Analysis

  • max time kernel
    151s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    07-12-2021 15:54

General

  • Target

    69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe

  • Size

    319KB

  • MD5

    0d27d4a937d39f29767655a0fb3388cf

  • SHA1

    e951e11b7a8a529916723a58e96c8ce3954f8b42

  • SHA256

    69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6

  • SHA512

    b53f3a42c51a4a36b5bbce7a1661115597eff7dc7d4862fcc71abef1091ac87fe0de947bce1236a9ee846ef33e44c47b048b7912acf662d82c3b54700d756ba4

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

icedid

Campaign

3439131404

C2

grendafolz.com

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe
    "C:\Users\Admin\AppData\Local\Temp\69f3a70a7903f71bcf0d6ed3daaea72c2c0e9c4243750f10ffbb870cb57b05d6.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4332
  • C:\Users\Admin\AppData\Local\Temp\5B7A.exe
    C:\Users\Admin\AppData\Local\Temp\5B7A.exe
    1⤵
    • Executes dropped EXE
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      PID:4564
  • C:\Users\Admin\AppData\Local\Temp\A277.exe
    C:\Users\Admin\AppData\Local\Temp\A277.exe
    1⤵
    • Executes dropped EXE
    PID:920
  • C:\Users\Admin\AppData\Local\Temp\C12B.exe
    C:\Users\Admin\AppData\Local\Temp\C12B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1376
  • C:\Users\Admin\AppData\Local\Temp\DE49.exe
    C:\Users\Admin\AppData\Local\Temp\DE49.exe
    1⤵
    • Executes dropped EXE
    PID:2504
  • C:\Users\Admin\AppData\Local\Temp\FC23.exe
    C:\Users\Admin\AppData\Local\Temp\FC23.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Users\Admin\AppData\Local\Temp\FC23.exe
      C:\Users\Admin\AppData\Local\Temp\FC23.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Users\Admin\AppData\Local\Temp\FC23.exe
        C:\Users\Admin\AppData\Local\Temp\FC23.exe
        3⤵
        • Executes dropped EXE
        PID:4236
  • C:\Users\Admin\AppData\Local\Temp\D89.exe
    C:\Users\Admin\AppData\Local\Temp\D89.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4980
  • C:\Users\Admin\AppData\Local\Temp\3083.exe
    C:\Users\Admin\AppData\Local\Temp\3083.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:4772
  • C:\Users\Admin\AppData\Local\Temp\3083.exe
    C:\Users\Admin\AppData\Local\Temp\3083.exe start
    1⤵
    • Executes dropped EXE
    PID:4144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3083.exe

    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\3083.exe

    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\3083.exe

    MD5

    b04dd6fc6f62caa7d7e1ac7dadd2f31a

    SHA1

    e4e0bf5cf41f280c2feca64262a2b254a2abf123

    SHA256

    fe6101b889a34ee4d74ba49b275954f242b344d2e0c4f0c0d8a1a44e1429b79b

    SHA512

    a0c9cd205b1533311e60b77ffdd3465c42df54d4aaa1f0aa7821049ab9ed5a950336584527ecf813622e1659eb82e2446a30de89c5f964c672e1d9f1bed07ea1

  • C:\Users\Admin\AppData\Local\Temp\5B7A.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Local\Temp\5B7A.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Local\Temp\A277.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\A277.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\C12B.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\C12B.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\D89.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\D89.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\DE49.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\DE49.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\FC23.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\FC23.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\FC23.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\FC23.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

    MD5

    ad8f4c6461affa64e60a9bab7f996b36

    SHA1

    cdb36ffc32f72e55f4f44d72cdd3f56aa949d8e2

    SHA256

    a0dcf1dd6746864b884620af57235b5569f36abecea94bfc5f3064c67c6d1afb

    SHA512

    8e03f54ebf17e4caef253eabaf15927c724971f8dcc614ea4ad4cc9ca717cb86ab242bc4ec6377622fee1856614ace94411135c7922d0ccf5213aba996d77eba

  • memory/920-134-0x0000000002A40000-0x0000000002A85000-memory.dmp

    Filesize

    276KB

  • memory/920-131-0x0000000000000000-mapping.dmp

  • memory/1376-154-0x00000000065B0000-0x00000000065B1000-memory.dmp

    Filesize

    4KB

  • memory/1376-163-0x0000000007080000-0x0000000007081000-memory.dmp

    Filesize

    4KB

  • memory/1376-143-0x0000000005650000-0x0000000005651000-memory.dmp

    Filesize

    4KB

  • memory/1376-144-0x0000000005570000-0x0000000005B76000-memory.dmp

    Filesize

    6.0MB

  • memory/1376-145-0x0000000005690000-0x0000000005691000-memory.dmp

    Filesize

    4KB

  • memory/1376-142-0x0000000005720000-0x0000000005721000-memory.dmp

    Filesize

    4KB

  • memory/1376-141-0x00000000055F0000-0x00000000055F1000-memory.dmp

    Filesize

    4KB

  • memory/1376-140-0x0000000005B80000-0x0000000005B81000-memory.dmp

    Filesize

    4KB

  • memory/1376-164-0x0000000007780000-0x0000000007781000-memory.dmp

    Filesize

    4KB

  • memory/1376-150-0x0000000006690000-0x0000000006691000-memory.dmp

    Filesize

    4KB

  • memory/1376-151-0x0000000005A00000-0x0000000005A01000-memory.dmp

    Filesize

    4KB

  • memory/1376-152-0x0000000006190000-0x0000000006191000-memory.dmp

    Filesize

    4KB

  • memory/1376-153-0x0000000005AF0000-0x0000000005AF1000-memory.dmp

    Filesize

    4KB

  • memory/1376-138-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

    Filesize

    4KB

  • memory/1376-135-0x0000000000000000-mapping.dmp

  • memory/2504-149-0x0000000000430000-0x00000000004DE000-memory.dmp

    Filesize

    696KB

  • memory/2504-146-0x0000000000000000-mapping.dmp

  • memory/3056-118-0x0000000000720000-0x0000000000736000-memory.dmp

    Filesize

    88KB

  • memory/3168-155-0x0000000000000000-mapping.dmp

  • memory/4144-201-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/4144-200-0x00000000007A4000-0x00000000007B4000-memory.dmp

    Filesize

    64KB

  • memory/4236-160-0x00007FF663230000-0x00007FF663239000-memory.dmp

    Filesize

    36KB

  • memory/4236-161-0x00007FF663231364-mapping.dmp

  • memory/4236-165-0x00007FF663230000-0x00007FF663239000-memory.dmp

    Filesize

    36KB

  • memory/4332-116-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/4332-117-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/4332-115-0x00000000007F1000-0x0000000000802000-memory.dmp

    Filesize

    68KB

  • memory/4412-158-0x0000000000000000-mapping.dmp

  • memory/4564-129-0x0000000000680000-0x00000000007CA000-memory.dmp

    Filesize

    1.3MB

  • memory/4564-130-0x0000000000400000-0x0000000000541000-memory.dmp

    Filesize

    1.3MB

  • memory/4564-125-0x0000000000000000-mapping.dmp

  • memory/4672-123-0x0000000000830000-0x00000000008C1000-memory.dmp

    Filesize

    580KB

  • memory/4672-119-0x0000000000000000-mapping.dmp

  • memory/4672-124-0x0000000000400000-0x0000000000541000-memory.dmp

    Filesize

    1.3MB

  • memory/4772-193-0x0000000000000000-mapping.dmp

  • memory/4772-197-0x0000000000030000-0x0000000000035000-memory.dmp

    Filesize

    20KB

  • memory/4772-198-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/4772-196-0x00000000006A1000-0x00000000006B2000-memory.dmp

    Filesize

    68KB

  • memory/4980-176-0x0000000071D20000-0x0000000071DA0000-memory.dmp

    Filesize

    512KB

  • memory/4980-182-0x0000000075EF0000-0x0000000077238000-memory.dmp

    Filesize

    19.3MB

  • memory/4980-185-0x000000006FF70000-0x000000006FFBB000-memory.dmp

    Filesize

    300KB

  • memory/4980-183-0x0000000005840000-0x0000000005841000-memory.dmp

    Filesize

    4KB

  • memory/4980-171-0x00000000011B0000-0x00000000011B1000-memory.dmp

    Filesize

    4KB

  • memory/4980-169-0x00000000000A0000-0x000000000010C000-memory.dmp

    Filesize

    432KB

  • memory/4980-181-0x0000000075060000-0x00000000755E4000-memory.dmp

    Filesize

    5.5MB

  • memory/4980-170-0x0000000002E10000-0x0000000002E55000-memory.dmp

    Filesize

    276KB

  • memory/4980-174-0x00000000000A0000-0x00000000000A1000-memory.dmp

    Filesize

    4KB

  • memory/4980-166-0x0000000000000000-mapping.dmp

  • memory/4980-173-0x0000000074B20000-0x0000000074C11000-memory.dmp

    Filesize

    964KB

  • memory/4980-172-0x0000000075C90000-0x0000000075E52000-memory.dmp

    Filesize

    1.8MB