Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    08-12-2021 10:14

General

  • Target

    fe0b5ea8629751c7844ad84d2512ccf604b14115f0f7d91a0e88137f45491dd1.exe

  • Size

    241KB

  • MD5

    1b3a654d29ff073036b806c62f4b07d9

  • SHA1

    54214ea54010cec96135c097646803edec00fe75

  • SHA256

    fe0b5ea8629751c7844ad84d2512ccf604b14115f0f7d91a0e88137f45491dd1

  • SHA512

    1045ab80f28da5e9ecbe58a0f300310757033138722f096133079123e05346f5553c728d546e01b9256d9d40721a3f33b7d65241e969ed39a2d5d816b1d836d4

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

icedid

Campaign

3439131404

C2

grendafolz.com

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe0b5ea8629751c7844ad84d2512ccf604b14115f0f7d91a0e88137f45491dd1.exe
    "C:\Users\Admin\AppData\Local\Temp\fe0b5ea8629751c7844ad84d2512ccf604b14115f0f7d91a0e88137f45491dd1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2592
  • C:\Users\Admin\AppData\Local\Temp\221A.exe
    C:\Users\Admin\AppData\Local\Temp\221A.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:3920
  • C:\Users\Admin\AppData\Local\Temp\2B24.exe
    C:\Users\Admin\AppData\Local\Temp\2B24.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2840
  • C:\Users\Admin\AppData\Local\Temp\3AB5.exe
    C:\Users\Admin\AppData\Local\Temp\3AB5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:956
  • C:\Users\Admin\AppData\Local\Temp\446B.exe
    C:\Users\Admin\AppData\Local\Temp\446B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\446B.exe
      C:\Users\Admin\AppData\Local\Temp\446B.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\446B.exe
        C:\Users\Admin\AppData\Local\Temp\446B.exe
        3⤵
        • Executes dropped EXE
        PID:1572
  • C:\Users\Admin\AppData\Local\Temp\5B6E.exe
    C:\Users\Admin\AppData\Local\Temp\5B6E.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2608
  • C:\Users\Admin\AppData\Local\Temp\5B6E.exe
    C:\Users\Admin\AppData\Local\Temp\5B6E.exe start
    1⤵
    • Executes dropped EXE
    PID:3508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\221A.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\221A.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\2B24.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\2B24.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\3AB5.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\3AB5.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\446B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\446B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\446B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\446B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\5B6E.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\5B6E.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\5B6E.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • memory/956-169-0x0000000074D80000-0x00000000760C8000-memory.dmp

    Filesize

    19.3MB

  • memory/956-163-0x0000000071B40000-0x0000000071BC0000-memory.dmp

    Filesize

    512KB

  • memory/956-161-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB

  • memory/956-160-0x00000000742C0000-0x00000000743B1000-memory.dmp

    Filesize

    964KB

  • memory/956-159-0x0000000002400000-0x0000000002445000-memory.dmp

    Filesize

    276KB

  • memory/956-158-0x0000000076D40000-0x0000000076F02000-memory.dmp

    Filesize

    1.8MB

  • memory/956-157-0x0000000000860000-0x0000000000861000-memory.dmp

    Filesize

    4KB

  • memory/956-156-0x0000000000880000-0x00000000008EC000-memory.dmp

    Filesize

    432KB

  • memory/956-168-0x00000000766A0000-0x0000000076C24000-memory.dmp

    Filesize

    5.5MB

  • memory/956-153-0x0000000000000000-mapping.dmp

  • memory/956-171-0x000000006FD90000-0x000000006FDDB000-memory.dmp

    Filesize

    300KB

  • memory/956-172-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

    Filesize

    4KB

  • memory/1208-182-0x0000000000000000-mapping.dmp

  • memory/1572-192-0x00007FF674640000-0x00007FF674649000-memory.dmp

    Filesize

    36KB

  • memory/1572-188-0x00007FF674640000-0x00007FF674649000-memory.dmp

    Filesize

    36KB

  • memory/1572-189-0x00007FF674641364-mapping.dmp

  • memory/2312-186-0x0000000000000000-mapping.dmp

  • memory/2592-118-0x0000000002CB0000-0x0000000002DFA000-memory.dmp

    Filesize

    1.3MB

  • memory/2592-120-0x0000000000400000-0x0000000002B75000-memory.dmp

    Filesize

    39.5MB

  • memory/2592-119-0x0000000002CB0000-0x0000000002DFA000-memory.dmp

    Filesize

    1.3MB

  • memory/2608-208-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/2608-206-0x0000000002CD0000-0x0000000002CD6000-memory.dmp

    Filesize

    24KB

  • memory/2608-207-0x0000000002CE0000-0x0000000002CE5000-memory.dmp

    Filesize

    20KB

  • memory/2608-203-0x0000000000000000-mapping.dmp

  • memory/2840-145-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2840-174-0x0000000004D90000-0x0000000004D91000-memory.dmp

    Filesize

    4KB

  • memory/2840-142-0x0000000000000000-mapping.dmp

  • memory/2840-152-0x0000000004A90000-0x0000000005096000-memory.dmp

    Filesize

    6.0MB

  • memory/3016-121-0x00000000013B0000-0x00000000013C6000-memory.dmp

    Filesize

    88KB

  • memory/3508-210-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/3920-134-0x00000000058C0000-0x00000000058C1000-memory.dmp

    Filesize

    4KB

  • memory/3920-122-0x0000000000000000-mapping.dmp

  • memory/3920-176-0x00000000069B0000-0x00000000069B1000-memory.dmp

    Filesize

    4KB

  • memory/3920-177-0x0000000005D60000-0x0000000005D61000-memory.dmp

    Filesize

    4KB

  • memory/3920-173-0x0000000005C60000-0x0000000005C61000-memory.dmp

    Filesize

    4KB

  • memory/3920-128-0x0000000002E30000-0x0000000002E75000-memory.dmp

    Filesize

    276KB

  • memory/3920-127-0x0000000076D40000-0x0000000076F02000-memory.dmp

    Filesize

    1.8MB

  • memory/3920-126-0x0000000001330000-0x0000000001331000-memory.dmp

    Filesize

    4KB

  • memory/3920-125-0x00000000009C0000-0x0000000000A28000-memory.dmp

    Filesize

    416KB

  • memory/3920-129-0x00000000742C0000-0x00000000743B1000-memory.dmp

    Filesize

    964KB

  • memory/3920-130-0x00000000009C0000-0x00000000009C1000-memory.dmp

    Filesize

    4KB

  • memory/3920-175-0x0000000005D80000-0x0000000005D81000-memory.dmp

    Filesize

    4KB

  • memory/3920-191-0x0000000007320000-0x0000000007321000-memory.dmp

    Filesize

    4KB

  • memory/3920-132-0x0000000071B40000-0x0000000071BC0000-memory.dmp

    Filesize

    512KB

  • memory/3920-193-0x0000000007A20000-0x0000000007A21000-memory.dmp

    Filesize

    4KB

  • memory/3920-133-0x0000000005EA0000-0x0000000005EA1000-memory.dmp

    Filesize

    4KB

  • memory/3920-135-0x00000000059F0000-0x00000000059F1000-memory.dmp

    Filesize

    4KB

  • memory/3920-136-0x0000000005920000-0x0000000005921000-memory.dmp

    Filesize

    4KB

  • memory/3920-137-0x00000000766A0000-0x0000000076C24000-memory.dmp

    Filesize

    5.5MB

  • memory/3920-139-0x0000000003630000-0x0000000003631000-memory.dmp

    Filesize

    4KB

  • memory/3920-138-0x0000000074D80000-0x00000000760C8000-memory.dmp

    Filesize

    19.3MB

  • memory/3920-140-0x0000000005960000-0x0000000005961000-memory.dmp

    Filesize

    4KB

  • memory/3920-141-0x000000006FD90000-0x000000006FDDB000-memory.dmp

    Filesize

    300KB