Analysis

  • max time kernel
    151s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    07-12-2021 15:49

General

  • Target

    345eaa8379ef8daed16ebc210e7c0165.exe

  • Size

    319KB

  • MD5

    345eaa8379ef8daed16ebc210e7c0165

  • SHA1

    c9278fe7bf96f97556527782f271a554a8b73a68

  • SHA256

    88e66423a3a96f03441102060b775e35d0e401a3e4f74e1c3e54f9bfdcd06258

  • SHA512

    1a094d8070c0243fcbdef5ff8361192ae7e98f396072f28105b70680b2b7386d3afad64f8f784d5d5e1d54f690b0cb2871e0929c1aad0ad64c543d68dc2b0b5b

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\345eaa8379ef8daed16ebc210e7c0165.exe
    "C:\Users\Admin\AppData\Local\Temp\345eaa8379ef8daed16ebc210e7c0165.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2176
  • C:\Users\Admin\AppData\Local\Temp\6CFE.exe
    C:\Users\Admin\AppData\Local\Temp\6CFE.exe
    1⤵
    • Executes dropped EXE
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      PID:3368
  • C:\Users\Admin\AppData\Local\Temp\9B81.exe
    C:\Users\Admin\AppData\Local\Temp\9B81.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:604
  • C:\Users\Admin\AppData\Roaming\aevtfuf
    C:\Users\Admin\AppData\Roaming\aevtfuf
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2628
  • C:\Users\Admin\AppData\Local\Temp\BB11.exe
    C:\Users\Admin\AppData\Local\Temp\BB11.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1268
  • C:\Users\Admin\AppData\Local\Temp\CD51.exe
    C:\Users\Admin\AppData\Local\Temp\CD51.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2316
  • C:\Users\Admin\AppData\Local\Temp\E39A.exe
    C:\Users\Admin\AppData\Local\Temp\E39A.exe
    1⤵
    • Executes dropped EXE
    PID:2508
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2508 -s 440
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1728
  • C:\Users\Admin\AppData\Local\Temp\EFA1.exe
    C:\Users\Admin\AppData\Local\Temp\EFA1.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1880
  • C:\Users\Admin\AppData\Local\Temp\925.exe
    C:\Users\Admin\AppData\Local\Temp\925.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1620
  • C:\Users\Admin\AppData\Local\Temp\925.exe
    C:\Users\Admin\AppData\Local\Temp\925.exe start
    1⤵
    • Executes dropped EXE
    PID:3052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6CFE.exe
    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Local\Temp\6CFE.exe
    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Local\Temp\925.exe
    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\925.exe
    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\925.exe
    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\9B81.exe
    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\9B81.exe
    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\BB11.exe
    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\BB11.exe
    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\CD51.exe
    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\CD51.exe
    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\E39A.exe
    MD5

    180fc8466647515a888cba4bdacb60db

    SHA1

    a6a5201f997c665603c9fe05a1d08add514337a3

    SHA256

    3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

    SHA512

    4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

  • C:\Users\Admin\AppData\Local\Temp\E39A.exe
    MD5

    180fc8466647515a888cba4bdacb60db

    SHA1

    a6a5201f997c665603c9fe05a1d08add514337a3

    SHA256

    3c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116

    SHA512

    4146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b

  • C:\Users\Admin\AppData\Local\Temp\EFA1.exe
    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\EFA1.exe
    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Roaming\aevtfuf
    MD5

    345eaa8379ef8daed16ebc210e7c0165

    SHA1

    c9278fe7bf96f97556527782f271a554a8b73a68

    SHA256

    88e66423a3a96f03441102060b775e35d0e401a3e4f74e1c3e54f9bfdcd06258

    SHA512

    1a094d8070c0243fcbdef5ff8361192ae7e98f396072f28105b70680b2b7386d3afad64f8f784d5d5e1d54f690b0cb2871e0929c1aad0ad64c543d68dc2b0b5b

  • C:\Users\Admin\AppData\Roaming\aevtfuf
    MD5

    345eaa8379ef8daed16ebc210e7c0165

    SHA1

    c9278fe7bf96f97556527782f271a554a8b73a68

    SHA256

    88e66423a3a96f03441102060b775e35d0e401a3e4f74e1c3e54f9bfdcd06258

    SHA512

    1a094d8070c0243fcbdef5ff8361192ae7e98f396072f28105b70680b2b7386d3afad64f8f784d5d5e1d54f690b0cb2871e0929c1aad0ad64c543d68dc2b0b5b

  • memory/604-162-0x00000000704C0000-0x000000007050B000-memory.dmp
    Filesize

    300KB

  • memory/604-148-0x0000000005960000-0x0000000005961000-memory.dmp
    Filesize

    4KB

  • memory/604-136-0x00000000760B0000-0x0000000076272000-memory.dmp
    Filesize

    1.8MB

  • memory/604-134-0x0000000000B00000-0x0000000000B68000-memory.dmp
    Filesize

    416KB

  • memory/604-131-0x0000000000000000-mapping.dmp
  • memory/604-139-0x0000000002EA0000-0x0000000002EE5000-memory.dmp
    Filesize

    276KB

  • memory/604-140-0x0000000076430000-0x0000000076521000-memory.dmp
    Filesize

    964KB

  • memory/604-141-0x0000000000B00000-0x0000000000B01000-memory.dmp
    Filesize

    4KB

  • memory/604-143-0x0000000072270000-0x00000000722F0000-memory.dmp
    Filesize

    512KB

  • memory/604-144-0x0000000006000000-0x0000000006001000-memory.dmp
    Filesize

    4KB

  • memory/604-145-0x0000000005900000-0x0000000005901000-memory.dmp
    Filesize

    4KB

  • memory/604-146-0x0000000005B00000-0x0000000005B01000-memory.dmp
    Filesize

    4KB

  • memory/604-147-0x00000000059E0000-0x00000000059E1000-memory.dmp
    Filesize

    4KB

  • memory/604-135-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
    Filesize

    4KB

  • memory/604-161-0x00000000059F0000-0x00000000059F1000-memory.dmp
    Filesize

    4KB

  • memory/604-150-0x0000000075AD0000-0x0000000076054000-memory.dmp
    Filesize

    5.5MB

  • memory/604-211-0x0000000005DD0000-0x0000000005DD1000-memory.dmp
    Filesize

    4KB

  • memory/604-151-0x00000000744E0000-0x0000000075828000-memory.dmp
    Filesize

    19.3MB

  • memory/1268-153-0x0000000000000000-mapping.dmp
  • memory/1268-156-0x0000000000A60000-0x0000000000A61000-memory.dmp
    Filesize

    4KB

  • memory/1268-190-0x0000000005620000-0x0000000005621000-memory.dmp
    Filesize

    4KB

  • memory/1268-165-0x0000000005220000-0x0000000005826000-memory.dmp
    Filesize

    6.0MB

  • memory/1620-222-0x0000000000000000-mapping.dmp
  • memory/1620-234-0x0000000000030000-0x0000000000035000-memory.dmp
    Filesize

    20KB

  • memory/1620-235-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/1880-198-0x00000000760B0000-0x0000000076272000-memory.dmp
    Filesize

    1.8MB

  • memory/1880-208-0x0000000005230000-0x0000000005231000-memory.dmp
    Filesize

    4KB

  • memory/1880-215-0x00000000704C0000-0x000000007050B000-memory.dmp
    Filesize

    300KB

  • memory/1880-193-0x0000000000000000-mapping.dmp
  • memory/1880-210-0x00000000744E0000-0x0000000075828000-memory.dmp
    Filesize

    19.3MB

  • memory/1880-209-0x0000000075AD0000-0x0000000076054000-memory.dmp
    Filesize

    5.5MB

  • memory/1880-207-0x0000000000BB0000-0x0000000000BF5000-memory.dmp
    Filesize

    276KB

  • memory/1880-196-0x00000000009F0000-0x0000000000A5C000-memory.dmp
    Filesize

    432KB

  • memory/1880-202-0x0000000072270000-0x00000000722F0000-memory.dmp
    Filesize

    512KB

  • memory/1880-200-0x00000000009F0000-0x00000000009F1000-memory.dmp
    Filesize

    4KB

  • memory/1880-199-0x0000000076430000-0x0000000076521000-memory.dmp
    Filesize

    964KB

  • memory/1880-197-0x0000000000B90000-0x0000000000B91000-memory.dmp
    Filesize

    4KB

  • memory/2176-115-0x00000000007E1000-0x00000000007F2000-memory.dmp
    Filesize

    68KB

  • memory/2176-117-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/2176-116-0x0000000000030000-0x0000000000039000-memory.dmp
    Filesize

    36KB

  • memory/2316-176-0x0000000000AB0000-0x0000000000AF5000-memory.dmp
    Filesize

    276KB

  • memory/2316-182-0x0000000075AD0000-0x0000000076054000-memory.dmp
    Filesize

    5.5MB

  • memory/2316-170-0x0000000000390000-0x00000000003FC000-memory.dmp
    Filesize

    432KB

  • memory/2316-171-0x00000000008B0000-0x00000000008B1000-memory.dmp
    Filesize

    4KB

  • memory/2316-172-0x00000000760B0000-0x0000000076272000-memory.dmp
    Filesize

    1.8MB

  • memory/2316-186-0x0000000004F70000-0x0000000004F71000-memory.dmp
    Filesize

    4KB

  • memory/2316-167-0x0000000000000000-mapping.dmp
  • memory/2316-185-0x00000000704C0000-0x000000007050B000-memory.dmp
    Filesize

    300KB

  • memory/2316-183-0x00000000744E0000-0x0000000075828000-memory.dmp
    Filesize

    19.3MB

  • memory/2316-173-0x0000000076430000-0x0000000076521000-memory.dmp
    Filesize

    964KB

  • memory/2316-177-0x0000000072270000-0x00000000722F0000-memory.dmp
    Filesize

    512KB

  • memory/2316-216-0x00000000060A0000-0x00000000060A1000-memory.dmp
    Filesize

    4KB

  • memory/2316-174-0x0000000000390000-0x0000000000391000-memory.dmp
    Filesize

    4KB

  • memory/2508-187-0x0000000000000000-mapping.dmp
  • memory/2628-149-0x0000000000761000-0x0000000000772000-memory.dmp
    Filesize

    68KB

  • memory/2628-152-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/3040-166-0x00000000046C0000-0x00000000046D6000-memory.dmp
    Filesize

    88KB

  • memory/3040-118-0x0000000000920000-0x0000000000936000-memory.dmp
    Filesize

    88KB

  • memory/3052-238-0x0000000000400000-0x00000000004D1000-memory.dmp
    Filesize

    836KB

  • memory/3188-119-0x0000000000000000-mapping.dmp
  • memory/3188-122-0x0000000000641000-0x00000000006C1000-memory.dmp
    Filesize

    512KB

  • memory/3188-123-0x0000000000730000-0x00000000007C1000-memory.dmp
    Filesize

    580KB

  • memory/3188-124-0x0000000000400000-0x0000000000541000-memory.dmp
    Filesize

    1.3MB

  • memory/3368-129-0x0000000000550000-0x000000000069A000-memory.dmp
    Filesize

    1.3MB

  • memory/3368-130-0x0000000000400000-0x0000000000541000-memory.dmp
    Filesize

    1.3MB

  • memory/3368-125-0x0000000000000000-mapping.dmp
  • memory/3368-128-0x00000000008D1000-0x0000000000951000-memory.dmp
    Filesize

    512KB