Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    08-12-2021 11:18

General

  • Target

    6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe

  • Size

    240KB

  • MD5

    5faef102f9fd8c2e41d6f04c23e6ed93

  • SHA1

    91184906c60fb314d8c6ad1c30d10ef5ade97c74

  • SHA256

    6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1

  • SHA512

    651e177817b6641e0e368ee64a5c9f6e04e50a156be075bce0b3dc260d5d9e3db0423a9b628fbd0473e30c9c8d7322e33d03685bd601148789218ec145b23f73

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

icedid

Campaign

3439131404

C2

grendafolz.com

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe
    "C:\Users\Admin\AppData\Local\Temp\6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3112
  • C:\Users\Admin\AppData\Local\Temp\FB44.exe
    C:\Users\Admin\AppData\Local\Temp\FB44.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2564
  • C:\Users\Admin\AppData\Local\Temp\1219.exe
    C:\Users\Admin\AppData\Local\Temp\1219.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1936
  • C:\Users\Admin\AppData\Local\Temp\3292.exe
    C:\Users\Admin\AppData\Local\Temp\3292.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1768
  • C:\Users\Admin\AppData\Roaming\bsuccsd
    C:\Users\Admin\AppData\Roaming\bsuccsd
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2008
  • C:\Users\Admin\AppData\Local\Temp\532B.exe
    C:\Users\Admin\AppData\Local\Temp\532B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\532B.exe
      C:\Users\Admin\AppData\Local\Temp\532B.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1384
  • C:\Users\Admin\AppData\Local\Temp\532B.exe
    C:\Users\Admin\AppData\Local\Temp\532B.exe
    1⤵
    • Executes dropped EXE
    PID:1524
  • C:\Users\Admin\AppData\Local\Temp\7F6C.exe
    C:\Users\Admin\AppData\Local\Temp\7F6C.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2340
  • C:\Users\Admin\AppData\Local\Temp\7F6C.exe
    C:\Users\Admin\AppData\Local\Temp\7F6C.exe start
    1⤵
    • Executes dropped EXE
    PID:3300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1219.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\1219.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\3292.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\3292.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\532B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\532B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\532B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\532B.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\7F6C.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\7F6C.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\7F6C.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\FB44.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\FB44.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Roaming\bsuccsd

    MD5

    5faef102f9fd8c2e41d6f04c23e6ed93

    SHA1

    91184906c60fb314d8c6ad1c30d10ef5ade97c74

    SHA256

    6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1

    SHA512

    651e177817b6641e0e368ee64a5c9f6e04e50a156be075bce0b3dc260d5d9e3db0423a9b628fbd0473e30c9c8d7322e33d03685bd601148789218ec145b23f73

  • C:\Users\Admin\AppData\Roaming\bsuccsd

    MD5

    5faef102f9fd8c2e41d6f04c23e6ed93

    SHA1

    91184906c60fb314d8c6ad1c30d10ef5ade97c74

    SHA256

    6bd0b5a4591a74e6d8997482bb18057b1b701a787aeb16f058d1a3113a6c3ca1

    SHA512

    651e177817b6641e0e368ee64a5c9f6e04e50a156be075bce0b3dc260d5d9e3db0423a9b628fbd0473e30c9c8d7322e33d03685bd601148789218ec145b23f73

  • memory/1384-200-0x0000000000000000-mapping.dmp

  • memory/1524-202-0x00007FF6B6300000-0x00007FF6B6309000-memory.dmp

    Filesize

    36KB

  • memory/1524-203-0x00007FF6B6301364-mapping.dmp

  • memory/1524-205-0x00007FF6B6300000-0x00007FF6B6309000-memory.dmp

    Filesize

    36KB

  • memory/1768-188-0x0000000070980000-0x00000000709CB000-memory.dmp

    Filesize

    300KB

  • memory/1768-168-0x0000000000B50000-0x0000000000BBC000-memory.dmp

    Filesize

    432KB

  • memory/1768-183-0x00000000770C0000-0x0000000077644000-memory.dmp

    Filesize

    5.5MB

  • memory/1768-174-0x0000000000B50000-0x0000000000B51000-memory.dmp

    Filesize

    4KB

  • memory/1768-178-0x0000000072730000-0x00000000727B0000-memory.dmp

    Filesize

    512KB

  • memory/1768-184-0x0000000002DE0000-0x0000000002E25000-memory.dmp

    Filesize

    276KB

  • memory/1768-186-0x0000000002F20000-0x0000000002F21000-memory.dmp

    Filesize

    4KB

  • memory/1768-165-0x0000000000000000-mapping.dmp

  • memory/1768-185-0x00000000758B0000-0x0000000076BF8000-memory.dmp

    Filesize

    19.3MB

  • memory/1768-173-0x0000000074B10000-0x0000000074C01000-memory.dmp

    Filesize

    964KB

  • memory/1768-172-0x00000000753E0000-0x00000000755A2000-memory.dmp

    Filesize

    1.8MB

  • memory/1768-170-0x0000000000C00000-0x0000000000C01000-memory.dmp

    Filesize

    4KB

  • memory/1936-142-0x0000000000000000-mapping.dmp

  • memory/1936-152-0x0000000004E00000-0x0000000005406000-memory.dmp

    Filesize

    6.0MB

  • memory/1936-145-0x0000000000610000-0x0000000000611000-memory.dmp

    Filesize

    4KB

  • memory/2008-191-0x0000000000400000-0x0000000002B75000-memory.dmp

    Filesize

    39.5MB

  • memory/2008-189-0x0000000002B80000-0x0000000002CCA000-memory.dmp

    Filesize

    1.3MB

  • memory/2008-190-0x0000000002B80000-0x0000000002CCA000-memory.dmp

    Filesize

    1.3MB

  • memory/2340-215-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/2340-213-0x0000000002B80000-0x0000000002CCA000-memory.dmp

    Filesize

    1.3MB

  • memory/2340-212-0x0000000002B80000-0x0000000002CCA000-memory.dmp

    Filesize

    1.3MB

  • memory/2340-209-0x0000000000000000-mapping.dmp

  • memory/2564-122-0x0000000000000000-mapping.dmp

  • memory/2564-128-0x0000000074B10000-0x0000000074C01000-memory.dmp

    Filesize

    964KB

  • memory/2564-140-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

    Filesize

    4KB

  • memory/2564-138-0x00000000758B0000-0x0000000076BF8000-memory.dmp

    Filesize

    19.3MB

  • memory/2564-139-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/2564-137-0x00000000770C0000-0x0000000077644000-memory.dmp

    Filesize

    5.5MB

  • memory/2564-136-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

    Filesize

    4KB

  • memory/2564-135-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

    Filesize

    4KB

  • memory/2564-134-0x0000000004D40000-0x0000000004D41000-memory.dmp

    Filesize

    4KB

  • memory/2564-133-0x00000000053C0000-0x00000000053C1000-memory.dmp

    Filesize

    4KB

  • memory/2564-153-0x00000000050E0000-0x00000000050E1000-memory.dmp

    Filesize

    4KB

  • memory/2564-154-0x0000000005200000-0x0000000005201000-memory.dmp

    Filesize

    4KB

  • memory/2564-161-0x00000000067A0000-0x00000000067A1000-memory.dmp

    Filesize

    4KB

  • memory/2564-157-0x0000000005CD0000-0x0000000005CD1000-memory.dmp

    Filesize

    4KB

  • memory/2564-132-0x0000000072730000-0x00000000727B0000-memory.dmp

    Filesize

    512KB

  • memory/2564-131-0x00000000006A0000-0x00000000006E5000-memory.dmp

    Filesize

    276KB

  • memory/2564-129-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

    Filesize

    4KB

  • memory/2564-141-0x0000000070980000-0x00000000709CB000-memory.dmp

    Filesize

    300KB

  • memory/2564-127-0x00000000753E0000-0x00000000755A2000-memory.dmp

    Filesize

    1.8MB

  • memory/2564-126-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2564-125-0x0000000000DB0000-0x0000000000E18000-memory.dmp

    Filesize

    416KB

  • memory/2564-163-0x0000000006EA0000-0x0000000006EA1000-memory.dmp

    Filesize

    4KB

  • memory/2564-156-0x00000000052A0000-0x00000000052A1000-memory.dmp

    Filesize

    4KB

  • memory/2564-155-0x0000000005ED0000-0x0000000005ED1000-memory.dmp

    Filesize

    4KB

  • memory/3064-121-0x0000000000F00000-0x0000000000F16000-memory.dmp

    Filesize

    88KB

  • memory/3064-208-0x00000000030C0000-0x00000000030D6000-memory.dmp

    Filesize

    88KB

  • memory/3112-120-0x0000000000400000-0x0000000002B75000-memory.dmp

    Filesize

    39.5MB

  • memory/3112-118-0x00000000001E0000-0x00000000001E8000-memory.dmp

    Filesize

    32KB

  • memory/3112-119-0x00000000001F0000-0x00000000001F9000-memory.dmp

    Filesize

    36KB

  • memory/3300-217-0x0000000002CB0000-0x0000000002CB5000-memory.dmp

    Filesize

    20KB

  • memory/3300-216-0x0000000002CA0000-0x0000000002CA6000-memory.dmp

    Filesize

    24KB

  • memory/3300-218-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/3724-197-0x0000000000000000-mapping.dmp