Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    23-11-2021 13:28

General

  • Target

    9ae2b414e30f5c9a34030c6597a90dee.exe

  • Size

    292KB

  • MD5

    9ae2b414e30f5c9a34030c6597a90dee

  • SHA1

    e2a42239c591fb647cec87c464dab831b94c4d3c

  • SHA256

    c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328

  • SHA512

    8d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nalirou70.top/

http://xacokuo80.top/

rc4.i32
rc4.i32

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Extracted

Family

redline

C2

185.159.80.90:38637

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe
    "C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe
      "C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:268
  • C:\Users\Admin\AppData\Local\Temp\A313.exe
    C:\Users\Admin\AppData\Local\Temp\A313.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\A313.exe
      C:\Users\Admin\AppData\Local\Temp\A313.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:732
  • C:\Users\Admin\AppData\Local\Temp\A729.exe
    C:\Users\Admin\AppData\Local\Temp\A729.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bbhfqeny\
      2⤵
        PID:960
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wpdphbdq.exe" C:\Windows\SysWOW64\bbhfqeny\
        2⤵
          PID:1720
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create bbhfqeny binPath= "C:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exe /d\"C:\Users\Admin\AppData\Local\Temp\A729.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:240
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description bbhfqeny "wifi internet conection"
            2⤵
              PID:928
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start bbhfqeny
              2⤵
                PID:2008
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1264
              • C:\Users\Admin\AppData\Local\Temp\B5CA.exe
                C:\Users\Admin\AppData\Local\Temp\B5CA.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1504
                • C:\Users\Admin\AppData\Local\Temp\B5CA.exe
                  C:\Users\Admin\AppData\Local\Temp\B5CA.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1340
              • C:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exe
                C:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exe /d"C:\Users\Admin\AppData\Local\Temp\A729.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:676
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:1300

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              New Service

              1
              T1050

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Privilege Escalation

              New Service

              1
              T1050

              Defense Evasion

              Modify Registry

              1
              T1112

              Credential Access

              Credentials in Files

              1
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              1
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\A313.exe
                MD5

                9ae2b414e30f5c9a34030c6597a90dee

                SHA1

                e2a42239c591fb647cec87c464dab831b94c4d3c

                SHA256

                c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328

                SHA512

                8d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8

              • C:\Users\Admin\AppData\Local\Temp\A313.exe
                MD5

                9ae2b414e30f5c9a34030c6597a90dee

                SHA1

                e2a42239c591fb647cec87c464dab831b94c4d3c

                SHA256

                c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328

                SHA512

                8d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8

              • C:\Users\Admin\AppData\Local\Temp\A313.exe
                MD5

                9ae2b414e30f5c9a34030c6597a90dee

                SHA1

                e2a42239c591fb647cec87c464dab831b94c4d3c

                SHA256

                c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328

                SHA512

                8d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8

              • C:\Users\Admin\AppData\Local\Temp\A729.exe
                MD5

                c041220f9f23150757ec7096e0597572

                SHA1

                3336e3c9faef9a91b21ca5177a8105dfff180094

                SHA256

                e933a08308b3d374d64d0ccecae1247fadf0c80028bea1bd5b33ad0a239f9370

                SHA512

                905d640d42286b896401a57e2786ac51b77074524e562696e7dc22cf60a92c121a2dcd18a638b600344f42c42f2bbec28e5bfe38d483ddf89df20820e3211936

              • C:\Users\Admin\AppData\Local\Temp\A729.exe
                MD5

                c041220f9f23150757ec7096e0597572

                SHA1

                3336e3c9faef9a91b21ca5177a8105dfff180094

                SHA256

                e933a08308b3d374d64d0ccecae1247fadf0c80028bea1bd5b33ad0a239f9370

                SHA512

                905d640d42286b896401a57e2786ac51b77074524e562696e7dc22cf60a92c121a2dcd18a638b600344f42c42f2bbec28e5bfe38d483ddf89df20820e3211936

              • C:\Users\Admin\AppData\Local\Temp\B5CA.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • C:\Users\Admin\AppData\Local\Temp\B5CA.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • C:\Users\Admin\AppData\Local\Temp\B5CA.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • C:\Users\Admin\AppData\Local\Temp\wpdphbdq.exe
                MD5

                4fa55d2636e11b470b85cd55e7093975

                SHA1

                22cd28367b42d5aa1f836323a3182058fb7cd47a

                SHA256

                897c8204db1c6a2a6fd274525001db7996e32d71daa07ab534adefb9fb30a162

                SHA512

                01d72322e543f7ba2074fc042736294b3c0610f950381847110ecb37ff761d7b7efbe5b820058e26f2ccb7ae54d8bd919fb83bc3045d0db4f3ffd21e03cbf744

              • C:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exe
                MD5

                4fa55d2636e11b470b85cd55e7093975

                SHA1

                22cd28367b42d5aa1f836323a3182058fb7cd47a

                SHA256

                897c8204db1c6a2a6fd274525001db7996e32d71daa07ab534adefb9fb30a162

                SHA512

                01d72322e543f7ba2074fc042736294b3c0610f950381847110ecb37ff761d7b7efbe5b820058e26f2ccb7ae54d8bd919fb83bc3045d0db4f3ffd21e03cbf744

              • \Users\Admin\AppData\Local\Temp\A313.exe
                MD5

                9ae2b414e30f5c9a34030c6597a90dee

                SHA1

                e2a42239c591fb647cec87c464dab831b94c4d3c

                SHA256

                c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328

                SHA512

                8d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8

              • \Users\Admin\AppData\Local\Temp\B5CA.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • memory/240-87-0x0000000000000000-mapping.dmp
              • memory/268-58-0x0000000075D61000-0x0000000075D63000-memory.dmp
                Filesize

                8KB

              • memory/268-56-0x0000000000400000-0x0000000000408000-memory.dmp
                Filesize

                32KB

              • memory/268-57-0x0000000000402DC6-mapping.dmp
              • memory/676-110-0x0000000000400000-0x0000000002B41000-memory.dmp
                Filesize

                39.3MB

              • memory/676-104-0x0000000002CFB000-0x0000000002D0C000-memory.dmp
                Filesize

                68KB

              • memory/732-69-0x0000000000402DC6-mapping.dmp
              • memory/928-88-0x0000000000000000-mapping.dmp
              • memory/960-81-0x0000000000000000-mapping.dmp
              • memory/1188-60-0x0000000002AA0000-0x0000000002AB6000-memory.dmp
                Filesize

                88KB

              • memory/1188-99-0x0000000003F60000-0x0000000003F76000-memory.dmp
                Filesize

                88KB

              • memory/1264-100-0x0000000000000000-mapping.dmp
              • memory/1300-107-0x0000000000080000-0x0000000000095000-memory.dmp
                Filesize

                84KB

              • memory/1300-108-0x0000000000089A6B-mapping.dmp
              • memory/1300-106-0x0000000000080000-0x0000000000095000-memory.dmp
                Filesize

                84KB

              • memory/1340-97-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/1340-102-0x0000000004960000-0x0000000004961000-memory.dmp
                Filesize

                4KB

              • memory/1340-89-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/1340-90-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/1340-91-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/1340-92-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/1340-93-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/1340-94-0x0000000000418EE6-mapping.dmp
              • memory/1380-59-0x0000000000230000-0x0000000000239000-memory.dmp
                Filesize

                36KB

              • memory/1380-55-0x0000000002CEB000-0x0000000002CFC000-memory.dmp
                Filesize

                68KB

              • memory/1384-63-0x0000000000000000-mapping.dmp
              • memory/1384-83-0x0000000000220000-0x0000000000233000-memory.dmp
                Filesize

                76KB

              • memory/1384-77-0x0000000002CDB000-0x0000000002CEC000-memory.dmp
                Filesize

                68KB

              • memory/1384-84-0x0000000000400000-0x0000000002B41000-memory.dmp
                Filesize

                39.3MB

              • memory/1504-82-0x0000000001FE0000-0x0000000001FE1000-memory.dmp
                Filesize

                4KB

              • memory/1504-75-0x0000000000A70000-0x0000000000A71000-memory.dmp
                Filesize

                4KB

              • memory/1504-72-0x0000000000000000-mapping.dmp
              • memory/1720-85-0x0000000000000000-mapping.dmp
              • memory/1752-65-0x0000000002C4B000-0x0000000002C5C000-memory.dmp
                Filesize

                68KB

              • memory/1752-61-0x0000000000000000-mapping.dmp
              • memory/2008-96-0x0000000000000000-mapping.dmp