Analysis

  • max time kernel
    152s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    08-12-2021 16:02

General

  • Target

    262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe

  • Size

    233KB

  • MD5

    f635c7c48d839c8a989053cc382163b4

  • SHA1

    b8f108ff865289d306540e4abe1b8a2d90d38698

  • SHA256

    262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470

  • SHA512

    8343c02aea608e5dd7893e619b9c986567f0d0ab802812ac557358e826a2492234e8a54465aa7ddee13d48fb23c61fa68365cdbd277f7238600a9eec70f9d747

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

icedid

Campaign

3439131404

C2

grendafolz.com

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe
    "C:\Users\Admin\AppData\Local\Temp\262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2476
  • C:\Users\Admin\AppData\Local\Temp\42C2.exe
    C:\Users\Admin\AppData\Local\Temp\42C2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:3748
  • C:\Users\Admin\AppData\Local\Temp\463D.exe
    C:\Users\Admin\AppData\Local\Temp\463D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Users\Admin\AppData\Local\Temp\Piton.exe
      "C:\Users\Admin\AppData\Local\Temp\Piton.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\Piton.exe
        C:\Users\Admin\AppData\Local\Temp\Piton.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3152
    • C:\Users\Admin\AppData\Local\Temp\Muscologic.exe
      "C:\Users\Admin\AppData\Local\Temp\Muscologic.exe"
      2⤵
      • Executes dropped EXE
      PID:1124
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1124 -s 1608
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2412
  • C:\Users\Admin\AppData\Local\Temp\5254.exe
    C:\Users\Admin\AppData\Local\Temp\5254.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:2024
  • C:\Users\Admin\AppData\Local\Temp\58CD.exe
    C:\Users\Admin\AppData\Local\Temp\58CD.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Users\Admin\AppData\Local\Temp\58CD.exe
      C:\Users\Admin\AppData\Local\Temp\58CD.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\58CD.exe
        C:\Users\Admin\AppData\Local\Temp\58CD.exe
        3⤵
        • Executes dropped EXE
        PID:3260
  • C:\Users\Admin\AppData\Local\Temp\663C.exe
    C:\Users\Admin\AppData\Local\Temp\663C.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1768
  • C:\Users\Admin\AppData\Local\Temp\663C.exe
    C:\Users\Admin\AppData\Local\Temp\663C.exe start
    1⤵
    • Executes dropped EXE
    PID:3828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Piton.exe.log

    MD5

    41fbed686f5700fc29aaccf83e8ba7fd

    SHA1

    5271bc29538f11e42a3b600c8dc727186e912456

    SHA256

    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

    SHA512

    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

  • C:\Users\Admin\AppData\Local\Temp\42C2.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\42C2.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\463D.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\463D.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\5254.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\5254.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\58CD.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\58CD.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\58CD.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\58CD.exe

    MD5

    7ade34e7d74c83cee4c8f288c90128d5

    SHA1

    13a4bf57f5777cdd9bfb0d9568392e39d3073ed0

    SHA256

    032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad

    SHA512

    d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69

  • C:\Users\Admin\AppData\Local\Temp\663C.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\663C.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\663C.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\Muscologic.exe

    MD5

    a75fdbafa5c317e5af007a6f00131213

    SHA1

    b3989a799e6ad22f6115a30a9d8c797ef31d751c

    SHA256

    16b73591b271b75c36cabd9a48d7970eb0a44559f061835578a98408423712c9

    SHA512

    cb3c61dcf12501c5d21ffd39622c4480fdd94d882e07d495339bf6d048ba60e425eb4a94c72c8416ac0bb846f4dff19a7464a538d27da559249d66a65215f6c4

  • C:\Users\Admin\AppData\Local\Temp\Muscologic.exe

    MD5

    a75fdbafa5c317e5af007a6f00131213

    SHA1

    b3989a799e6ad22f6115a30a9d8c797ef31d751c

    SHA256

    16b73591b271b75c36cabd9a48d7970eb0a44559f061835578a98408423712c9

    SHA512

    cb3c61dcf12501c5d21ffd39622c4480fdd94d882e07d495339bf6d048ba60e425eb4a94c72c8416ac0bb846f4dff19a7464a538d27da559249d66a65215f6c4

  • C:\Users\Admin\AppData\Local\Temp\Piton.exe

    MD5

    dc437d64e85e97dbd6f38c9a6b3f3ac5

    SHA1

    a99516c79ccf74e535e9ec20270a930662ca48bf

    SHA256

    dbeb81421fc7ded7772e726af95c0d063a64809ed19e1f146960ef3d98ca4e35

    SHA512

    ef5ae14105d722412cf4fcf8e094f6f57816cff34e6be70982f4aa848a9719713d4c83b50ff41d4a60ddaf622eef79e0bc8952cef0e95aaff0c92f366e2e8aa8

  • C:\Users\Admin\AppData\Local\Temp\Piton.exe

    MD5

    dc437d64e85e97dbd6f38c9a6b3f3ac5

    SHA1

    a99516c79ccf74e535e9ec20270a930662ca48bf

    SHA256

    dbeb81421fc7ded7772e726af95c0d063a64809ed19e1f146960ef3d98ca4e35

    SHA512

    ef5ae14105d722412cf4fcf8e094f6f57816cff34e6be70982f4aa848a9719713d4c83b50ff41d4a60ddaf622eef79e0bc8952cef0e95aaff0c92f366e2e8aa8

  • C:\Users\Admin\AppData\Local\Temp\Piton.exe

    MD5

    dc437d64e85e97dbd6f38c9a6b3f3ac5

    SHA1

    a99516c79ccf74e535e9ec20270a930662ca48bf

    SHA256

    dbeb81421fc7ded7772e726af95c0d063a64809ed19e1f146960ef3d98ca4e35

    SHA512

    ef5ae14105d722412cf4fcf8e094f6f57816cff34e6be70982f4aa848a9719713d4c83b50ff41d4a60ddaf622eef79e0bc8952cef0e95aaff0c92f366e2e8aa8

  • memory/1124-217-0x0000000000000000-mapping.dmp

  • memory/1768-206-0x0000000002C60000-0x0000000002C66000-memory.dmp

    Filesize

    24KB

  • memory/1768-207-0x0000000002C70000-0x0000000002C75000-memory.dmp

    Filesize

    20KB

  • memory/1768-208-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/1768-190-0x0000000000000000-mapping.dmp

  • memory/2024-162-0x0000000071EC0000-0x0000000071F40000-memory.dmp

    Filesize

    512KB

  • memory/2024-167-0x0000000000AA0000-0x0000000000AE5000-memory.dmp

    Filesize

    276KB

  • memory/2024-172-0x0000000070070000-0x00000000700BB000-memory.dmp

    Filesize

    300KB

  • memory/2024-170-0x00000000754F0000-0x0000000076838000-memory.dmp

    Filesize

    19.3MB

  • memory/2024-153-0x0000000000000000-mapping.dmp

  • memory/2024-169-0x0000000005040000-0x0000000005041000-memory.dmp

    Filesize

    4KB

  • memory/2024-168-0x0000000076900000-0x0000000076E84000-memory.dmp

    Filesize

    5.5MB

  • memory/2024-156-0x0000000000890000-0x00000000008FC000-memory.dmp

    Filesize

    432KB

  • memory/2024-157-0x0000000000910000-0x0000000000911000-memory.dmp

    Filesize

    4KB

  • memory/2024-159-0x00000000750F0000-0x00000000751E1000-memory.dmp

    Filesize

    964KB

  • memory/2024-158-0x0000000074120000-0x00000000742E2000-memory.dmp

    Filesize

    1.8MB

  • memory/2024-160-0x0000000000890000-0x0000000000891000-memory.dmp

    Filesize

    4KB

  • memory/2084-121-0x0000000000950000-0x0000000000966000-memory.dmp

    Filesize

    88KB

  • memory/2476-119-0x00000000001C0000-0x00000000001C9000-memory.dmp

    Filesize

    36KB

  • memory/2476-118-0x0000000000030000-0x0000000000038000-memory.dmp

    Filesize

    32KB

  • memory/2476-120-0x0000000000400000-0x000000000082C000-memory.dmp

    Filesize

    4.2MB

  • memory/2760-173-0x0000000000000000-mapping.dmp

  • memory/3152-224-0x0000000000418F12-mapping.dmp

  • memory/3152-234-0x0000000005450000-0x0000000005A56000-memory.dmp

    Filesize

    6.0MB

  • memory/3228-187-0x0000000007080000-0x0000000007081000-memory.dmp

    Filesize

    4KB

  • memory/3228-185-0x0000000005B80000-0x0000000005B81000-memory.dmp

    Filesize

    4KB

  • memory/3228-134-0x0000000000000000-mapping.dmp

  • memory/3228-147-0x0000000005650000-0x0000000005651000-memory.dmp

    Filesize

    4KB

  • memory/3228-188-0x0000000007780000-0x0000000007781000-memory.dmp

    Filesize

    4KB

  • memory/3228-137-0x0000000000E00000-0x0000000000E01000-memory.dmp

    Filesize

    4KB

  • memory/3228-149-0x0000000005650000-0x0000000005C56000-memory.dmp

    Filesize

    6.0MB

  • memory/3228-186-0x0000000006370000-0x0000000006371000-memory.dmp

    Filesize

    4KB

  • memory/3228-182-0x00000000059C0000-0x00000000059C1000-memory.dmp

    Filesize

    4KB

  • memory/3228-183-0x0000000005AE0000-0x0000000005AE1000-memory.dmp

    Filesize

    4KB

  • memory/3228-184-0x0000000006770000-0x0000000006771000-memory.dmp

    Filesize

    4KB

  • memory/3244-214-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

    Filesize

    4KB

  • memory/3244-220-0x0000000005560000-0x0000000005561000-memory.dmp

    Filesize

    4KB

  • memory/3244-211-0x0000000000000000-mapping.dmp

  • memory/3244-221-0x0000000001700000-0x0000000001701000-memory.dmp

    Filesize

    4KB

  • memory/3260-181-0x00007FF7EDE70000-0x00007FF7EDE79000-memory.dmp

    Filesize

    36KB

  • memory/3260-178-0x00007FF7EDE70000-0x00007FF7EDE79000-memory.dmp

    Filesize

    36KB

  • memory/3260-179-0x00007FF7EDE71364-mapping.dmp

  • memory/3748-144-0x0000000005240000-0x0000000005241000-memory.dmp

    Filesize

    4KB

  • memory/3748-130-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/3748-142-0x0000000005310000-0x0000000005311000-memory.dmp

    Filesize

    4KB

  • memory/3748-122-0x0000000000000000-mapping.dmp

  • memory/3748-125-0x00000000003F0000-0x0000000000458000-memory.dmp

    Filesize

    416KB

  • memory/3748-148-0x00000000051F0000-0x00000000051F1000-memory.dmp

    Filesize

    4KB

  • memory/3748-133-0x0000000005810000-0x0000000005811000-memory.dmp

    Filesize

    4KB

  • memory/3748-132-0x0000000071EC0000-0x0000000071F40000-memory.dmp

    Filesize

    512KB

  • memory/3748-146-0x0000000076900000-0x0000000076E84000-memory.dmp

    Filesize

    5.5MB

  • memory/3748-139-0x00000000051C0000-0x00000000051C1000-memory.dmp

    Filesize

    4KB

  • memory/3748-129-0x00000000750F0000-0x00000000751E1000-memory.dmp

    Filesize

    964KB

  • memory/3748-150-0x00000000754F0000-0x0000000076838000-memory.dmp

    Filesize

    19.3MB

  • memory/3748-152-0x0000000070070000-0x00000000700BB000-memory.dmp

    Filesize

    300KB

  • memory/3748-128-0x0000000002770000-0x00000000027B5000-memory.dmp

    Filesize

    276KB

  • memory/3748-127-0x0000000074120000-0x00000000742E2000-memory.dmp

    Filesize

    1.8MB

  • memory/3748-126-0x0000000000C40000-0x0000000000C41000-memory.dmp

    Filesize

    4KB

  • memory/3828-210-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/4044-176-0x0000000000000000-mapping.dmp