Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-12-2021 11:18
Static task
static1
Behavioral task
behavioral1
Sample
6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe
Resource
win10-en-20211104
General
-
Target
6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe
-
Size
240KB
-
MD5
5faef102f9fd8c2e41d6f04c23e6ed93
-
SHA1
91184906c60fb314d8c6ad1c30d10ef5ade97c74
-
SHA256
6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1
-
SHA512
651e177817b6641e0e368ee64a5c9f6e04e50a156be075bce0b3dc260d5d9e3db0423a9b628fbd0473e30c9c8d7322e33d03685bd601148789218ec145b23f73
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
icedid
3439131404
grendafolz.com
Extracted
systembc
185.209.30.180:4001
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2564-125-0x0000000000DB0000-0x0000000000E18000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1219.exe family_redline C:\Users\Admin\AppData\Local\Temp\1219.exe family_redline behavioral1/memory/1768-168-0x0000000000B50000-0x0000000000BBC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
FB44.exe1219.exe3292.exebsuccsd532B.exe532B.exe532B.exe7F6C.exe7F6C.exepid process 2564 FB44.exe 1936 1219.exe 1768 3292.exe 2008 bsuccsd 3724 532B.exe 1384 532B.exe 1524 532B.exe 2340 7F6C.exe 3300 7F6C.exe -
Deletes itself 1 IoCs
Processes:
pid process 3064 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
FB44.exe3292.exepid process 2564 FB44.exe 1768 3292.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
532B.exedescription pid process target process PID 1384 set thread context of 1524 1384 532B.exe 532B.exe -
Drops file in Windows directory 2 IoCs
Processes:
7F6C.exedescription ioc process File created C:\Windows\Tasks\wow64.job 7F6C.exe File opened for modification C:\Windows\Tasks\wow64.job 7F6C.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exebsuccsddescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bsuccsd Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bsuccsd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bsuccsd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exepid process 3112 6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe 3112 6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3064 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exebsuccsdpid process 3112 6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe 2008 bsuccsd -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
FB44.exe3292.exe1219.exedescription pid process Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeDebugPrivilege 2564 FB44.exe Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeDebugPrivilege 1768 3292.exe Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeDebugPrivilege 1936 1219.exe Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
532B.exe532B.exedescription pid process target process PID 3064 wrote to memory of 2564 3064 FB44.exe PID 3064 wrote to memory of 2564 3064 FB44.exe PID 3064 wrote to memory of 2564 3064 FB44.exe PID 3064 wrote to memory of 1936 3064 1219.exe PID 3064 wrote to memory of 1936 3064 1219.exe PID 3064 wrote to memory of 1936 3064 1219.exe PID 3064 wrote to memory of 1768 3064 3292.exe PID 3064 wrote to memory of 1768 3064 3292.exe PID 3064 wrote to memory of 1768 3064 3292.exe PID 3064 wrote to memory of 3724 3064 532B.exe PID 3064 wrote to memory of 3724 3064 532B.exe PID 3724 wrote to memory of 1384 3724 532B.exe 532B.exe PID 3724 wrote to memory of 1384 3724 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 1384 wrote to memory of 1524 1384 532B.exe 532B.exe PID 3064 wrote to memory of 2340 3064 7F6C.exe PID 3064 wrote to memory of 2340 3064 7F6C.exe PID 3064 wrote to memory of 2340 3064 7F6C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe"C:\Users\Admin\AppData\Local\Temp\6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3112
-
C:\Users\Admin\AppData\Local\Temp\FB44.exeC:\Users\Admin\AppData\Local\Temp\FB44.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
C:\Users\Admin\AppData\Local\Temp\1219.exeC:\Users\Admin\AppData\Local\Temp\1219.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3292.exeC:\Users\Admin\AppData\Local\Temp\3292.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
C:\Users\Admin\AppData\Roaming\bsuccsdC:\Users\Admin\AppData\Roaming\bsuccsd1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2008
-
C:\Users\Admin\AppData\Local\Temp\532B.exeC:\Users\Admin\AppData\Local\Temp\532B.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\532B.exeC:\Users\Admin\AppData\Local\Temp\532B.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\532B.exeC:\Users\Admin\AppData\Local\Temp\532B.exe1⤵
- Executes dropped EXE
PID:1524
-
C:\Users\Admin\AppData\Local\Temp\7F6C.exeC:\Users\Admin\AppData\Local\Temp\7F6C.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2340
-
C:\Users\Admin\AppData\Local\Temp\7F6C.exeC:\Users\Admin\AppData\Local\Temp\7F6C.exe start1⤵
- Executes dropped EXE
PID:3300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
5faef102f9fd8c2e41d6f04c23e6ed93
SHA191184906c60fb314d8c6ad1c30d10ef5ade97c74
SHA2566bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1
SHA512651e177817b6641e0e368ee64a5c9f6e04e50a156be075bce0b3dc260d5d9e3db0423a9b628fbd0473e30c9c8d7322e33d03685bd601148789218ec145b23f73
-
MD5
5faef102f9fd8c2e41d6f04c23e6ed93
SHA191184906c60fb314d8c6ad1c30d10ef5ade97c74
SHA2566bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1
SHA512651e177817b6641e0e368ee64a5c9f6e04e50a156be075bce0b3dc260d5d9e3db0423a9b628fbd0473e30c9c8d7322e33d03685bd601148789218ec145b23f73