Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
04-12-2021 19:53
Static task
static1
Behavioral task
behavioral1
Sample
4df693f47c93324efa41fccef3b1331c.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
4df693f47c93324efa41fccef3b1331c.exe
Resource
win10-en-20211104
General
-
Target
4df693f47c93324efa41fccef3b1331c.exe
-
Size
235KB
-
MD5
4df693f47c93324efa41fccef3b1331c
-
SHA1
cfccb8f1be7288f9b43150b567ddf4843b4af13b
-
SHA256
2805be73a04fe26bd831204a0e30a9d629ad5567b9b275291354bf3c7e89b010
-
SHA512
1c60ca0ae32737ebe735ac87dbe895b00d88df3797582b03104d704c8233b77ccf858b3241770d0f5e9c969e80286f3b8884436ae747c14bb063aad013504f8f
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
https://cinems.club/search.php
https://clothes.surf/search.php
Extracted
redline
195.133.47.114:38620
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\F741.exe family_redline C:\Users\Admin\AppData\Local\Temp\F741.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
B8B5.exeSmartClock.exeCF26.exeE4AA.exeF741.exeA26.exepid process 956 B8B5.exe 1564 SmartClock.exe 1560 CF26.exe 968 E4AA.exe 1444 F741.exe 1108 A26.exe -
Deletes itself 1 IoCs
Processes:
pid process 1268 -
Drops startup file 1 IoCs
Processes:
B8B5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk B8B5.exe -
Loads dropped DLL 3 IoCs
Processes:
B8B5.exepid process 956 B8B5.exe 956 B8B5.exe 956 B8B5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
A26.exe4df693f47c93324efa41fccef3b1331c.exeCF26.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4df693f47c93324efa41fccef3b1331c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4df693f47c93324efa41fccef3b1331c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CF26.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CF26.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CF26.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4df693f47c93324efa41fccef3b1331c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A26.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A26.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
E4AA.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E4AA.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E4AA.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1944 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 1564 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4df693f47c93324efa41fccef3b1331c.exepid process 1644 4df693f47c93324efa41fccef3b1331c.exe 1644 4df693f47c93324efa41fccef3b1331c.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1268 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
4df693f47c93324efa41fccef3b1331c.exeCF26.exeA26.exepid process 1644 4df693f47c93324efa41fccef3b1331c.exe 1560 CF26.exe 1108 A26.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1268 1268 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1268 1268 1268 1268 -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
B8B5.exeE4AA.execmd.exedescription pid process target process PID 1268 wrote to memory of 956 1268 B8B5.exe PID 1268 wrote to memory of 956 1268 B8B5.exe PID 1268 wrote to memory of 956 1268 B8B5.exe PID 1268 wrote to memory of 956 1268 B8B5.exe PID 956 wrote to memory of 1564 956 B8B5.exe SmartClock.exe PID 956 wrote to memory of 1564 956 B8B5.exe SmartClock.exe PID 956 wrote to memory of 1564 956 B8B5.exe SmartClock.exe PID 956 wrote to memory of 1564 956 B8B5.exe SmartClock.exe PID 1268 wrote to memory of 1560 1268 CF26.exe PID 1268 wrote to memory of 1560 1268 CF26.exe PID 1268 wrote to memory of 1560 1268 CF26.exe PID 1268 wrote to memory of 1560 1268 CF26.exe PID 1268 wrote to memory of 968 1268 E4AA.exe PID 1268 wrote to memory of 968 1268 E4AA.exe PID 1268 wrote to memory of 968 1268 E4AA.exe PID 1268 wrote to memory of 968 1268 E4AA.exe PID 968 wrote to memory of 1200 968 E4AA.exe cmd.exe PID 968 wrote to memory of 1200 968 E4AA.exe cmd.exe PID 968 wrote to memory of 1200 968 E4AA.exe cmd.exe PID 968 wrote to memory of 1200 968 E4AA.exe cmd.exe PID 1200 wrote to memory of 1944 1200 cmd.exe timeout.exe PID 1200 wrote to memory of 1944 1200 cmd.exe timeout.exe PID 1200 wrote to memory of 1944 1200 cmd.exe timeout.exe PID 1200 wrote to memory of 1944 1200 cmd.exe timeout.exe PID 1268 wrote to memory of 1444 1268 F741.exe PID 1268 wrote to memory of 1444 1268 F741.exe PID 1268 wrote to memory of 1444 1268 F741.exe PID 1268 wrote to memory of 1444 1268 F741.exe PID 1268 wrote to memory of 1108 1268 A26.exe PID 1268 wrote to memory of 1108 1268 A26.exe PID 1268 wrote to memory of 1108 1268 A26.exe PID 1268 wrote to memory of 1108 1268 A26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df693f47c93324efa41fccef3b1331c.exe"C:\Users\Admin\AppData\Local\Temp\4df693f47c93324efa41fccef3b1331c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1644
-
C:\Users\Admin\AppData\Local\Temp\B8B5.exeC:\Users\Admin\AppData\Local\Temp\B8B5.exe1⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1564
-
C:\Users\Admin\AppData\Local\Temp\CF26.exeC:\Users\Admin\AppData\Local\Temp\CF26.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1560
-
C:\Users\Admin\AppData\Local\Temp\E4AA.exeC:\Users\Admin\AppData\Local\Temp\E4AA.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\TxXuxXVjb & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\E4AA.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1944
-
C:\Users\Admin\AppData\Local\Temp\F741.exeC:\Users\Admin\AppData\Local\Temp\F741.exe1⤵
- Executes dropped EXE
PID:1444
-
C:\Users\Admin\AppData\Local\Temp\A26.exeC:\Users\Admin\AppData\Local\Temp\A26.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
16d22182243b7bfb6aed30564f165cc8
SHA13e8fc329c2630d766ecef3f13ed262abc472c398
SHA256242b150767fa1ffb485724c00ffbda83da6bc23fde3fa70c1707012bacabcad0
SHA512b382020f49e7281f6b46ade125380bfdd51c105a2f3e89cfc6d35f2cebad9e43371a60146db9ba2cdb13d5e03b906d0eac1716c5541e548d2febc0bfd485ebe6
-
MD5
2635c82bba4900d6d0be58cd86bc0f70
SHA1dda99874642c0f98f4d78c316866df3f6dd168c8
SHA256641779b05eb13a933cfb9dc902d3749b8786d32967b70af5b6c538af86bb648e
SHA51257d8fa2d74e86c0e125dbdf3b3bfa504a01f460ef60ad586f2d9c51c9c5fb77cda764f847d087fcfb73f60a895105f71d474507d39f1ece310fa035a02dd1028
-
MD5
2635c82bba4900d6d0be58cd86bc0f70
SHA1dda99874642c0f98f4d78c316866df3f6dd168c8
SHA256641779b05eb13a933cfb9dc902d3749b8786d32967b70af5b6c538af86bb648e
SHA51257d8fa2d74e86c0e125dbdf3b3bfa504a01f460ef60ad586f2d9c51c9c5fb77cda764f847d087fcfb73f60a895105f71d474507d39f1ece310fa035a02dd1028
-
MD5
2453e3cc777b0f656aa7bb22de048bdd
SHA1a5c0e45bc6848e9c4964188c481a89c594888050
SHA25660f461ff378333dbb6aef95ff06819b8749944145a39251e346cc8256d1298dc
SHA5120b0282100497e213d55c86d50f57cd76e3f21e5f03f6e72755093a53b676a153c21c718c196e263008c2ea5585f8abb511d0d51e1411d656b32c78382a3a2581
-
MD5
c9037b99b13417a8a34411b7608e4aaf
SHA10890369ddf491d973f87abdd46c2f1e141d114f8
SHA2564c1b46aa78b90a5bd0f8037f605781501e70679c931f4fee380f902c1871a7a7
SHA512c34b5f51525b0ae7d32263de003a062a4584bcc14ae612fc16989ea685643306494490e2418a6817b0eb51f14346562fe993a31ec9bf646234357c8b790ef842
-
MD5
c9037b99b13417a8a34411b7608e4aaf
SHA10890369ddf491d973f87abdd46c2f1e141d114f8
SHA2564c1b46aa78b90a5bd0f8037f605781501e70679c931f4fee380f902c1871a7a7
SHA512c34b5f51525b0ae7d32263de003a062a4584bcc14ae612fc16989ea685643306494490e2418a6817b0eb51f14346562fe993a31ec9bf646234357c8b790ef842
-
MD5
6414f73b9269a3b807c9ffa1e1676b3f
SHA1e12253387ef96d3074446fa0d418f6ab275959db
SHA256a14bfe10ddfd585755193ad5eba5c9fdcbd100daa53cdf16f6d4e83765aeec08
SHA51205ad43cb9481a7e4a0376933a7f13cab933940687e2321d51d6a0b18d6f1367bf78ef93927e52e271a32dbec85f311d986b002d937c0fdb68dec2c73ea8c031d
-
MD5
6414f73b9269a3b807c9ffa1e1676b3f
SHA1e12253387ef96d3074446fa0d418f6ab275959db
SHA256a14bfe10ddfd585755193ad5eba5c9fdcbd100daa53cdf16f6d4e83765aeec08
SHA51205ad43cb9481a7e4a0376933a7f13cab933940687e2321d51d6a0b18d6f1367bf78ef93927e52e271a32dbec85f311d986b002d937c0fdb68dec2c73ea8c031d
-
MD5
1b6649e2d4c83c1e6aa5f196e81ad3f8
SHA120ee7c48453385d004d6970bf1ebd42051586cf7
SHA256529cb1aa074cdcbd8ba6c82363db3c7d5916ee3ee0f420eea809073d50436563
SHA512529724680dd6873fa583c42032f7bace37618aa4eaeddd0e74111f064f163062ec412008d2ca5b073cda0930e942fe2c8322c8820692797abcbc6ba98d0ed2f5
-
MD5
2635c82bba4900d6d0be58cd86bc0f70
SHA1dda99874642c0f98f4d78c316866df3f6dd168c8
SHA256641779b05eb13a933cfb9dc902d3749b8786d32967b70af5b6c538af86bb648e
SHA51257d8fa2d74e86c0e125dbdf3b3bfa504a01f460ef60ad586f2d9c51c9c5fb77cda764f847d087fcfb73f60a895105f71d474507d39f1ece310fa035a02dd1028
-
MD5
2635c82bba4900d6d0be58cd86bc0f70
SHA1dda99874642c0f98f4d78c316866df3f6dd168c8
SHA256641779b05eb13a933cfb9dc902d3749b8786d32967b70af5b6c538af86bb648e
SHA51257d8fa2d74e86c0e125dbdf3b3bfa504a01f460ef60ad586f2d9c51c9c5fb77cda764f847d087fcfb73f60a895105f71d474507d39f1ece310fa035a02dd1028
-
MD5
2635c82bba4900d6d0be58cd86bc0f70
SHA1dda99874642c0f98f4d78c316866df3f6dd168c8
SHA256641779b05eb13a933cfb9dc902d3749b8786d32967b70af5b6c538af86bb648e
SHA51257d8fa2d74e86c0e125dbdf3b3bfa504a01f460ef60ad586f2d9c51c9c5fb77cda764f847d087fcfb73f60a895105f71d474507d39f1ece310fa035a02dd1028
-
MD5
2635c82bba4900d6d0be58cd86bc0f70
SHA1dda99874642c0f98f4d78c316866df3f6dd168c8
SHA256641779b05eb13a933cfb9dc902d3749b8786d32967b70af5b6c538af86bb648e
SHA51257d8fa2d74e86c0e125dbdf3b3bfa504a01f460ef60ad586f2d9c51c9c5fb77cda764f847d087fcfb73f60a895105f71d474507d39f1ece310fa035a02dd1028