Analysis

  • max time kernel
    140s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    07-12-2021 12:54

General

  • Target

    a6e7910146fecdecd20bf89bb1be0f92.exe

  • Size

    321KB

  • MD5

    a6e7910146fecdecd20bf89bb1be0f92

  • SHA1

    81866a8450a9cd58435e59289966a3db40f09f78

  • SHA256

    21837b705147ad533b64db7fcf2170662da3e2f9210d410a75caa83380e9a47f

  • SHA512

    a6c92d3f57176b95c7338ea8160b8d4960725556a40f5e88e9412cf11bba7e6839a67144ee003a9b6b044b573129e51bfc31326a4d9be8a07bcbfec4cf63631b

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6e7910146fecdecd20bf89bb1be0f92.exe
    "C:\Users\Admin\AppData\Local\Temp\a6e7910146fecdecd20bf89bb1be0f92.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1584
  • C:\Users\Admin\AppData\Local\Temp\EDE8.exe
    C:\Users\Admin\AppData\Local\Temp\EDE8.exe
    1⤵
    • Executes dropped EXE
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      PID:1532
  • C:\Users\Admin\AppData\Local\Temp\511.exe
    C:\Users\Admin\AppData\Local\Temp\511.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1484
  • C:\Users\Admin\AppData\Local\Temp\1F84.exe
    C:\Users\Admin\AppData\Local\Temp\1F84.exe
    1⤵
    • Executes dropped EXE
    PID:1444
  • C:\Users\Admin\AppData\Local\Temp\2B38.exe
    C:\Users\Admin\AppData\Local\Temp\2B38.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1908
  • C:\Users\Admin\AppData\Local\Temp\4030.exe
    C:\Users\Admin\AppData\Local\Temp\4030.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1932 -s 116
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:1568
  • C:\Users\Admin\AppData\Local\Temp\50E3.exe
    C:\Users\Admin\AppData\Local\Temp\50E3.exe
    1⤵
      PID:1584

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    2
    T1082

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1F84.exe
      MD5

      3ba1d635fed88d8af279be91b7007bae

      SHA1

      62a1d59c746cdb51e699114f410749384a70cf73

      SHA256

      3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

      SHA512

      83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

    • C:\Users\Admin\AppData\Local\Temp\1F84.exe
      MD5

      3ba1d635fed88d8af279be91b7007bae

      SHA1

      62a1d59c746cdb51e699114f410749384a70cf73

      SHA256

      3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

      SHA512

      83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

    • C:\Users\Admin\AppData\Local\Temp\2B38.exe
      MD5

      f80418f12c03a56ac2e8d8b189c13750

      SHA1

      cd0b728375e4e178b50bca8ad65ce79aede30d37

      SHA256

      cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

      SHA512

      e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

    • C:\Users\Admin\AppData\Local\Temp\2B38.exe
      MD5

      f80418f12c03a56ac2e8d8b189c13750

      SHA1

      cd0b728375e4e178b50bca8ad65ce79aede30d37

      SHA256

      cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

      SHA512

      e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

    • C:\Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • C:\Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • C:\Users\Admin\AppData\Local\Temp\50E3.exe
      MD5

      f80418f12c03a56ac2e8d8b189c13750

      SHA1

      cd0b728375e4e178b50bca8ad65ce79aede30d37

      SHA256

      cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

      SHA512

      e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

    • C:\Users\Admin\AppData\Local\Temp\50E3.exe
      MD5

      f80418f12c03a56ac2e8d8b189c13750

      SHA1

      cd0b728375e4e178b50bca8ad65ce79aede30d37

      SHA256

      cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

      SHA512

      e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

    • C:\Users\Admin\AppData\Local\Temp\511.exe
      MD5

      77ce7ab11225c5e723b7b1be0308e8c0

      SHA1

      709a8df1d49f28cf8c293694bbbbd0f07735829b

      SHA256

      d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

      SHA512

      f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

    • C:\Users\Admin\AppData\Local\Temp\511.exe
      MD5

      77ce7ab11225c5e723b7b1be0308e8c0

      SHA1

      709a8df1d49f28cf8c293694bbbbd0f07735829b

      SHA256

      d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

      SHA512

      f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

    • C:\Users\Admin\AppData\Local\Temp\EDE8.exe
      MD5

      98b52264ed1fea478041b0a318fbc3c6

      SHA1

      c7085124bee6c4b3c76312384fcc598e2fdfc4a0

      SHA256

      15bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c

      SHA512

      6c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6

    • C:\Users\Admin\AppData\Local\Temp\EDE8.exe
      MD5

      98b52264ed1fea478041b0a318fbc3c6

      SHA1

      c7085124bee6c4b3c76312384fcc598e2fdfc4a0

      SHA256

      15bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c

      SHA512

      6c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk
      MD5

      9da8970f5d32129ed8f8d023f46b1ae9

      SHA1

      02ed680329260f9bc60a761e746b5cfa88396591

      SHA256

      522adb34bd7291f7db6c798333e644ab285184fe5e10eb7512279f8fb26e3f96

      SHA512

      31eedc9f13a5e91208b466ec7334377f802fa6a4e87604f2467835a982e95bcda5c44d6c11d2bae04d509b52836f1991e24e2764685a09bba15085db44b7191a

    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      98b52264ed1fea478041b0a318fbc3c6

      SHA1

      c7085124bee6c4b3c76312384fcc598e2fdfc4a0

      SHA256

      15bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c

      SHA512

      6c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6

    • \Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • \Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • \Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • \Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • \Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • \Users\Admin\AppData\Local\Temp\4030.exe
      MD5

      180fc8466647515a888cba4bdacb60db

      SHA1

      a6a5201f997c665603c9fe05a1d08add514337a3

      SHA256

      3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

      SHA512

      4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

    • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      98b52264ed1fea478041b0a318fbc3c6

      SHA1

      c7085124bee6c4b3c76312384fcc598e2fdfc4a0

      SHA256

      15bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c

      SHA512

      6c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6

    • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      98b52264ed1fea478041b0a318fbc3c6

      SHA1

      c7085124bee6c4b3c76312384fcc598e2fdfc4a0

      SHA256

      15bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c

      SHA512

      6c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6

    • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      98b52264ed1fea478041b0a318fbc3c6

      SHA1

      c7085124bee6c4b3c76312384fcc598e2fdfc4a0

      SHA256

      15bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c

      SHA512

      6c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6

    • memory/736-65-0x0000000000310000-0x00000000003A1000-memory.dmp
      Filesize

      580KB

    • memory/736-62-0x0000000000638000-0x00000000006B8000-memory.dmp
      Filesize

      512KB

    • memory/736-60-0x0000000000000000-mapping.dmp
    • memory/736-66-0x0000000000400000-0x0000000000540000-memory.dmp
      Filesize

      1.2MB

    • memory/1352-59-0x0000000001DD0000-0x0000000001DE6000-memory.dmp
      Filesize

      88KB

    • memory/1444-94-0x0000000000000000-mapping.dmp
    • memory/1444-117-0x00000000004E0000-0x00000000004E1000-memory.dmp
      Filesize

      4KB

    • memory/1444-97-0x0000000001100000-0x0000000001101000-memory.dmp
      Filesize

      4KB

    • memory/1484-87-0x0000000000D50000-0x0000000000D51000-memory.dmp
      Filesize

      4KB

    • memory/1484-116-0x0000000002450000-0x0000000002451000-memory.dmp
      Filesize

      4KB

    • memory/1484-92-0x0000000075100000-0x0000000075180000-memory.dmp
      Filesize

      512KB

    • memory/1484-73-0x0000000074F80000-0x0000000074FCA000-memory.dmp
      Filesize

      296KB

    • memory/1484-69-0x0000000000000000-mapping.dmp
    • memory/1484-89-0x0000000076B70000-0x0000000076BFF000-memory.dmp
      Filesize

      572KB

    • memory/1484-82-0x00000000001C0000-0x0000000000205000-memory.dmp
      Filesize

      276KB

    • memory/1484-75-0x0000000000100000-0x0000000000101000-memory.dmp
      Filesize

      4KB

    • memory/1484-74-0x0000000000D50000-0x0000000000DB8000-memory.dmp
      Filesize

      416KB

    • memory/1484-86-0x0000000075AD0000-0x0000000075C2C000-memory.dmp
      Filesize

      1.4MB

    • memory/1484-84-0x0000000076E20000-0x0000000076E77000-memory.dmp
      Filesize

      348KB

    • memory/1484-83-0x0000000076C20000-0x0000000076C67000-memory.dmp
      Filesize

      284KB

    • memory/1484-77-0x0000000075850000-0x00000000758FC000-memory.dmp
      Filesize

      688KB

    • memory/1532-90-0x0000000000628000-0x00000000006A8000-memory.dmp
      Filesize

      512KB

    • memory/1532-80-0x0000000000000000-mapping.dmp
    • memory/1532-93-0x0000000000400000-0x0000000000540000-memory.dmp
      Filesize

      1.2MB

    • memory/1568-126-0x000007FEFC291000-0x000007FEFC293000-memory.dmp
      Filesize

      8KB

    • memory/1568-125-0x0000000000000000-mapping.dmp
    • memory/1568-153-0x0000000001C00000-0x0000000001C01000-memory.dmp
      Filesize

      4KB

    • memory/1584-58-0x0000000000400000-0x00000000004D2000-memory.dmp
      Filesize

      840KB

    • memory/1584-143-0x0000000076E20000-0x0000000076E77000-memory.dmp
      Filesize

      348KB

    • memory/1584-55-0x00000000005D8000-0x00000000005E9000-memory.dmp
      Filesize

      68KB

    • memory/1584-56-0x0000000075D31000-0x0000000075D33000-memory.dmp
      Filesize

      8KB

    • memory/1584-151-0x0000000004B90000-0x0000000004B91000-memory.dmp
      Filesize

      4KB

    • memory/1584-149-0x0000000075100000-0x0000000075180000-memory.dmp
      Filesize

      512KB

    • memory/1584-148-0x0000000076B70000-0x0000000076BFF000-memory.dmp
      Filesize

      572KB

    • memory/1584-146-0x0000000000940000-0x0000000000941000-memory.dmp
      Filesize

      4KB

    • memory/1584-145-0x0000000075AD0000-0x0000000075C2C000-memory.dmp
      Filesize

      1.4MB

    • memory/1584-136-0x0000000074F80000-0x0000000074FCA000-memory.dmp
      Filesize

      296KB

    • memory/1584-141-0x0000000075850000-0x00000000758FC000-memory.dmp
      Filesize

      688KB

    • memory/1584-142-0x0000000076C20000-0x0000000076C67000-memory.dmp
      Filesize

      284KB

    • memory/1584-139-0x0000000000100000-0x0000000000101000-memory.dmp
      Filesize

      4KB

    • memory/1584-138-0x00000000002D0000-0x0000000000315000-memory.dmp
      Filesize

      276KB

    • memory/1584-132-0x0000000000000000-mapping.dmp
    • memory/1584-137-0x0000000000940000-0x00000000009AC000-memory.dmp
      Filesize

      432KB

    • memory/1584-57-0x0000000000020000-0x0000000000029000-memory.dmp
      Filesize

      36KB

    • memory/1908-109-0x0000000076E20000-0x0000000076E77000-memory.dmp
      Filesize

      348KB

    • memory/1908-118-0x0000000000340000-0x0000000000385000-memory.dmp
      Filesize

      276KB

    • memory/1908-103-0x0000000074F80000-0x0000000074FCA000-memory.dmp
      Filesize

      296KB

    • memory/1908-104-0x0000000000AE0000-0x0000000000B4C000-memory.dmp
      Filesize

      432KB

    • memory/1908-105-0x0000000000140000-0x0000000000141000-memory.dmp
      Filesize

      4KB

    • memory/1908-107-0x0000000075850000-0x00000000758FC000-memory.dmp
      Filesize

      688KB

    • memory/1908-108-0x0000000076C20000-0x0000000076C67000-memory.dmp
      Filesize

      284KB

    • memory/1908-99-0x0000000000000000-mapping.dmp
    • memory/1908-111-0x0000000075AD0000-0x0000000075C2C000-memory.dmp
      Filesize

      1.4MB

    • memory/1908-114-0x0000000076B70000-0x0000000076BFF000-memory.dmp
      Filesize

      572KB

    • memory/1908-112-0x0000000000AE0000-0x0000000000AE1000-memory.dmp
      Filesize

      4KB

    • memory/1908-119-0x0000000002920000-0x0000000002921000-memory.dmp
      Filesize

      4KB

    • memory/1908-115-0x0000000075100000-0x0000000075180000-memory.dmp
      Filesize

      512KB

    • memory/1932-123-0x0000000000000000-mapping.dmp