Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
07-12-2021 15:54
Static task
static1
Behavioral task
behavioral1
Sample
69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe
Resource
win10-en-20211014
General
-
Target
69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe
-
Size
319KB
-
MD5
0d27d4a937d39f29767655a0fb3388cf
-
SHA1
e951e11b7a8a529916723a58e96c8ce3954f8b42
-
SHA256
69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6
-
SHA512
b53f3a42c51a4a36b5bbce7a1661115597eff7dc7d4862fcc71abef1091ac87fe0de947bce1236a9ee846ef33e44c47b048b7912acf662d82c3b54700d756ba4
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
icedid
3439131404
grendafolz.com
Extracted
systembc
185.209.30.180:4001
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\C12B.exe family_redline C:\Users\Admin\AppData\Local\Temp\C12B.exe family_redline behavioral1/memory/4980-169-0x00000000000A0000-0x000000000010C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
Processes:
5B7A.exeSmartClock.exeA277.exeC12B.exeDE49.exeFC23.exeFC23.exeFC23.exeD89.exe3083.exe3083.exepid process 4672 5B7A.exe 4564 SmartClock.exe 920 A277.exe 1376 C12B.exe 2504 DE49.exe 3168 FC23.exe 4412 FC23.exe 4236 FC23.exe 4980 D89.exe 4772 3083.exe 4144 3083.exe -
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Drops startup file 1 IoCs
Processes:
5B7A.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 5B7A.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
D89.exepid process 4980 D89.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
FC23.exedescription pid process target process PID 4412 set thread context of 4236 4412 FC23.exe FC23.exe -
Drops file in Windows directory 2 IoCs
Processes:
3083.exedescription ioc process File created C:\Windows\Tasks\wow64.job 3083.exe File opened for modification C:\Windows\Tasks\wow64.job 3083.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 4564 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exepid process 4332 69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe 4332 69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3056 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exepid process 4332 69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
C12B.exeD89.exedescription pid process Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 1376 C12B.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 4980 D89.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3056 3056 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3056 3056 3056 -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
5B7A.exeFC23.exeFC23.exedescription pid process target process PID 3056 wrote to memory of 4672 3056 5B7A.exe PID 3056 wrote to memory of 4672 3056 5B7A.exe PID 3056 wrote to memory of 4672 3056 5B7A.exe PID 4672 wrote to memory of 4564 4672 5B7A.exe SmartClock.exe PID 4672 wrote to memory of 4564 4672 5B7A.exe SmartClock.exe PID 4672 wrote to memory of 4564 4672 5B7A.exe SmartClock.exe PID 3056 wrote to memory of 920 3056 A277.exe PID 3056 wrote to memory of 920 3056 A277.exe PID 3056 wrote to memory of 920 3056 A277.exe PID 3056 wrote to memory of 1376 3056 C12B.exe PID 3056 wrote to memory of 1376 3056 C12B.exe PID 3056 wrote to memory of 1376 3056 C12B.exe PID 3056 wrote to memory of 2504 3056 DE49.exe PID 3056 wrote to memory of 2504 3056 DE49.exe PID 3056 wrote to memory of 2504 3056 DE49.exe PID 3056 wrote to memory of 3168 3056 FC23.exe PID 3056 wrote to memory of 3168 3056 FC23.exe PID 3168 wrote to memory of 4412 3168 FC23.exe FC23.exe PID 3168 wrote to memory of 4412 3168 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 4412 wrote to memory of 4236 4412 FC23.exe FC23.exe PID 3056 wrote to memory of 4980 3056 D89.exe PID 3056 wrote to memory of 4980 3056 D89.exe PID 3056 wrote to memory of 4980 3056 D89.exe PID 3056 wrote to memory of 4772 3056 3083.exe PID 3056 wrote to memory of 4772 3056 3083.exe PID 3056 wrote to memory of 4772 3056 3083.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe"C:\Users\Admin\AppData\Local\Temp\69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4332
-
C:\Users\Admin\AppData\Local\Temp\5B7A.exeC:\Users\Admin\AppData\Local\Temp\5B7A.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\A277.exeC:\Users\Admin\AppData\Local\Temp\A277.exe1⤵
- Executes dropped EXE
PID:920
-
C:\Users\Admin\AppData\Local\Temp\C12B.exeC:\Users\Admin\AppData\Local\Temp\C12B.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
C:\Users\Admin\AppData\Local\Temp\DE49.exeC:\Users\Admin\AppData\Local\Temp\DE49.exe1⤵
- Executes dropped EXE
PID:2504
-
C:\Users\Admin\AppData\Local\Temp\FC23.exeC:\Users\Admin\AppData\Local\Temp\FC23.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\FC23.exeC:\Users\Admin\AppData\Local\Temp\FC23.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\FC23.exeC:\Users\Admin\AppData\Local\Temp\FC23.exe3⤵
- Executes dropped EXE
PID:4236
-
-
-
C:\Users\Admin\AppData\Local\Temp\D89.exeC:\Users\Admin\AppData\Local\Temp\D89.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
C:\Users\Admin\AppData\Local\Temp\3083.exeC:\Users\Admin\AppData\Local\Temp\3083.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4772
-
C:\Users\Admin\AppData\Local\Temp\3083.exeC:\Users\Admin\AppData\Local\Temp\3083.exe start1⤵
- Executes dropped EXE
PID:4144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b04dd6fc6f62caa7d7e1ac7dadd2f31a
SHA1e4e0bf5cf41f280c2feca64262a2b254a2abf123
SHA256fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b
SHA512a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1
-
MD5
b04dd6fc6f62caa7d7e1ac7dadd2f31a
SHA1e4e0bf5cf41f280c2feca64262a2b254a2abf123
SHA256fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b
SHA512a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1
-
MD5
b04dd6fc6f62caa7d7e1ac7dadd2f31a
SHA1e4e0bf5cf41f280c2feca64262a2b254a2abf123
SHA256fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b
SHA512a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1
-
MD5
ad8f4c6461affa64e60a9bab7f996b36
SHA1cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2
SHA256a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb
SHA5128e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba
-
MD5
ad8f4c6461affa64e60a9bab7f996b36
SHA1cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2
SHA256a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb
SHA5128e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
ad8f4c6461affa64e60a9bab7f996b36
SHA1cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2
SHA256a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb
SHA5128e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba
-
MD5
ad8f4c6461affa64e60a9bab7f996b36
SHA1cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2
SHA256a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb
SHA5128e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba