Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    27-11-2021 08:17

General

  • Target

    6f3b838d4c7e9e6e628f88461245d8c8.exe

  • Size

    284KB

  • MD5

    6f3b838d4c7e9e6e628f88461245d8c8

  • SHA1

    87527bae4fae51331a3a7796bbbeb84493e38821

  • SHA256

    10bda8cde03ee5b25fdc120ee28e335de54de0c8afb18aee1dda4b302110d542

  • SHA512

    da26b0fe3224390c7d604209de4fb996aa87c29081b56a920380b073f97fa854e5f1427d8b77dd5a089c567638734a163aa349c699d9f68bf6b3a4f83067dabd

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nalirou70.top/

http://xacokuo80.top/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

C2

185.159.80.90:38655

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Arkei Stealer Payload 2 IoCs
  • Bazar/Team9 Loader payload 1 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f3b838d4c7e9e6e628f88461245d8c8.exe
    "C:\Users\Admin\AppData\Local\Temp\6f3b838d4c7e9e6e628f88461245d8c8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\6f3b838d4c7e9e6e628f88461245d8c8.exe
      "C:\Users\Admin\AppData\Local\Temp\6f3b838d4c7e9e6e628f88461245d8c8.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:680
  • C:\Users\Admin\AppData\Local\Temp\71E5.exe
    C:\Users\Admin\AppData\Local\Temp\71E5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bcuzrla\
      2⤵
        PID:1596
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kzagteyx.exe" C:\Windows\SysWOW64\bcuzrla\
        2⤵
          PID:1940
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create bcuzrla binPath= "C:\Windows\SysWOW64\bcuzrla\kzagteyx.exe /d\"C:\Users\Admin\AppData\Local\Temp\71E5.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:920
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description bcuzrla "wifi internet conection"
            2⤵
              PID:892
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start bcuzrla
              2⤵
                PID:1572
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1576
              • C:\Users\Admin\AppData\Local\Temp\7550.exe
                C:\Users\Admin\AppData\Local\Temp\7550.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1376
                • C:\Users\Admin\AppData\Local\Temp\7550.exe
                  C:\Users\Admin\AppData\Local\Temp\7550.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:656
              • C:\Users\Admin\AppData\Local\Temp\7D2D.exe
                C:\Users\Admin\AppData\Local\Temp\7D2D.exe
                1⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: MapViewOfSection
                PID:1524
              • C:\Windows\SysWOW64\bcuzrla\kzagteyx.exe
                C:\Windows\SysWOW64\bcuzrla\kzagteyx.exe /d"C:\Users\Admin\AppData\Local\Temp\71E5.exe"
                1⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                PID:1164
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cessfuds\
                  2⤵
                    PID:1316
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C move /Y "C:\Windows\TEMP\zfadmvvq.exe" C:\Windows\SysWOW64\cessfuds\
                    2⤵
                      PID:1872
                    • C:\Windows\SysWOW64\sc.exe
                      "C:\Windows\System32\sc.exe" create cessfuds binPath= "C:\Windows\SysWOW64\cessfuds\zfadmvvq.exe /d\"C:\Windows\SysWOW64\bcuzrla\kzagteyx.exe\"" type= own start= auto DisplayName= "wifi support"
                      2⤵
                        PID:608
                      • C:\Windows\SysWOW64\sc.exe
                        "C:\Windows\System32\sc.exe" description cessfuds "wifi internet conection"
                        2⤵
                          PID:1400
                        • C:\Windows\SysWOW64\sc.exe
                          "C:\Windows\System32\sc.exe" start cessfuds
                          2⤵
                            PID:1616
                          • C:\Windows\SysWOW64\netsh.exe
                            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                            2⤵
                            • Modifies data under HKEY_USERS
                            PID:2004
                        • C:\Users\Admin\AppData\Local\Temp\D607.exe
                          C:\Users\Admin\AppData\Local\Temp\D607.exe
                          1⤵
                          • Executes dropped EXE
                          PID:920
                        • C:\Windows\system32\regsvr32.exe
                          regsvr32 /s C:\Users\Admin\AppData\Local\Temp\DC30.dll
                          1⤵
                          • Loads dropped DLL
                          PID:984

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Persistence

                        New Service

                        1
                        T1050

                        Modify Existing Service

                        1
                        T1031

                        Privilege Escalation

                        New Service

                        1
                        T1050

                        Credential Access

                        Credentials in Files

                        1
                        T1081

                        Discovery

                        Query Registry

                        2
                        T1012

                        System Information Discovery

                        2
                        T1082

                        Peripheral Device Discovery

                        1
                        T1120

                        Collection

                        Data from Local System

                        1
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\71E5.exe
                          MD5

                          f2a73c444d09ad6eeb4bb964718bf53e

                          SHA1

                          5778c4491c0f7abba0743399078f67e258ab836d

                          SHA256

                          a209c94dfc0016b92e634d3efba6e997017f60c89f314a8ef5ebeaec77629bc0

                          SHA512

                          35f7fc8192135639fb6b70dce595c18b974081902d1bf83a293deeb6a5b7f9a5169ddee34aef92b8eed0a82bc8c3172ba9673ac9e5e0b77f199f4d892e21a64e

                        • C:\Users\Admin\AppData\Local\Temp\71E5.exe
                          MD5

                          f2a73c444d09ad6eeb4bb964718bf53e

                          SHA1

                          5778c4491c0f7abba0743399078f67e258ab836d

                          SHA256

                          a209c94dfc0016b92e634d3efba6e997017f60c89f314a8ef5ebeaec77629bc0

                          SHA512

                          35f7fc8192135639fb6b70dce595c18b974081902d1bf83a293deeb6a5b7f9a5169ddee34aef92b8eed0a82bc8c3172ba9673ac9e5e0b77f199f4d892e21a64e

                        • C:\Users\Admin\AppData\Local\Temp\7550.exe
                          MD5

                          3c4c5a6892f8a80d51f8569f2890e22d

                          SHA1

                          96b9f631ea21ad54d1028c0d8957582d8c28eb6f

                          SHA256

                          5fddbbc0ae0862882e1232713df378fb43658b7bf71361d91a9474e95dd02040

                          SHA512

                          56cdf3512136485776c0fb7850497f0b6e735fe666b8df97dbabc55cc68f52ca1618c5ec0fceafe565881da699efc614c05365310cbec9122e5349a28296095f

                        • C:\Users\Admin\AppData\Local\Temp\7550.exe
                          MD5

                          3c4c5a6892f8a80d51f8569f2890e22d

                          SHA1

                          96b9f631ea21ad54d1028c0d8957582d8c28eb6f

                          SHA256

                          5fddbbc0ae0862882e1232713df378fb43658b7bf71361d91a9474e95dd02040

                          SHA512

                          56cdf3512136485776c0fb7850497f0b6e735fe666b8df97dbabc55cc68f52ca1618c5ec0fceafe565881da699efc614c05365310cbec9122e5349a28296095f

                        • C:\Users\Admin\AppData\Local\Temp\7550.exe
                          MD5

                          3c4c5a6892f8a80d51f8569f2890e22d

                          SHA1

                          96b9f631ea21ad54d1028c0d8957582d8c28eb6f

                          SHA256

                          5fddbbc0ae0862882e1232713df378fb43658b7bf71361d91a9474e95dd02040

                          SHA512

                          56cdf3512136485776c0fb7850497f0b6e735fe666b8df97dbabc55cc68f52ca1618c5ec0fceafe565881da699efc614c05365310cbec9122e5349a28296095f

                        • C:\Users\Admin\AppData\Local\Temp\7D2D.exe
                          MD5

                          646cc8edbe849bf17c1694d936f7ae6b

                          SHA1

                          68b8e56cd63da79a8ace5c70f22cd0a6b3672497

                          SHA256

                          836e9de6ff5057a4964402ed5a9695e270a7db9e0d8b756a99203befa70fc4b7

                          SHA512

                          92df2e2fcfc8c0c2789222966f09b1c295e2b4d2f5d86a10d513dd05749507792d3df78b5f1d605517bba86cbc48c7ba6c9b54d8aba246a1b2cc0a75f626d9d1

                        • C:\Users\Admin\AppData\Local\Temp\D607.exe
                          MD5

                          826e8b6405bc3909e664250896926135

                          SHA1

                          99daeef85f72112eb3145a6209c3c653fb620036

                          SHA256

                          c9f7bfeb926d16bfb7dcdb0fd8c768eb0cef9ecb1904426005d9a599bd976b8b

                          SHA512

                          5d76b7e85c8f4d088cce62044e597e693cef9a2da3cf3185f0fe714c3a64387cba03847f44ce009696ed04e18be0e90a0733ce772c0804e0e8800ad8f2eda4a2

                        • C:\Users\Admin\AppData\Local\Temp\DC30.dll
                          MD5

                          826ee7fb2a01664b3de92d65e2329d3d

                          SHA1

                          82f146d6542a0b2741c5b750bc6ed1675358c7fe

                          SHA256

                          cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b

                          SHA512

                          1773e703be227df86e60cdd0586f924a41861a14be17ff285bf5bb8a17fa0de4c61d752b9b1d229a3e9023fcfa9d39756c817e9d7e2f1b4d3491a4636d2566ae

                        • C:\Users\Admin\AppData\Local\Temp\kzagteyx.exe
                          MD5

                          ce20ec0583c2d28d8a3232fb24afeeb6

                          SHA1

                          08e99f37e6808516cb88e47ca8f6a6e580649038

                          SHA256

                          130eb65550495d2066ccd3be17dfafda00a9d2b0413e0307179a7b103e8834f6

                          SHA512

                          c9f0ae7f6eda325f240bc20ffb961276b64b005ad26f937217a4328bfde6b5cef36586f2995216dc8f8a4b1dec1b060aa2630bc7d4805cfc7c434e8826381ad8

                        • C:\Windows\SysWOW64\bcuzrla\kzagteyx.exe
                          MD5

                          ce20ec0583c2d28d8a3232fb24afeeb6

                          SHA1

                          08e99f37e6808516cb88e47ca8f6a6e580649038

                          SHA256

                          130eb65550495d2066ccd3be17dfafda00a9d2b0413e0307179a7b103e8834f6

                          SHA512

                          c9f0ae7f6eda325f240bc20ffb961276b64b005ad26f937217a4328bfde6b5cef36586f2995216dc8f8a4b1dec1b060aa2630bc7d4805cfc7c434e8826381ad8

                        • \Users\Admin\AppData\Local\Temp\7550.exe
                          MD5

                          3c4c5a6892f8a80d51f8569f2890e22d

                          SHA1

                          96b9f631ea21ad54d1028c0d8957582d8c28eb6f

                          SHA256

                          5fddbbc0ae0862882e1232713df378fb43658b7bf71361d91a9474e95dd02040

                          SHA512

                          56cdf3512136485776c0fb7850497f0b6e735fe666b8df97dbabc55cc68f52ca1618c5ec0fceafe565881da699efc614c05365310cbec9122e5349a28296095f

                        • \Users\Admin\AppData\Local\Temp\DC30.dll
                          MD5

                          826ee7fb2a01664b3de92d65e2329d3d

                          SHA1

                          82f146d6542a0b2741c5b750bc6ed1675358c7fe

                          SHA256

                          cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b

                          SHA512

                          1773e703be227df86e60cdd0586f924a41861a14be17ff285bf5bb8a17fa0de4c61d752b9b1d229a3e9023fcfa9d39756c817e9d7e2f1b4d3491a4636d2566ae

                        • memory/656-84-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/656-94-0x0000000004AB0000-0x0000000004AB1000-memory.dmp
                          Filesize

                          4KB

                        • memory/656-87-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/656-80-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/656-85-0x0000000000418EEE-mapping.dmp
                        • memory/656-82-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/656-83-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/656-81-0x0000000000400000-0x0000000000420000-memory.dmp
                          Filesize

                          128KB

                        • memory/680-57-0x0000000000402DC6-mapping.dmp
                        • memory/680-58-0x0000000076171000-0x0000000076173000-memory.dmp
                          Filesize

                          8KB

                        • memory/680-56-0x0000000000400000-0x0000000000408000-memory.dmp
                          Filesize

                          32KB

                        • memory/892-95-0x0000000000000000-mapping.dmp
                        • memory/920-93-0x0000000000000000-mapping.dmp
                        • memory/920-111-0x0000000000400000-0x0000000001C01000-memory.dmp
                          Filesize

                          24.0MB

                        • memory/920-110-0x00000000002C0000-0x00000000002E1000-memory.dmp
                          Filesize

                          132KB

                        • memory/920-108-0x0000000001CBB000-0x0000000001CCF000-memory.dmp
                          Filesize

                          80KB

                        • memory/920-102-0x0000000000000000-mapping.dmp
                        • memory/984-112-0x0000000000350000-0x000000000037A000-memory.dmp
                          Filesize

                          168KB

                        • memory/984-105-0x000007FEFC511000-0x000007FEFC513000-memory.dmp
                          Filesize

                          8KB

                        • memory/984-104-0x0000000000000000-mapping.dmp
                        • memory/1152-61-0x0000000000000000-mapping.dmp
                        • memory/1152-90-0x0000000000400000-0x0000000001BFD000-memory.dmp
                          Filesize

                          24.0MB

                        • memory/1152-76-0x000000000026B000-0x000000000027C000-memory.dmp
                          Filesize

                          68KB

                        • memory/1152-89-0x00000000003E0000-0x00000000003F3000-memory.dmp
                          Filesize

                          76KB

                        • memory/1200-60-0x0000000002210000-0x0000000002226000-memory.dmp
                          Filesize

                          88KB

                        • memory/1200-99-0x0000000003E40000-0x0000000003E56000-memory.dmp
                          Filesize

                          88KB

                        • memory/1376-66-0x0000000000DB0000-0x0000000000DB1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1376-63-0x0000000000000000-mapping.dmp
                        • memory/1376-69-0x00000000047F0000-0x00000000047F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1392-55-0x0000000001DDB000-0x0000000001DEC000-memory.dmp
                          Filesize

                          68KB

                        • memory/1392-59-0x0000000000220000-0x0000000000229000-memory.dmp
                          Filesize

                          36KB

                        • memory/1524-70-0x0000000000000000-mapping.dmp
                        • memory/1524-72-0x0000000000220000-0x0000000000229000-memory.dmp
                          Filesize

                          36KB

                        • memory/1524-73-0x0000000000230000-0x0000000000239000-memory.dmp
                          Filesize

                          36KB

                        • memory/1524-75-0x0000000000400000-0x000000000042C000-memory.dmp
                          Filesize

                          176KB

                        • memory/1572-96-0x0000000000000000-mapping.dmp
                        • memory/1576-98-0x0000000000000000-mapping.dmp
                        • memory/1596-79-0x0000000000000000-mapping.dmp
                        • memory/1940-91-0x0000000000000000-mapping.dmp