Analysis

  • max time kernel
    152s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    07-12-2021 15:46

General

  • Target

    563ad32fc8957245f24bfc09b3ec6dac3887aab7ac44cb192b42a06b76e8ef1d.exe

  • Size

    319KB

  • MD5

    19254b7469510eb2ff7b3349827c7fd7

  • SHA1

    d5920b56517a9ff40d079680532c9d3312ff9780

  • SHA256

    563ad32fc8957245f24bfc09b3ec6dac3887aab7ac44cb192b42a06b76e8ef1d

  • SHA512

    7185e1a63b0127a58684a066ef7e8c328fff99c8a790dda7d292044602bac7d3766d60e341f52b2731f923329ad2c3fc8de414e5b339fc30ae0b5424f788cc96

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\563ad32fc8957245f24bfc09b3ec6dac3887aab7ac44cb192b42a06b76e8ef1d.exe
    "C:\Users\Admin\AppData\Local\Temp\563ad32fc8957245f24bfc09b3ec6dac3887aab7ac44cb192b42a06b76e8ef1d.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4380
  • C:\Users\Admin\AppData\Local\Temp\4EE7.exe
    C:\Users\Admin\AppData\Local\Temp\4EE7.exe
    1⤵
    • Executes dropped EXE
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      PID:4544
  • C:\Users\Admin\AppData\Local\Temp\85A8.exe
    C:\Users\Admin\AppData\Local\Temp\85A8.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:644
  • C:\Users\Admin\AppData\Local\Temp\9E70.exe
    C:\Users\Admin\AppData\Local\Temp\9E70.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1292
  • C:\Users\Admin\AppData\Local\Temp\C718.exe
    C:\Users\Admin\AppData\Local\Temp\C718.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2820
  • C:\Users\Admin\AppData\Local\Temp\E242.exe
    C:\Users\Admin\AppData\Local\Temp\E242.exe
    1⤵
    • Executes dropped EXE
    PID:5016
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 5016 -s 420
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:5116
  • C:\Users\Admin\AppData\Local\Temp\F2BE.exe
    C:\Users\Admin\AppData\Local\Temp\F2BE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4724
  • C:\Users\Admin\AppData\Local\Temp\1162.exe
    C:\Users\Admin\AppData\Local\Temp\1162.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1844
  • C:\Users\Admin\AppData\Local\Temp\1162.exe
    C:\Users\Admin\AppData\Local\Temp\1162.exe start
    1⤵
    • Executes dropped EXE
    PID:1208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1162.exe

    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\1162.exe

    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\1162.exe

    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\4EE7.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Local\Temp\4EE7.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Local\Temp\85A8.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\85A8.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\9E70.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\9E70.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\C718.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\C718.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\E242.exe

    MD5

    180fc8466647515a888cba4bdacb60db

    SHA1

    a6a5201f997c665603c9fe05a1d08add514337a3

    SHA256

    3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

    SHA512

    4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

  • C:\Users\Admin\AppData\Local\Temp\E242.exe

    MD5

    180fc8466647515a888cba4bdacb60db

    SHA1

    a6a5201f997c665603c9fe05a1d08add514337a3

    SHA256

    3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

    SHA512

    4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

  • C:\Users\Admin\AppData\Local\Temp\F2BE.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\F2BE.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • memory/644-134-0x0000000000E50000-0x0000000000EB8000-memory.dmp

    Filesize

    416KB

  • memory/644-145-0x0000000004CD0000-0x0000000004CD1000-memory.dmp

    Filesize

    4KB

  • memory/644-135-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/644-136-0x0000000000DE0000-0x0000000000E25000-memory.dmp

    Filesize

    276KB

  • memory/644-137-0x0000000076CD0000-0x0000000076E92000-memory.dmp

    Filesize

    1.8MB

  • memory/644-138-0x0000000074DF0000-0x0000000074EE1000-memory.dmp

    Filesize

    964KB

  • memory/644-139-0x0000000000E50000-0x0000000000E51000-memory.dmp

    Filesize

    4KB

  • memory/644-141-0x0000000071F30000-0x0000000071FB0000-memory.dmp

    Filesize

    512KB

  • memory/644-142-0x0000000005370000-0x0000000005371000-memory.dmp

    Filesize

    4KB

  • memory/644-143-0x0000000004C70000-0x0000000004C71000-memory.dmp

    Filesize

    4KB

  • memory/644-144-0x0000000004E70000-0x0000000004E71000-memory.dmp

    Filesize

    4KB

  • memory/644-163-0x0000000005010000-0x0000000005011000-memory.dmp

    Filesize

    4KB

  • memory/644-146-0x0000000004D50000-0x0000000004D51000-memory.dmp

    Filesize

    4KB

  • memory/644-147-0x0000000074EF0000-0x0000000075474000-memory.dmp

    Filesize

    5.5MB

  • memory/644-148-0x0000000075830000-0x0000000076B78000-memory.dmp

    Filesize

    19.3MB

  • memory/644-149-0x0000000004D60000-0x0000000004D61000-memory.dmp

    Filesize

    4KB

  • memory/644-150-0x0000000070960000-0x00000000709AB000-memory.dmp

    Filesize

    300KB

  • memory/644-169-0x0000000005C20000-0x0000000005C21000-memory.dmp

    Filesize

    4KB

  • memory/644-131-0x0000000000000000-mapping.dmp

  • memory/644-164-0x0000000005F80000-0x0000000005F81000-memory.dmp

    Filesize

    4KB

  • memory/1208-241-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/1292-154-0x0000000000010000-0x0000000000011000-memory.dmp

    Filesize

    4KB

  • memory/1292-161-0x00000000047B0000-0x0000000004DB6000-memory.dmp

    Filesize

    6.0MB

  • memory/1292-166-0x0000000005770000-0x0000000005771000-memory.dmp

    Filesize

    4KB

  • memory/1292-151-0x0000000000000000-mapping.dmp

  • memory/1292-170-0x0000000005A30000-0x0000000005A31000-memory.dmp

    Filesize

    4KB

  • memory/1292-194-0x00000000069A0000-0x00000000069A1000-memory.dmp

    Filesize

    4KB

  • memory/1292-192-0x00000000062A0000-0x00000000062A1000-memory.dmp

    Filesize

    4KB

  • memory/1844-237-0x0000000000030000-0x0000000000035000-memory.dmp

    Filesize

    20KB

  • memory/1844-238-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/1844-233-0x0000000000000000-mapping.dmp

  • memory/2820-177-0x0000000076CD0000-0x0000000076E92000-memory.dmp

    Filesize

    1.8MB

  • memory/2820-189-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

    Filesize

    4KB

  • memory/2820-178-0x0000000074DF0000-0x0000000074EE1000-memory.dmp

    Filesize

    964KB

  • memory/2820-179-0x00000000010B0000-0x00000000010B1000-memory.dmp

    Filesize

    4KB

  • memory/2820-181-0x0000000071F30000-0x0000000071FB0000-memory.dmp

    Filesize

    512KB

  • memory/2820-186-0x0000000074EF0000-0x0000000075474000-memory.dmp

    Filesize

    5.5MB

  • memory/2820-188-0x0000000000C50000-0x0000000000C95000-memory.dmp

    Filesize

    276KB

  • memory/2820-176-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2820-187-0x0000000075830000-0x0000000076B78000-memory.dmp

    Filesize

    19.3MB

  • memory/2820-191-0x0000000070960000-0x00000000709AB000-memory.dmp

    Filesize

    300KB

  • memory/2820-175-0x00000000010B0000-0x000000000111C000-memory.dmp

    Filesize

    432KB

  • memory/2820-172-0x0000000000000000-mapping.dmp

  • memory/2872-118-0x0000000000190000-0x00000000001A6000-memory.dmp

    Filesize

    88KB

  • memory/4380-117-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/4380-116-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/4544-130-0x0000000000400000-0x0000000000541000-memory.dmp

    Filesize

    1.3MB

  • memory/4544-125-0x0000000000000000-mapping.dmp

  • memory/4544-128-0x0000000000591000-0x0000000000611000-memory.dmp

    Filesize

    512KB

  • memory/4544-129-0x0000000000690000-0x00000000007DA000-memory.dmp

    Filesize

    1.3MB

  • memory/4560-123-0x00000000007B0000-0x0000000000841000-memory.dmp

    Filesize

    580KB

  • memory/4560-124-0x0000000000400000-0x0000000000541000-memory.dmp

    Filesize

    1.3MB

  • memory/4560-119-0x0000000000000000-mapping.dmp

  • memory/4560-122-0x00000000005D1000-0x0000000000651000-memory.dmp

    Filesize

    512KB

  • memory/4724-206-0x0000000000000000-mapping.dmp

  • memory/4724-225-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

    Filesize

    4KB

  • memory/4724-213-0x0000000074DF0000-0x0000000074EE1000-memory.dmp

    Filesize

    964KB

  • memory/4724-212-0x0000000076CD0000-0x0000000076E92000-memory.dmp

    Filesize

    1.8MB

  • memory/4724-211-0x0000000000D10000-0x0000000000D55000-memory.dmp

    Filesize

    276KB

  • memory/4724-210-0x0000000000540000-0x0000000000541000-memory.dmp

    Filesize

    4KB

  • memory/4724-209-0x00000000010A0000-0x000000000110C000-memory.dmp

    Filesize

    432KB

  • memory/5016-196-0x0000000000000000-mapping.dmp