Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-12-2021 07:22
Static task
static1
Behavioral task
behavioral1
Sample
5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe
Resource
win10-en-20211104
General
-
Target
5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe
-
Size
241KB
-
MD5
8fd84f8bb387f090f8ec1f8100351200
-
SHA1
9f3d5a2a6670a59e5c4c338aee7362a1e080f9d6
-
SHA256
5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10
-
SHA512
6fc30f5cfcb0397502a342499093e72ef481bd54ffbf0b5a5649c48b4cb1307650e1b68d1668638cf949817e96227a16832ffc6b7bd9c9a23e4b5f2b4c9fd69a
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
raccoon
1.8.3-hotfix
f797145799b7b1b77b35d81de942eee0908da519
-
url4cnc
http://91.219.236.27/capibar
http://94.158.245.167/capibar
http://185.163.204.216/capibar
http://185.225.19.238/capibar
http://185.163.204.218/capibar
https://t.me/capibar
Extracted
raccoon
1.8.3-hotfix
fd4f23250443a724a3d1548e6ab07c481dfc2814
-
url4cnc
http://91.219.236.27/duglassa1
http://94.158.245.167/duglassa1
http://185.163.204.216/duglassa1
http://185.225.19.238/duglassa1
http://185.163.204.218/duglassa1
https://t.me/duglassa1
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4108-137-0x0000000000B00000-0x0000000000B69000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1784-175-0x00000000024E0000-0x0000000002520000-memory.dmp BazarLoaderVar5 -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
6DF8.exe6DF8.exe825C.exe874F.exeE697.exepid process 2268 6DF8.exe 3192 6DF8.exe 4484 825C.exe 4108 874F.exe 2664 E697.exe -
Deletes itself 1 IoCs
Processes:
pid process 2416 -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1784 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
874F.exepid process 4108 874F.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe6DF8.exedescription pid process target process PID 396 set thread context of 4072 396 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe PID 2268 set thread context of 3192 2268 6DF8.exe 6DF8.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6DF8.exe5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6DF8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6DF8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6DF8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exepid process 4072 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 4072 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2416 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe6DF8.exepid process 4072 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 3192 6DF8.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
874F.exedescription pid process Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 Token: SeDebugPrivilege 4108 874F.exe Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe6DF8.exedescription pid process target process PID 396 wrote to memory of 4072 396 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe PID 396 wrote to memory of 4072 396 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe PID 396 wrote to memory of 4072 396 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe PID 396 wrote to memory of 4072 396 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe PID 396 wrote to memory of 4072 396 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe PID 396 wrote to memory of 4072 396 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe 5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe PID 2416 wrote to memory of 2268 2416 6DF8.exe PID 2416 wrote to memory of 2268 2416 6DF8.exe PID 2416 wrote to memory of 2268 2416 6DF8.exe PID 2268 wrote to memory of 3192 2268 6DF8.exe 6DF8.exe PID 2268 wrote to memory of 3192 2268 6DF8.exe 6DF8.exe PID 2268 wrote to memory of 3192 2268 6DF8.exe 6DF8.exe PID 2268 wrote to memory of 3192 2268 6DF8.exe 6DF8.exe PID 2268 wrote to memory of 3192 2268 6DF8.exe 6DF8.exe PID 2268 wrote to memory of 3192 2268 6DF8.exe 6DF8.exe PID 2416 wrote to memory of 4484 2416 825C.exe PID 2416 wrote to memory of 4484 2416 825C.exe PID 2416 wrote to memory of 4484 2416 825C.exe PID 2416 wrote to memory of 4108 2416 874F.exe PID 2416 wrote to memory of 4108 2416 874F.exe PID 2416 wrote to memory of 4108 2416 874F.exe PID 2416 wrote to memory of 1784 2416 regsvr32.exe PID 2416 wrote to memory of 1784 2416 regsvr32.exe PID 2416 wrote to memory of 2664 2416 E697.exe PID 2416 wrote to memory of 2664 2416 E697.exe PID 2416 wrote to memory of 2664 2416 E697.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe"C:\Users\Admin\AppData\Local\Temp\5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe"C:\Users\Admin\AppData\Local\Temp\5e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\6DF8.exeC:\Users\Admin\AppData\Local\Temp\6DF8.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6DF8.exeC:\Users\Admin\AppData\Local\Temp\6DF8.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\825C.exeC:\Users\Admin\AppData\Local\Temp\825C.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\874F.exeC:\Users\Admin\AppData\Local\Temp\874F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\CC96.dll1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\E697.exeC:\Users\Admin\AppData\Local\Temp\E697.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6DF8.exeMD5
8fd84f8bb387f090f8ec1f8100351200
SHA19f3d5a2a6670a59e5c4c338aee7362a1e080f9d6
SHA2565e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10
SHA5126fc30f5cfcb0397502a342499093e72ef481bd54ffbf0b5a5649c48b4cb1307650e1b68d1668638cf949817e96227a16832ffc6b7bd9c9a23e4b5f2b4c9fd69a
-
C:\Users\Admin\AppData\Local\Temp\6DF8.exeMD5
8fd84f8bb387f090f8ec1f8100351200
SHA19f3d5a2a6670a59e5c4c338aee7362a1e080f9d6
SHA2565e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10
SHA5126fc30f5cfcb0397502a342499093e72ef481bd54ffbf0b5a5649c48b4cb1307650e1b68d1668638cf949817e96227a16832ffc6b7bd9c9a23e4b5f2b4c9fd69a
-
C:\Users\Admin\AppData\Local\Temp\6DF8.exeMD5
8fd84f8bb387f090f8ec1f8100351200
SHA19f3d5a2a6670a59e5c4c338aee7362a1e080f9d6
SHA2565e2346479d633af517088a6be81e5051f8ed1c9c1b96fb3e7797a26db7c11c10
SHA5126fc30f5cfcb0397502a342499093e72ef481bd54ffbf0b5a5649c48b4cb1307650e1b68d1668638cf949817e96227a16832ffc6b7bd9c9a23e4b5f2b4c9fd69a
-
C:\Users\Admin\AppData\Local\Temp\825C.exeMD5
bce50d5b17bb88f22f0000511026520d
SHA1599aaed4ee72ec0e0fc4cada844a1c210e332961
SHA25677e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455
SHA512c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536
-
C:\Users\Admin\AppData\Local\Temp\825C.exeMD5
bce50d5b17bb88f22f0000511026520d
SHA1599aaed4ee72ec0e0fc4cada844a1c210e332961
SHA25677e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455
SHA512c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536
-
C:\Users\Admin\AppData\Local\Temp\874F.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\874F.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\CC96.dllMD5
a49d28798147cc039e3ac341044fe612
SHA1b950324092db34ad2940560d85f07744dd9e5b0c
SHA25617b8dbb794a05333446fc5eddff69ef061fea63ff3a7aeb1a7b5e1d87337584b
SHA5126ba8410d56bd64115da7cee0afd70a5e88699fccacbb42fcbd9990575a132828ecab630bdbf2349bbb4f7db97b9900eb765781e3654af3beadb884aba565723a
-
C:\Users\Admin\AppData\Local\Temp\E697.exeMD5
0af95d4534f76e1f817f8fdfbb72457f
SHA18995c4919b29f929f40881ede42fc351b63e39e6
SHA25637277505c9c29a553b922916789287d97ec515d25dc2cb499ded717347efac9c
SHA512e6026be9187b83e2c1685a62cf88c975c65bbc7476130051eb91d228fcaf8600922fafe99de09ecbc23744fc478dcdb42cf28492676317616c82dd7760ae3490
-
C:\Users\Admin\AppData\Local\Temp\E697.exeMD5
0af95d4534f76e1f817f8fdfbb72457f
SHA18995c4919b29f929f40881ede42fc351b63e39e6
SHA25637277505c9c29a553b922916789287d97ec515d25dc2cb499ded717347efac9c
SHA512e6026be9187b83e2c1685a62cf88c975c65bbc7476130051eb91d228fcaf8600922fafe99de09ecbc23744fc478dcdb42cf28492676317616c82dd7760ae3490
-
\Users\Admin\AppData\Local\Temp\CC96.dllMD5
a49d28798147cc039e3ac341044fe612
SHA1b950324092db34ad2940560d85f07744dd9e5b0c
SHA25617b8dbb794a05333446fc5eddff69ef061fea63ff3a7aeb1a7b5e1d87337584b
SHA5126ba8410d56bd64115da7cee0afd70a5e88699fccacbb42fcbd9990575a132828ecab630bdbf2349bbb4f7db97b9900eb765781e3654af3beadb884aba565723a
-
memory/396-121-0x0000000002C30000-0x0000000002CDE000-memory.dmpFilesize
696KB
-
memory/396-120-0x0000000002C10000-0x0000000002C19000-memory.dmpFilesize
36KB
-
memory/1784-164-0x0000000000000000-mapping.dmp
-
memory/1784-175-0x00000000024E0000-0x0000000002520000-memory.dmpFilesize
256KB
-
memory/1784-173-0x00000000007A0000-0x00000000007A2000-memory.dmpFilesize
8KB
-
memory/1784-174-0x00000000007A0000-0x00000000007A2000-memory.dmpFilesize
8KB
-
memory/2268-129-0x0000000002BA0000-0x0000000002BA9000-memory.dmpFilesize
36KB
-
memory/2268-123-0x0000000000000000-mapping.dmp
-
memory/2416-156-0x00000000029C0000-0x00000000029D6000-memory.dmpFilesize
88KB
-
memory/2416-122-0x0000000000940000-0x0000000000956000-memory.dmpFilesize
88KB
-
memory/2664-170-0x0000000002D10000-0x0000000002D5F000-memory.dmpFilesize
316KB
-
memory/2664-171-0x0000000004720000-0x00000000047AF000-memory.dmpFilesize
572KB
-
memory/2664-167-0x0000000000000000-mapping.dmp
-
memory/2664-172-0x0000000000400000-0x0000000002BBD000-memory.dmpFilesize
39.7MB
-
memory/3192-127-0x0000000000402F47-mapping.dmp
-
memory/4072-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4072-119-0x0000000000402F47-mapping.dmp
-
memory/4108-147-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/4108-162-0x0000000006AC0000-0x0000000006AC1000-memory.dmpFilesize
4KB
-
memory/4108-151-0x0000000074050000-0x00000000745D4000-memory.dmpFilesize
5.5MB
-
memory/4108-153-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/4108-152-0x0000000074A60000-0x0000000075DA8000-memory.dmpFilesize
19.3MB
-
memory/4108-154-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/4108-155-0x000000006FDD0000-0x000000006FE1B000-memory.dmpFilesize
300KB
-
memory/4108-149-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/4108-157-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/4108-158-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/4108-159-0x00000000062D0000-0x00000000062D1000-memory.dmpFilesize
4KB
-
memory/4108-160-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/4108-161-0x0000000005FD0000-0x0000000005FD1000-memory.dmpFilesize
4KB
-
memory/4108-150-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/4108-163-0x00000000071C0000-0x00000000071C1000-memory.dmpFilesize
4KB
-
memory/4108-148-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/4108-146-0x0000000071B60000-0x0000000071BE0000-memory.dmpFilesize
512KB
-
memory/4108-144-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB
-
memory/4108-143-0x00000000767F0000-0x00000000768E1000-memory.dmpFilesize
964KB
-
memory/4108-142-0x00000000025F0000-0x0000000002635000-memory.dmpFilesize
276KB
-
memory/4108-134-0x0000000000000000-mapping.dmp
-
memory/4108-139-0x0000000076AA0000-0x0000000076C62000-memory.dmpFilesize
1.8MB
-
memory/4108-137-0x0000000000B00000-0x0000000000B69000-memory.dmpFilesize
420KB
-
memory/4108-138-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/4484-140-0x0000000002160000-0x00000000021EF000-memory.dmpFilesize
572KB
-
memory/4484-141-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/4484-130-0x0000000000000000-mapping.dmp