Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
07-12-2021 02:21
Static task
static1
Behavioral task
behavioral1
Sample
bd0d9c788a9399ede42b878cc0e1583e.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
bd0d9c788a9399ede42b878cc0e1583e.exe
Resource
win10-en-20211014
General
-
Target
bd0d9c788a9399ede42b878cc0e1583e.exe
-
Size
319KB
-
MD5
bd0d9c788a9399ede42b878cc0e1583e
-
SHA1
ee78dbd9602863e63f4257f61bf46ab4ccd110fe
-
SHA256
18043164cd4ac2d77236cfb68b40ff466c6745d0d7647077ad8b161d84523995
-
SHA512
76b561c36cae5baa7e9fe5b456897707f7b21de73688ea03730ea61888de7e16c1a1b04f90e11a372ff15a68963322db49131ea80e31bf033ccb23f2beabd056
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
raccoon
1.8.3-hotfix
f797145799b7b1b77b35d81de942eee0908da519
-
url4cnc
http://91.219.236.27/capibar
http://94.158.245.167/capibar
http://185.163.204.216/capibar
http://185.225.19.238/capibar
http://185.163.204.218/capibar
https://t.me/capibar
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1880-75-0x0000000000060000-0x00000000000E3000-memory.dmp family_redline behavioral1/memory/964-109-0x0000000000350000-0x0000000000511000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
C938.exeCDDB.exeD6E1.exeC938.exe35F.exepid process 976 C938.exe 1660 CDDB.exe 1880 D6E1.exe 1572 C938.exe 964 35F.exe -
Deletes itself 1 IoCs
Processes:
pid process 1220 -
Loads dropped DLL 2 IoCs
Processes:
C938.exeregsvr32.exepid process 976 C938.exe 1792 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
D6E1.exe35F.exepid process 1880 D6E1.exe 964 35F.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bd0d9c788a9399ede42b878cc0e1583e.exeC938.exedescription pid process target process PID 320 set thread context of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 976 set thread context of 1572 976 C938.exe C938.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bd0d9c788a9399ede42b878cc0e1583e.exeC938.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd0d9c788a9399ede42b878cc0e1583e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd0d9c788a9399ede42b878cc0e1583e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd0d9c788a9399ede42b878cc0e1583e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C938.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C938.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C938.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bd0d9c788a9399ede42b878cc0e1583e.exepid process 1100 bd0d9c788a9399ede42b878cc0e1583e.exe 1100 bd0d9c788a9399ede42b878cc0e1583e.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1220 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
bd0d9c788a9399ede42b878cc0e1583e.exeC938.exepid process 1100 bd0d9c788a9399ede42b878cc0e1583e.exe 1572 C938.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
D6E1.exedescription pid process Token: SeDebugPrivilege 1880 D6E1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1220 1220 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1220 1220 -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
bd0d9c788a9399ede42b878cc0e1583e.exeC938.exedescription pid process target process PID 320 wrote to memory of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 320 wrote to memory of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 320 wrote to memory of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 320 wrote to memory of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 320 wrote to memory of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 320 wrote to memory of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 320 wrote to memory of 1100 320 bd0d9c788a9399ede42b878cc0e1583e.exe bd0d9c788a9399ede42b878cc0e1583e.exe PID 1220 wrote to memory of 976 1220 C938.exe PID 1220 wrote to memory of 976 1220 C938.exe PID 1220 wrote to memory of 976 1220 C938.exe PID 1220 wrote to memory of 976 1220 C938.exe PID 1220 wrote to memory of 1660 1220 CDDB.exe PID 1220 wrote to memory of 1660 1220 CDDB.exe PID 1220 wrote to memory of 1660 1220 CDDB.exe PID 1220 wrote to memory of 1660 1220 CDDB.exe PID 1220 wrote to memory of 1880 1220 D6E1.exe PID 1220 wrote to memory of 1880 1220 D6E1.exe PID 1220 wrote to memory of 1880 1220 D6E1.exe PID 1220 wrote to memory of 1880 1220 D6E1.exe PID 1220 wrote to memory of 1880 1220 D6E1.exe PID 1220 wrote to memory of 1880 1220 D6E1.exe PID 1220 wrote to memory of 1880 1220 D6E1.exe PID 976 wrote to memory of 1572 976 C938.exe C938.exe PID 976 wrote to memory of 1572 976 C938.exe C938.exe PID 976 wrote to memory of 1572 976 C938.exe C938.exe PID 976 wrote to memory of 1572 976 C938.exe C938.exe PID 976 wrote to memory of 1572 976 C938.exe C938.exe PID 976 wrote to memory of 1572 976 C938.exe C938.exe PID 976 wrote to memory of 1572 976 C938.exe C938.exe PID 1220 wrote to memory of 1792 1220 regsvr32.exe PID 1220 wrote to memory of 1792 1220 regsvr32.exe PID 1220 wrote to memory of 1792 1220 regsvr32.exe PID 1220 wrote to memory of 1792 1220 regsvr32.exe PID 1220 wrote to memory of 1792 1220 regsvr32.exe PID 1220 wrote to memory of 964 1220 35F.exe PID 1220 wrote to memory of 964 1220 35F.exe PID 1220 wrote to memory of 964 1220 35F.exe PID 1220 wrote to memory of 964 1220 35F.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd0d9c788a9399ede42b878cc0e1583e.exe"C:\Users\Admin\AppData\Local\Temp\bd0d9c788a9399ede42b878cc0e1583e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bd0d9c788a9399ede42b878cc0e1583e.exe"C:\Users\Admin\AppData\Local\Temp\bd0d9c788a9399ede42b878cc0e1583e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\C938.exeC:\Users\Admin\AppData\Local\Temp\C938.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\C938.exeC:\Users\Admin\AppData\Local\Temp\C938.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\CDDB.exeC:\Users\Admin\AppData\Local\Temp\CDDB.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\D6E1.exeC:\Users\Admin\AppData\Local\Temp\D6E1.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\F569.dll1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\35F.exeC:\Users\Admin\AppData\Local\Temp\35F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\35F.exeMD5
de3bd8182e64745b40d259a79772b282
SHA1faecc3a01b05ed96003069f61343836c561b1103
SHA256128e62e08fd48d591f2745f7584a88750b24a7d0dafbd4f8b39ae6ad21072c43
SHA512cbde7b7cd198e63851030bf408971ef3b4b16e2222a79b3b0b5967a659167894dc4888ec4b259283e3c76c50ed1489283ecf28d4eab7095011fbe4a26a5aad13
-
C:\Users\Admin\AppData\Local\Temp\35F.exeMD5
de3bd8182e64745b40d259a79772b282
SHA1faecc3a01b05ed96003069f61343836c561b1103
SHA256128e62e08fd48d591f2745f7584a88750b24a7d0dafbd4f8b39ae6ad21072c43
SHA512cbde7b7cd198e63851030bf408971ef3b4b16e2222a79b3b0b5967a659167894dc4888ec4b259283e3c76c50ed1489283ecf28d4eab7095011fbe4a26a5aad13
-
C:\Users\Admin\AppData\Local\Temp\C938.exeMD5
53bd1244d2c85a2d90856079911eee24
SHA148bb7a1466cae478076e2b64f5761a0ea0bf61af
SHA256dc189a482f8fd5ddd6e8aa505e7911bc6b368bb9ff97de0b05713a97489809d8
SHA51226453d8edfc0d221c9a944b1f8ccd61a8be1b68e540c0ff8550c58ad1b3a5c30a4d130abe8300e98d6683d7c656fb4a995767a232bca83e2c73bdb7d7e82849e
-
C:\Users\Admin\AppData\Local\Temp\C938.exeMD5
53bd1244d2c85a2d90856079911eee24
SHA148bb7a1466cae478076e2b64f5761a0ea0bf61af
SHA256dc189a482f8fd5ddd6e8aa505e7911bc6b368bb9ff97de0b05713a97489809d8
SHA51226453d8edfc0d221c9a944b1f8ccd61a8be1b68e540c0ff8550c58ad1b3a5c30a4d130abe8300e98d6683d7c656fb4a995767a232bca83e2c73bdb7d7e82849e
-
C:\Users\Admin\AppData\Local\Temp\C938.exeMD5
53bd1244d2c85a2d90856079911eee24
SHA148bb7a1466cae478076e2b64f5761a0ea0bf61af
SHA256dc189a482f8fd5ddd6e8aa505e7911bc6b368bb9ff97de0b05713a97489809d8
SHA51226453d8edfc0d221c9a944b1f8ccd61a8be1b68e540c0ff8550c58ad1b3a5c30a4d130abe8300e98d6683d7c656fb4a995767a232bca83e2c73bdb7d7e82849e
-
C:\Users\Admin\AppData\Local\Temp\CDDB.exeMD5
bce50d5b17bb88f22f0000511026520d
SHA1599aaed4ee72ec0e0fc4cada844a1c210e332961
SHA25677e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455
SHA512c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536
-
C:\Users\Admin\AppData\Local\Temp\D6E1.exeMD5
8d3dcfb2adbb29ccdf6f6e15958c8c14
SHA1659efa9597bbc44d66d1f56859fff637973b3845
SHA256c8ee4f813016ec8b590b4e588817c16fa7e8cea9a1b0365254254a5b01d898f6
SHA5124da46b66f372575b8df9d36264fb22bb596f8eb80e797f0b9696540e3d5fefca3702c672eb19ca6eb380c633b1b9e6707b3dbbce60f07e1659b0bf7782851022
-
C:\Users\Admin\AppData\Local\Temp\D6E1.exeMD5
8d3dcfb2adbb29ccdf6f6e15958c8c14
SHA1659efa9597bbc44d66d1f56859fff637973b3845
SHA256c8ee4f813016ec8b590b4e588817c16fa7e8cea9a1b0365254254a5b01d898f6
SHA5124da46b66f372575b8df9d36264fb22bb596f8eb80e797f0b9696540e3d5fefca3702c672eb19ca6eb380c633b1b9e6707b3dbbce60f07e1659b0bf7782851022
-
C:\Users\Admin\AppData\Local\Temp\F569.dllMD5
c2326f5c2286b6272f7acde3e2d2915b
SHA10f283ca3c4041e3f915af729371405bec94c50b8
SHA256714616fe3515adc2c2b44781aed900a9e8e37cc4e7239be92f1ca668f40945bd
SHA512ac4592dcda03337016b25a3723d094c2dcff1477d2fea67140bec329af89d4760a602dd1e35e951856d9698655ffcc3fe87ea6680e77fe70c82d4583956f63ac
-
\Users\Admin\AppData\Local\Temp\C938.exeMD5
53bd1244d2c85a2d90856079911eee24
SHA148bb7a1466cae478076e2b64f5761a0ea0bf61af
SHA256dc189a482f8fd5ddd6e8aa505e7911bc6b368bb9ff97de0b05713a97489809d8
SHA51226453d8edfc0d221c9a944b1f8ccd61a8be1b68e540c0ff8550c58ad1b3a5c30a4d130abe8300e98d6683d7c656fb4a995767a232bca83e2c73bdb7d7e82849e
-
\Users\Admin\AppData\Local\Temp\F569.dllMD5
c2326f5c2286b6272f7acde3e2d2915b
SHA10f283ca3c4041e3f915af729371405bec94c50b8
SHA256714616fe3515adc2c2b44781aed900a9e8e37cc4e7239be92f1ca668f40945bd
SHA512ac4592dcda03337016b25a3723d094c2dcff1477d2fea67140bec329af89d4760a602dd1e35e951856d9698655ffcc3fe87ea6680e77fe70c82d4583956f63ac
-
memory/320-59-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/320-55-0x0000000000568000-0x0000000000579000-memory.dmpFilesize
68KB
-
memory/964-110-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/964-104-0x0000000000000000-mapping.dmp
-
memory/964-112-0x0000000076330000-0x00000000763DC000-memory.dmpFilesize
688KB
-
memory/964-125-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/964-124-0x00000000001B0000-0x00000000001F5000-memory.dmpFilesize
276KB
-
memory/964-123-0x00000000765B0000-0x00000000765E5000-memory.dmpFilesize
212KB
-
memory/964-122-0x0000000074B80000-0x0000000074B97000-memory.dmpFilesize
92KB
-
memory/964-114-0x0000000075AA0000-0x0000000075AF7000-memory.dmpFilesize
348KB
-
memory/964-116-0x0000000075B10000-0x0000000075C6C000-memory.dmpFilesize
1.4MB
-
memory/964-109-0x0000000000350000-0x0000000000511000-memory.dmpFilesize
1.8MB
-
memory/964-113-0x0000000076440000-0x0000000076487000-memory.dmpFilesize
284KB
-
memory/964-108-0x00000000745E0000-0x000000007462A000-memory.dmpFilesize
296KB
-
memory/964-121-0x0000000074E50000-0x0000000075A9A000-memory.dmpFilesize
12.3MB
-
memory/964-119-0x0000000074D10000-0x0000000074D9F000-memory.dmpFilesize
572KB
-
memory/964-120-0x0000000073CF0000-0x0000000073D70000-memory.dmpFilesize
512KB
-
memory/964-117-0x0000000000350000-0x0000000000351000-memory.dmpFilesize
4KB
-
memory/976-77-0x0000000000578000-0x0000000000589000-memory.dmpFilesize
68KB
-
memory/976-61-0x0000000000000000-mapping.dmp
-
memory/1100-57-0x0000000000402F47-mapping.dmp
-
memory/1100-56-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1100-58-0x0000000074E51000-0x0000000074E53000-memory.dmpFilesize
8KB
-
memory/1220-60-0x0000000002120000-0x0000000002136000-memory.dmpFilesize
88KB
-
memory/1220-98-0x0000000003A40000-0x0000000003A56000-memory.dmpFilesize
88KB
-
memory/1572-83-0x0000000000402F47-mapping.dmp
-
memory/1660-63-0x0000000000000000-mapping.dmp
-
memory/1660-65-0x000000000028B000-0x00000000002DA000-memory.dmpFilesize
316KB
-
memory/1660-67-0x0000000001C80000-0x0000000001D0F000-memory.dmpFilesize
572KB
-
memory/1660-68-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1792-99-0x0000000000000000-mapping.dmp
-
memory/1792-100-0x000007FEFB931000-0x000007FEFB933000-memory.dmpFilesize
8KB
-
memory/1880-69-0x0000000000000000-mapping.dmp
-
memory/1880-103-0x0000000074710000-0x00000000748A0000-memory.dmpFilesize
1.6MB
-
memory/1880-96-0x00000000765B0000-0x00000000765E5000-memory.dmpFilesize
212KB
-
memory/1880-97-0x0000000002600000-0x0000000002601000-memory.dmpFilesize
4KB
-
memory/1880-95-0x0000000074B80000-0x0000000074B97000-memory.dmpFilesize
92KB
-
memory/1880-94-0x0000000074E50000-0x0000000075A9A000-memory.dmpFilesize
12.3MB
-
memory/1880-93-0x0000000073CF0000-0x0000000073D70000-memory.dmpFilesize
512KB
-
memory/1880-92-0x0000000074D10000-0x0000000074D9F000-memory.dmpFilesize
572KB
-
memory/1880-90-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/1880-89-0x0000000075B10000-0x0000000075C6C000-memory.dmpFilesize
1.4MB
-
memory/1880-87-0x0000000075AA0000-0x0000000075AF7000-memory.dmpFilesize
348KB
-
memory/1880-86-0x0000000076440000-0x0000000076487000-memory.dmpFilesize
284KB
-
memory/1880-82-0x0000000076330000-0x00000000763DC000-memory.dmpFilesize
688KB
-
memory/1880-76-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/1880-75-0x0000000000060000-0x00000000000E3000-memory.dmpFilesize
524KB
-
memory/1880-74-0x0000000000350000-0x0000000000395000-memory.dmpFilesize
276KB
-
memory/1880-73-0x00000000745E0000-0x000000007462A000-memory.dmpFilesize
296KB
-
memory/1880-126-0x0000000074C60000-0x0000000074C77000-memory.dmpFilesize
92KB