Analysis

  • max time kernel
    151s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    07-12-2021 00:49

General

  • Target

    9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe

  • Size

    318KB

  • MD5

    cc73917de2123e14ca3be379e9eac3f8

  • SHA1

    2bc2ae34f60cb49b27e304a4054994cd50618e80

  • SHA256

    9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1

  • SHA512

    927e500abeb1fe582f3ea58a04d3415ce75f7e0253f959557dd057996684a98652e900e40eeb1d883267769311e66d86f4010a078e275089655857abb3d26558

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

a265248b3381a96b9544405f000f9ebe9ef2475e

Attributes
  • url4cnc

    http://91.219.236.27/opussenseus1

    http://94.158.245.167/opussenseus1

    http://185.163.204.216/opussenseus1

    http://185.225.19.238/opussenseus1

    http://185.163.204.218/opussenseus1

    https://t.me/opussenseus1

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe
    "C:\Users\Admin\AppData\Local\Temp\9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2368
  • C:\Users\Admin\AppData\Local\Temp\3F37.exe
    C:\Users\Admin\AppData\Local\Temp\3F37.exe
    1⤵
    • Executes dropped EXE
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      PID:4092
  • C:\Users\Admin\AppData\Roaming\cahbvhs
    C:\Users\Admin\AppData\Roaming\cahbvhs
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:4012
  • C:\Users\Admin\AppData\Local\Temp\8579.exe
    C:\Users\Admin\AppData\Local\Temp\8579.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2876
  • C:\Users\Admin\AppData\Local\Temp\A4C9.exe
    C:\Users\Admin\AppData\Local\Temp\A4C9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1056
  • C:\Users\Admin\AppData\Local\Temp\CB3E.exe
    C:\Users\Admin\AppData\Local\Temp\CB3E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2064
  • C:\Users\Admin\AppData\Local\Temp\E5EB.exe
    C:\Users\Admin\AppData\Local\Temp\E5EB.exe
    1⤵
    • Executes dropped EXE
    PID:3644
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3644 -s 420
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3176
  • C:\Users\Admin\AppData\Local\Temp\FB78.exe
    C:\Users\Admin\AppData\Local\Temp\FB78.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2564
  • C:\Users\Admin\AppData\Local\Temp\79E.exe
    C:\Users\Admin\AppData\Local\Temp\79E.exe
    1⤵
    • Executes dropped EXE
    PID:524

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3F37.exe
    MD5

    e00025e17bdaabc16a52e899f4b5ad0b

    SHA1

    5d70684a816229201bea867631d1e488034daa70

    SHA256

    6476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916

    SHA512

    6c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418

  • C:\Users\Admin\AppData\Local\Temp\3F37.exe
    MD5

    e00025e17bdaabc16a52e899f4b5ad0b

    SHA1

    5d70684a816229201bea867631d1e488034daa70

    SHA256

    6476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916

    SHA512

    6c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418

  • C:\Users\Admin\AppData\Local\Temp\79E.exe
    MD5

    80ea247440983b626aa7da73141f3fad

    SHA1

    5b67259dfd67f8fc51d8de9539517d2a284b05b5

    SHA256

    083e464c9c1fc540ec335e03ce67d7d823a0778e71f98e5a72b954ee15a262ba

    SHA512

    7928a83da08291c41a568bdb642bf66aba0d2f6e1a06dd62bda609371214380c69a121220eea8baac96e0fbe2beae9827a50929e47fd022710f67670ee14e720

  • C:\Users\Admin\AppData\Local\Temp\8579.exe
    MD5

    d92f413e5c665884f3b45f4b6bfeb640

    SHA1

    26910c896532597ab32f328e3f6f308d82aa68f5

    SHA256

    0d397ba8d82603972ec469c7f8f99688143597bab496a0686f6fef08b85e0b2e

    SHA512

    5b29a6945fb9d15b19375c74b2fb71c699e87a1882f9a276862471d8d0638e90d98a3034804e403a239f36f8fc3e299fe79c16bd68160a528c9ebe3629a9a773

  • C:\Users\Admin\AppData\Local\Temp\8579.exe
    MD5

    d92f413e5c665884f3b45f4b6bfeb640

    SHA1

    26910c896532597ab32f328e3f6f308d82aa68f5

    SHA256

    0d397ba8d82603972ec469c7f8f99688143597bab496a0686f6fef08b85e0b2e

    SHA512

    5b29a6945fb9d15b19375c74b2fb71c699e87a1882f9a276862471d8d0638e90d98a3034804e403a239f36f8fc3e299fe79c16bd68160a528c9ebe3629a9a773

  • C:\Users\Admin\AppData\Local\Temp\A4C9.exe
    MD5

    af3e72baaff0c1fc986ccd2e99f1c506

    SHA1

    97b7a37335e47b284992b9f32a3ceecc36e89b29

    SHA256

    9da7b4e27292080a1754a51e8087e6c7d0929eadcfc942be2485f57b561c1162

    SHA512

    1cd27bc0ff171e2c1194ff4994fa250d16dec73e9c8a73a3bb68240f81101f504cdc25033ee3fb7f2d2c0dfdd016334e1852e9e98ae188f855960f294c2af094

  • C:\Users\Admin\AppData\Local\Temp\A4C9.exe
    MD5

    af3e72baaff0c1fc986ccd2e99f1c506

    SHA1

    97b7a37335e47b284992b9f32a3ceecc36e89b29

    SHA256

    9da7b4e27292080a1754a51e8087e6c7d0929eadcfc942be2485f57b561c1162

    SHA512

    1cd27bc0ff171e2c1194ff4994fa250d16dec73e9c8a73a3bb68240f81101f504cdc25033ee3fb7f2d2c0dfdd016334e1852e9e98ae188f855960f294c2af094

  • C:\Users\Admin\AppData\Local\Temp\CB3E.exe
    MD5

    a83c3ca2bff1e575b4ce472bd2899ae3

    SHA1

    177af089d606c62a5427a458b8d1cc232ddb952d

    SHA256

    2c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04

    SHA512

    027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324

  • C:\Users\Admin\AppData\Local\Temp\CB3E.exe
    MD5

    a83c3ca2bff1e575b4ce472bd2899ae3

    SHA1

    177af089d606c62a5427a458b8d1cc232ddb952d

    SHA256

    2c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04

    SHA512

    027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324

  • C:\Users\Admin\AppData\Local\Temp\E5EB.exe
    MD5

    180fc8466647515a888cba4bdacb60db

    SHA1

    a6a5201f997c665603c9fe05a1d08add514337a3

    SHA256

    3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

    SHA512

    4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

  • C:\Users\Admin\AppData\Local\Temp\E5EB.exe
    MD5

    180fc8466647515a888cba4bdacb60db

    SHA1

    a6a5201f997c665603c9fe05a1d08add514337a3

    SHA256

    3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

    SHA512

    4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

  • C:\Users\Admin\AppData\Local\Temp\FB78.exe
    MD5

    a83c3ca2bff1e575b4ce472bd2899ae3

    SHA1

    177af089d606c62a5427a458b8d1cc232ddb952d

    SHA256

    2c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04

    SHA512

    027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324

  • C:\Users\Admin\AppData\Local\Temp\FB78.exe
    MD5

    a83c3ca2bff1e575b4ce472bd2899ae3

    SHA1

    177af089d606c62a5427a458b8d1cc232ddb952d

    SHA256

    2c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04

    SHA512

    027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
    MD5

    e00025e17bdaabc16a52e899f4b5ad0b

    SHA1

    5d70684a816229201bea867631d1e488034daa70

    SHA256

    6476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916

    SHA512

    6c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
    MD5

    e00025e17bdaabc16a52e899f4b5ad0b

    SHA1

    5d70684a816229201bea867631d1e488034daa70

    SHA256

    6476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916

    SHA512

    6c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418

  • C:\Users\Admin\AppData\Roaming\cahbvhs
    MD5

    cc73917de2123e14ca3be379e9eac3f8

    SHA1

    2bc2ae34f60cb49b27e304a4054994cd50618e80

    SHA256

    9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1

    SHA512

    927e500abeb1fe582f3ea58a04d3415ce75f7e0253f959557dd057996684a98652e900e40eeb1d883267769311e66d86f4010a078e275089655857abb3d26558

  • C:\Users\Admin\AppData\Roaming\cahbvhs
    MD5

    cc73917de2123e14ca3be379e9eac3f8

    SHA1

    2bc2ae34f60cb49b27e304a4054994cd50618e80

    SHA256

    9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1

    SHA512

    927e500abeb1fe582f3ea58a04d3415ce75f7e0253f959557dd057996684a98652e900e40eeb1d883267769311e66d86f4010a078e275089655857abb3d26558

  • memory/524-234-0x0000000000000000-mapping.dmp
  • memory/524-236-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB

  • memory/524-237-0x0000000002850000-0x00000000028E1000-memory.dmp
    Filesize

    580KB

  • memory/592-132-0x0000000000400000-0x0000000000541000-memory.dmp
    Filesize

    1.3MB

  • memory/592-128-0x0000000000690000-0x00000000007DA000-memory.dmp
    Filesize

    1.3MB

  • memory/592-127-0x0000000000591000-0x0000000000611000-memory.dmp
    Filesize

    512KB

  • memory/592-122-0x0000000000000000-mapping.dmp
  • memory/1056-159-0x0000000000000000-mapping.dmp
  • memory/1056-173-0x00000000052D0000-0x00000000058D6000-memory.dmp
    Filesize

    6.0MB

  • memory/1056-162-0x0000000000A90000-0x0000000000A91000-memory.dmp
    Filesize

    4KB

  • memory/2064-194-0x0000000072050000-0x00000000720D0000-memory.dmp
    Filesize

    512KB

  • memory/2064-199-0x0000000076F10000-0x0000000077494000-memory.dmp
    Filesize

    5.5MB

  • memory/2064-187-0x00000000012B0000-0x0000000001320000-memory.dmp
    Filesize

    448KB

  • memory/2064-188-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB

  • memory/2064-189-0x0000000075460000-0x0000000075622000-memory.dmp
    Filesize

    1.8MB

  • memory/2064-190-0x00000000006C0000-0x0000000000705000-memory.dmp
    Filesize

    276KB

  • memory/2064-191-0x0000000074020000-0x0000000074111000-memory.dmp
    Filesize

    964KB

  • memory/2064-192-0x00000000012B0000-0x00000000012B1000-memory.dmp
    Filesize

    4KB

  • memory/2064-184-0x0000000000000000-mapping.dmp
  • memory/2064-203-0x0000000001010000-0x0000000001011000-memory.dmp
    Filesize

    4KB

  • memory/2064-202-0x00000000702A0000-0x00000000702EB000-memory.dmp
    Filesize

    300KB

  • memory/2064-200-0x00000000758F0000-0x0000000076C38000-memory.dmp
    Filesize

    19.3MB

  • memory/2368-120-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/2368-119-0x0000000000030000-0x0000000000039000-memory.dmp
    Filesize

    36KB

  • memory/2564-214-0x0000000000000000-mapping.dmp
  • memory/2564-217-0x0000000001040000-0x00000000010B0000-memory.dmp
    Filesize

    448KB

  • memory/2564-218-0x00000000007F0000-0x00000000007F1000-memory.dmp
    Filesize

    4KB

  • memory/2564-219-0x0000000075460000-0x0000000075622000-memory.dmp
    Filesize

    1.8MB

  • memory/2564-224-0x0000000002710000-0x0000000002755000-memory.dmp
    Filesize

    276KB

  • memory/2564-233-0x0000000002830000-0x0000000002831000-memory.dmp
    Filesize

    4KB

  • memory/2876-144-0x0000000075460000-0x0000000075622000-memory.dmp
    Filesize

    1.8MB

  • memory/2876-156-0x00000000053A0000-0x00000000053A1000-memory.dmp
    Filesize

    4KB

  • memory/2876-175-0x0000000006E60000-0x0000000006E61000-memory.dmp
    Filesize

    4KB

  • memory/2876-176-0x0000000007560000-0x0000000007561000-memory.dmp
    Filesize

    4KB

  • memory/2876-142-0x00000000011E0000-0x000000000124E000-memory.dmp
    Filesize

    440KB

  • memory/2876-139-0x0000000000000000-mapping.dmp
  • memory/2876-149-0x00000000059C0000-0x00000000059C1000-memory.dmp
    Filesize

    4KB

  • memory/2876-172-0x0000000006790000-0x0000000006791000-memory.dmp
    Filesize

    4KB

  • memory/2876-171-0x00000000061F0000-0x00000000061F1000-memory.dmp
    Filesize

    4KB

  • memory/2876-170-0x00000000060D0000-0x00000000060D1000-memory.dmp
    Filesize

    4KB

  • memory/2876-169-0x0000000005690000-0x0000000005691000-memory.dmp
    Filesize

    4KB

  • memory/2876-143-0x0000000000C70000-0x0000000000C71000-memory.dmp
    Filesize

    4KB

  • memory/2876-148-0x0000000072050000-0x00000000720D0000-memory.dmp
    Filesize

    512KB

  • memory/2876-145-0x0000000074020000-0x0000000074111000-memory.dmp
    Filesize

    964KB

  • memory/2876-146-0x00000000011E0000-0x00000000011E1000-memory.dmp
    Filesize

    4KB

  • memory/2876-158-0x00000000702A0000-0x00000000702EB000-memory.dmp
    Filesize

    300KB

  • memory/2876-157-0x00000000053B0000-0x00000000053B1000-memory.dmp
    Filesize

    4KB

  • memory/2876-174-0x00000000063F0000-0x00000000063F1000-memory.dmp
    Filesize

    4KB

  • memory/2876-150-0x00000000028C0000-0x0000000002905000-memory.dmp
    Filesize

    276KB

  • memory/2876-151-0x00000000052F0000-0x00000000052F1000-memory.dmp
    Filesize

    4KB

  • memory/2876-152-0x00000000054C0000-0x00000000054C1000-memory.dmp
    Filesize

    4KB

  • memory/2876-155-0x00000000758F0000-0x0000000076C38000-memory.dmp
    Filesize

    19.3MB

  • memory/2876-153-0x0000000005350000-0x0000000005351000-memory.dmp
    Filesize

    4KB

  • memory/2876-154-0x0000000076F10000-0x0000000077494000-memory.dmp
    Filesize

    5.5MB

  • memory/3060-121-0x00000000012F0000-0x0000000001306000-memory.dmp
    Filesize

    88KB

  • memory/3060-138-0x0000000001490000-0x00000000014A6000-memory.dmp
    Filesize

    88KB

  • memory/3644-206-0x0000000000000000-mapping.dmp
  • memory/4012-134-0x00000000007E1000-0x00000000007F2000-memory.dmp
    Filesize

    68KB

  • memory/4012-135-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/4092-136-0x0000000000640000-0x000000000078A000-memory.dmp
    Filesize

    1.3MB

  • memory/4092-137-0x0000000000400000-0x0000000000541000-memory.dmp
    Filesize

    1.3MB

  • memory/4092-133-0x0000000000791000-0x0000000000811000-memory.dmp
    Filesize

    512KB

  • memory/4092-129-0x0000000000000000-mapping.dmp