Analysis

  • max time kernel
    169s
  • max time network
    165s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    08-12-2021 14:18

General

  • Target

    90b477d2d26f07e17a71d0e17dbb706b.exe

  • Size

    213KB

  • MD5

    90b477d2d26f07e17a71d0e17dbb706b

  • SHA1

    5d2a4046cf3aad360ada50ab052e4cd702592722

  • SHA256

    eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed

  • SHA512

    625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

f797145799b7b1b77b35d81de942eee0908da519

Attributes
  • url4cnc

    http://91.219.236.27/capibar

    http://94.158.245.167/capibar

    http://185.163.204.216/capibar

    http://185.225.19.238/capibar

    http://185.163.204.218/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

fd4f23250443a724a3d1548e6ab07c481dfc2814

Attributes
  • url4cnc

    http://91.219.236.27/duglassa1

    http://94.158.245.167/duglassa1

    http://185.163.204.216/duglassa1

    http://185.225.19.238/duglassa1

    http://185.163.204.218/duglassa1

    https://t.me/duglassa1

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe
    "C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe
      "C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4252
  • C:\Users\Admin\AppData\Local\Temp\E849.exe
    C:\Users\Admin\AppData\Local\Temp\E849.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\E849.exe
      C:\Users\Admin\AppData\Local\Temp\E849.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4460
  • C:\Users\Admin\AppData\Local\Temp\78A.exe
    C:\Users\Admin\AppData\Local\Temp\78A.exe
    1⤵
    • Executes dropped EXE
    PID:500
  • C:\Users\Admin\AppData\Local\Temp\CAB.exe
    C:\Users\Admin\AppData\Local\Temp\CAB.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:352
  • C:\Users\Admin\AppData\Local\Temp\62EA.exe
    C:\Users\Admin\AppData\Local\Temp\62EA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2636
  • C:\Users\Admin\AppData\Local\Temp\7C5F.exe
    C:\Users\Admin\AppData\Local\Temp\7C5F.exe
    1⤵
    • Executes dropped EXE
    PID:4328
  • C:\Users\Admin\AppData\Local\Temp\97A8.exe
    C:\Users\Admin\AppData\Local\Temp\97A8.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1348

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\62EA.exe
    MD5

    c910c28e370e3e16c2a27e7acf65ea9a

    SHA1

    a25693d3842385bcde757b070e78973e43f37526

    SHA256

    5dc8f665251e67cf8f784e537df31894f9106d7dbdb72f35ce53b2c3ad357f0d

    SHA512

    624d164eda0b6f9a1c309539bc128c5b560c0a0013176eb4d9333055654cfa4243b2211c0b5ac3bf666036a1fdcc7c3e2999abb0e8ad3a6809bf4d2ddeaee230

  • C:\Users\Admin\AppData\Local\Temp\62EA.exe
    MD5

    c910c28e370e3e16c2a27e7acf65ea9a

    SHA1

    a25693d3842385bcde757b070e78973e43f37526

    SHA256

    5dc8f665251e67cf8f784e537df31894f9106d7dbdb72f35ce53b2c3ad357f0d

    SHA512

    624d164eda0b6f9a1c309539bc128c5b560c0a0013176eb4d9333055654cfa4243b2211c0b5ac3bf666036a1fdcc7c3e2999abb0e8ad3a6809bf4d2ddeaee230

  • C:\Users\Admin\AppData\Local\Temp\78A.exe
    MD5

    bce50d5b17bb88f22f0000511026520d

    SHA1

    599aaed4ee72ec0e0fc4cada844a1c210e332961

    SHA256

    77e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455

    SHA512

    c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536

  • C:\Users\Admin\AppData\Local\Temp\78A.exe
    MD5

    bce50d5b17bb88f22f0000511026520d

    SHA1

    599aaed4ee72ec0e0fc4cada844a1c210e332961

    SHA256

    77e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455

    SHA512

    c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536

  • C:\Users\Admin\AppData\Local\Temp\7C5F.exe
    MD5

    82647c7fd8bfcebe57a46f009285e030

    SHA1

    d602af33f0bb33493b0d3530ee9369b5cfe2df0a

    SHA256

    eefc11d7652518188e5cec696e4e45f774acc45b4d158cba71eb5a8cfe392736

    SHA512

    3c956fca15a15ef0e4804f51de7aa1cd2dbd829340558378350defbb2924986c72cce4af54b126e078d09d9acbe4bb435f1160944523f8fb6dbf871cbf546fa9

  • C:\Users\Admin\AppData\Local\Temp\7C5F.exe
    MD5

    82647c7fd8bfcebe57a46f009285e030

    SHA1

    d602af33f0bb33493b0d3530ee9369b5cfe2df0a

    SHA256

    eefc11d7652518188e5cec696e4e45f774acc45b4d158cba71eb5a8cfe392736

    SHA512

    3c956fca15a15ef0e4804f51de7aa1cd2dbd829340558378350defbb2924986c72cce4af54b126e078d09d9acbe4bb435f1160944523f8fb6dbf871cbf546fa9

  • C:\Users\Admin\AppData\Local\Temp\97A8.exe
    MD5

    64b2cfe0f18217540ae8dc5745789aad

    SHA1

    42971b008f9725fa0b327535f91b84066ab6628a

    SHA256

    4f8c42ee1bd0fd0b402f417446088606e87cb4d7a921447306ae4bb0259aeebb

    SHA512

    986783d6af653e098b9c7fad665cd2d18c5599913670125a74209206ab723937d26f6f0af33e8ec3c3062f4d87ec0ee9cfbf9690c378bfdabd92bab67939fa3c

  • C:\Users\Admin\AppData\Local\Temp\97A8.exe
    MD5

    64b2cfe0f18217540ae8dc5745789aad

    SHA1

    42971b008f9725fa0b327535f91b84066ab6628a

    SHA256

    4f8c42ee1bd0fd0b402f417446088606e87cb4d7a921447306ae4bb0259aeebb

    SHA512

    986783d6af653e098b9c7fad665cd2d18c5599913670125a74209206ab723937d26f6f0af33e8ec3c3062f4d87ec0ee9cfbf9690c378bfdabd92bab67939fa3c

  • C:\Users\Admin\AppData\Local\Temp\CAB.exe
    MD5

    0cefed061e2a2241ecd302d7790a2f80

    SHA1

    5f119195af2db118c5fbac21634bea00f5d5b8da

    SHA256

    014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

    SHA512

    7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

  • C:\Users\Admin\AppData\Local\Temp\CAB.exe
    MD5

    0cefed061e2a2241ecd302d7790a2f80

    SHA1

    5f119195af2db118c5fbac21634bea00f5d5b8da

    SHA256

    014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

    SHA512

    7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

  • C:\Users\Admin\AppData\Local\Temp\E849.exe
    MD5

    90b477d2d26f07e17a71d0e17dbb706b

    SHA1

    5d2a4046cf3aad360ada50ab052e4cd702592722

    SHA256

    eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed

    SHA512

    625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131

  • C:\Users\Admin\AppData\Local\Temp\E849.exe
    MD5

    90b477d2d26f07e17a71d0e17dbb706b

    SHA1

    5d2a4046cf3aad360ada50ab052e4cd702592722

    SHA256

    eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed

    SHA512

    625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131

  • C:\Users\Admin\AppData\Local\Temp\E849.exe
    MD5

    90b477d2d26f07e17a71d0e17dbb706b

    SHA1

    5d2a4046cf3aad360ada50ab052e4cd702592722

    SHA256

    eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed

    SHA512

    625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131

  • memory/352-160-0x00000000066B0000-0x00000000066B1000-memory.dmp
    Filesize

    4KB

  • memory/352-154-0x0000000074730000-0x0000000074CB4000-memory.dmp
    Filesize

    5.5MB

  • memory/352-164-0x00000000079E0000-0x00000000079E1000-memory.dmp
    Filesize

    4KB

  • memory/352-135-0x0000000000000000-mapping.dmp
  • memory/352-163-0x00000000072E0000-0x00000000072E1000-memory.dmp
    Filesize

    4KB

  • memory/352-162-0x0000000006970000-0x0000000006971000-memory.dmp
    Filesize

    4KB

  • memory/352-138-0x0000000000050000-0x00000000000B9000-memory.dmp
    Filesize

    420KB

  • memory/352-139-0x00000000012D0000-0x00000000012D1000-memory.dmp
    Filesize

    4KB

  • memory/352-140-0x0000000076C40000-0x0000000076E02000-memory.dmp
    Filesize

    1.8MB

  • memory/352-161-0x00000000067D0000-0x00000000067D1000-memory.dmp
    Filesize

    4KB

  • memory/352-159-0x0000000005C20000-0x0000000005C21000-memory.dmp
    Filesize

    4KB

  • memory/352-144-0x0000000002E50000-0x0000000002E95000-memory.dmp
    Filesize

    276KB

  • memory/352-158-0x00000000069F0000-0x00000000069F1000-memory.dmp
    Filesize

    4KB

  • memory/352-145-0x0000000076660000-0x0000000076751000-memory.dmp
    Filesize

    964KB

  • memory/352-146-0x0000000000050000-0x0000000000051000-memory.dmp
    Filesize

    4KB

  • memory/352-148-0x0000000071570000-0x00000000715F0000-memory.dmp
    Filesize

    512KB

  • memory/352-149-0x0000000005EE0000-0x0000000005EE1000-memory.dmp
    Filesize

    4KB

  • memory/352-150-0x0000000005860000-0x0000000005861000-memory.dmp
    Filesize

    4KB

  • memory/352-151-0x00000000059E0000-0x00000000059E1000-memory.dmp
    Filesize

    4KB

  • memory/352-152-0x00000000058D0000-0x00000000058D1000-memory.dmp
    Filesize

    4KB

  • memory/352-153-0x00000000058C0000-0x00000000058C1000-memory.dmp
    Filesize

    4KB

  • memory/352-157-0x000000006F7E0000-0x000000006F82B000-memory.dmp
    Filesize

    300KB

  • memory/352-155-0x0000000075310000-0x0000000076658000-memory.dmp
    Filesize

    19.3MB

  • memory/352-156-0x0000000005910000-0x0000000005911000-memory.dmp
    Filesize

    4KB

  • memory/396-143-0x00000000021E0000-0x00000000021F6000-memory.dmp
    Filesize

    88KB

  • memory/396-122-0x00000000003C0000-0x00000000003D6000-memory.dmp
    Filesize

    88KB

  • memory/500-134-0x00000000006E8000-0x0000000000737000-memory.dmp
    Filesize

    316KB

  • memory/500-142-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/500-131-0x0000000000000000-mapping.dmp
  • memory/500-141-0x0000000000540000-0x000000000068A000-memory.dmp
    Filesize

    1.3MB

  • memory/1348-215-0x0000000074730000-0x0000000074CB4000-memory.dmp
    Filesize

    5.5MB

  • memory/1348-218-0x000000006F960000-0x000000006F9AB000-memory.dmp
    Filesize

    300KB

  • memory/1348-216-0x0000000075310000-0x0000000076658000-memory.dmp
    Filesize

    19.3MB

  • memory/1348-214-0x0000000005860000-0x0000000005861000-memory.dmp
    Filesize

    4KB

  • memory/1348-208-0x00000000716F0000-0x0000000071770000-memory.dmp
    Filesize

    512KB

  • memory/1348-206-0x00000000002B0000-0x00000000002B1000-memory.dmp
    Filesize

    4KB

  • memory/1348-205-0x0000000076660000-0x0000000076751000-memory.dmp
    Filesize

    964KB

  • memory/1348-204-0x0000000076C40000-0x0000000076E02000-memory.dmp
    Filesize

    1.8MB

  • memory/1348-203-0x0000000000DF0000-0x0000000000DF1000-memory.dmp
    Filesize

    4KB

  • memory/1348-202-0x00000000002B0000-0x0000000000384000-memory.dmp
    Filesize

    848KB

  • memory/1348-199-0x0000000000000000-mapping.dmp
  • memory/1348-213-0x0000000001210000-0x000000000135A000-memory.dmp
    Filesize

    1.3MB

  • memory/2636-195-0x00000000072C0000-0x00000000072C1000-memory.dmp
    Filesize

    4KB

  • memory/2636-168-0x0000000000F30000-0x0000000001006000-memory.dmp
    Filesize

    856KB

  • memory/2636-181-0x0000000075310000-0x0000000076658000-memory.dmp
    Filesize

    19.3MB

  • memory/2636-184-0x000000006F960000-0x000000006F9AB000-memory.dmp
    Filesize

    300KB

  • memory/2636-183-0x00000000059B0000-0x00000000059B1000-memory.dmp
    Filesize

    4KB

  • memory/2636-165-0x0000000000000000-mapping.dmp
  • memory/2636-180-0x0000000074730000-0x0000000074CB4000-memory.dmp
    Filesize

    5.5MB

  • memory/2636-182-0x00000000059A0000-0x00000000059A1000-memory.dmp
    Filesize

    4KB

  • memory/2636-179-0x0000000002E90000-0x0000000002ED6000-memory.dmp
    Filesize

    280KB

  • memory/2636-169-0x00000000011F0000-0x00000000011F1000-memory.dmp
    Filesize

    4KB

  • memory/2636-170-0x0000000076C40000-0x0000000076E02000-memory.dmp
    Filesize

    1.8MB

  • memory/2636-172-0x0000000000F30000-0x0000000000F31000-memory.dmp
    Filesize

    4KB

  • memory/2636-171-0x0000000076660000-0x0000000076751000-memory.dmp
    Filesize

    964KB

  • memory/2636-174-0x00000000716F0000-0x0000000071770000-memory.dmp
    Filesize

    512KB

  • memory/2716-123-0x0000000000000000-mapping.dmp
  • memory/2716-129-0x0000000002B70000-0x0000000002CBA000-memory.dmp
    Filesize

    1.3MB

  • memory/2716-130-0x0000000002B70000-0x0000000002CBA000-memory.dmp
    Filesize

    1.3MB

  • memory/3644-121-0x00000000001F0000-0x00000000001F9000-memory.dmp
    Filesize

    36KB

  • memory/3644-120-0x00000000001D0000-0x00000000001D9000-memory.dmp
    Filesize

    36KB

  • memory/4252-119-0x0000000000402F47-mapping.dmp
  • memory/4252-118-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/4328-198-0x0000000000400000-0x0000000002BBC000-memory.dmp
    Filesize

    39.7MB

  • memory/4328-197-0x0000000002E60000-0x0000000002EEF000-memory.dmp
    Filesize

    572KB

  • memory/4328-196-0x0000000002BC0000-0x0000000002D0A000-memory.dmp
    Filesize

    1.3MB

  • memory/4328-185-0x0000000000000000-mapping.dmp
  • memory/4460-127-0x0000000000402F47-mapping.dmp