4a6912d81b492e95d486d6f8f836bd3

          • C:\Users\Admin\AppData\Roaming\fcubrjv
            MD5

            f071a9a50163c04aa45daae82b852f72

            SHA1

            0aefaad339329762ac863043993a52f2aa10b60b

            SHA256

            09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

            SHA512

            00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

          • C:\Users\Admin\AppData\Roaming\fcubrjv
            MD5

            f071a9a50163c04aa45daae82b852f72

            SHA1

            0aefaad339329762ac863043993a52f2aa10b60b

            SHA256

            09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

            SHA512

            00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

          • C:\Users\Admin\AppData\Roaming\fcubrjv
            MD5

            f071a9a50163c04aa45daae82b852f72

            SHA1

            0aefaad339329762ac863043993a52f2aa10b60b

            SHA256

            09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

            SHA512

            00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

          • \Users\Admin\AppData\Local\Temp\BF3A.exe
            MD5

            b595f73148a774b00160998be099258b

            SHA1

            13182fcebcf31316b1d2021663aa0b2ccc3a2c82

            SHA256

            1044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4

            SHA512

            8b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4

          • \Users\Admin\AppData\Local\Temp\DC6C.exe
            MD5

            a50ee9aad29943a28a90270c948aa700

            SHA1

            188bfab768eb5d04f6d637838ebdc4e5583febd0

            SHA256

            162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

            SHA512

            556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

          • \Users\Admin\AppData\Local\Temp\DC6C.exe
            MD5

            a50ee9aad29943a28a90270c948aa700

            SHA1

            188bfab768eb5d04f6d637838ebdc4e5583febd0

            SHA256

            162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

            SHA512

            556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

          • memory/364-83-0x0000000000000000-mapping.dmp
          • memory/472-58-0x0000000075C21000-0x0000000075C23000-memory.dmp
            Filesize

            8KB

          • memory/472-57-0x0000000000402DD8-mapping.dmp
          • memory/472-56-0x0000000000400000-0x0000000000409000-memory.dmp
            Filesize

            36KB

          • memory/804-59-0x0000000000020000-0x0000000000029000-memory.dmp
            Filesize

            36KB

          • memory/804-55-0x0000000002BE8000-0x0000000002BF9000-memory.dmp
            Filesize

            68KB

          • memory/1056-65-0x0000000002C88000-0x0000000002C99000-memory.dmp
            Filesize

            68KB

          • memory/1056-61-0x0000000000000000-mapping.dmp
          • memory/1076-81-0x0000000000400000-0x0000000002B4E000-memory.dmp
            Filesize

            39.3MB

          • memory/1076-80-0x0000000000020000-0x0000000000033000-memory.dmp
            Filesize

            76KB

          • memory/1076-63-0x0000000000000000-mapping.dmp
          • memory/1076-75-0x0000000002FA8000-0x0000000002FB9000-memory.dmp
            Filesize

            68KB

          • memory/1200-104-0x00000000020F0000-0x00000000020F1000-memory.dmp
            Filesize

            4KB

          • memory/1200-97-0x0000000000400000-0x0000000000420000-memory.dmp
            Filesize

            128KB

          • memory/1200-100-0x0000000000418EE6-mapping.dmp
          • memory/1200-99-0x0000000000400000-0x0000000000420000-memory.dmp
            Filesize

            128KB

          • memory/1200-98-0x0000000000400000-0x0000000000420000-memory.dmp
            Filesize

            128KB

          • memory/1200-96-0x0000000000400000-0x0000000000420000-memory.dmp
            Filesize

            128KB

          • memory/1200-95-0x0000000000400000-0x0000000000420000-memory.dmp
            Filesize

            128KB

          • memory/1200-102-0x0000000000400000-0x0000000000420000-memory.dmp
            Filesize

            128KB

          • memory/1272-107-0x0000000004210000-0x0000000004226000-memory.dmp
            Filesize

            88KB

          • memory/1272-86-0x0000000003FF0000-0x0000000004006000-memory.dmp
            Filesize

            88KB

          • memory/1272-60-0x0000000002B40000-0x0000000002B56000-memory.dmp
            Filesize

            88KB

          • memory/1528-72-0x0000000000000000-mapping.dmp
          • memory/1528-84-0x0000000000500000-0x0000000000501000-memory.dmp
            Filesize

            4KB

          • memory/1528-78-0x0000000000BD0000-0x0000000000BD1000-memory.dmp
            Filesize

            4KB

          • memory/1636-69-0x0000000000402DD8-mapping.dmp
          • memory/1704-82-0x0000000000000000-mapping.dmp
          • memory/1912-93-0x0000000000000000-mapping.dmp
          • memory/1944-87-0x0000000000000000-mapping.dmp
          • memory/1960-89-0x0000000000000000-mapping.dmp