Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
08-12-2021 16:02
Static task
static1
Behavioral task
behavioral1
Sample
262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe
Resource
win10-en-20211208
General
-
Target
262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe
-
Size
233KB
-
MD5
f635c7c48d839c8a989053cc382163b4
-
SHA1
b8f108ff865289d306540e4abe1b8a2d90d38698
-
SHA256
262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470
-
SHA512
8343c02aea608e5dd7893e619b9c986567f0d0ab802812ac557358e826a2492234e8a54465aa7ddee13d48fb23c61fa68365cdbd277f7238600a9eec70f9d747
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
icedid
3439131404
grendafolz.com
Extracted
systembc
185.209.30.180:4001
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3748-125-0x00000000003F0000-0x0000000000458000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\463D.exe family_redline C:\Users\Admin\AppData\Local\Temp\463D.exe family_redline behavioral1/memory/2024-156-0x0000000000890000-0x00000000008FC000-memory.dmp family_redline behavioral1/memory/3152-224-0x0000000000418F12-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
Processes:
42C2.exe463D.exe5254.exe58CD.exe58CD.exe58CD.exe663C.exe663C.exePiton.exeMuscologic.exePiton.exepid process 3748 42C2.exe 3228 463D.exe 2024 5254.exe 2760 58CD.exe 4044 58CD.exe 3260 58CD.exe 1768 663C.exe 3828 663C.exe 3244 Piton.exe 1124 Muscologic.exe 3152 Piton.exe -
Deletes itself 1 IoCs
Processes:
pid process 2084 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
42C2.exe5254.exepid process 3748 42C2.exe 2024 5254.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
58CD.exePiton.exedescription pid process target process PID 4044 set thread context of 3260 4044 58CD.exe 58CD.exe PID 3244 set thread context of 3152 3244 Piton.exe Piton.exe -
Drops file in Windows directory 2 IoCs
Processes:
663C.exedescription ioc process File created C:\Windows\Tasks\wow64.job 663C.exe File opened for modification C:\Windows\Tasks\wow64.job 663C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2412 1124 WerFault.exe Muscologic.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exepid process 2476 262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe 2476 262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2084 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exepid process 2476 262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
42C2.exe5254.exe463D.exePiton.exePiton.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeDebugPrivilege 3748 42C2.exe Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeDebugPrivilege 2024 5254.exe Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeDebugPrivilege 3228 463D.exe Token: SeDebugPrivilege 3244 Piton.exe Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeDebugPrivilege 3152 Piton.exe Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeDebugPrivilege 2412 WerFault.exe Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 Token: SeShutdownPrivilege 2084 Token: SeCreatePagefilePrivilege 2084 -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
58CD.exe58CD.exe463D.exePiton.exedescription pid process target process PID 2084 wrote to memory of 3748 2084 42C2.exe PID 2084 wrote to memory of 3748 2084 42C2.exe PID 2084 wrote to memory of 3748 2084 42C2.exe PID 2084 wrote to memory of 3228 2084 463D.exe PID 2084 wrote to memory of 3228 2084 463D.exe PID 2084 wrote to memory of 3228 2084 463D.exe PID 2084 wrote to memory of 2024 2084 5254.exe PID 2084 wrote to memory of 2024 2084 5254.exe PID 2084 wrote to memory of 2024 2084 5254.exe PID 2084 wrote to memory of 2760 2084 58CD.exe PID 2084 wrote to memory of 2760 2084 58CD.exe PID 2760 wrote to memory of 4044 2760 58CD.exe 58CD.exe PID 2760 wrote to memory of 4044 2760 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 4044 wrote to memory of 3260 4044 58CD.exe 58CD.exe PID 2084 wrote to memory of 1768 2084 663C.exe PID 2084 wrote to memory of 1768 2084 663C.exe PID 2084 wrote to memory of 1768 2084 663C.exe PID 3228 wrote to memory of 3244 3228 463D.exe Piton.exe PID 3228 wrote to memory of 3244 3228 463D.exe Piton.exe PID 3228 wrote to memory of 3244 3228 463D.exe Piton.exe PID 3228 wrote to memory of 1124 3228 463D.exe Muscologic.exe PID 3228 wrote to memory of 1124 3228 463D.exe Muscologic.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe PID 3244 wrote to memory of 3152 3244 Piton.exe Piton.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe"C:\Users\Admin\AppData\Local\Temp\262a878b863958a98be05431eab178a3aff629e0e4f90fb65a2595688099d470.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2476
-
C:\Users\Admin\AppData\Local\Temp\42C2.exeC:\Users\Admin\AppData\Local\Temp\42C2.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
C:\Users\Admin\AppData\Local\Temp\463D.exeC:\Users\Admin\AppData\Local\Temp\463D.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Piton.exe"C:\Users\Admin\AppData\Local\Temp\Piton.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\Piton.exeC:\Users\Admin\AppData\Local\Temp\Piton.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Muscologic.exe"C:\Users\Admin\AppData\Local\Temp\Muscologic.exe"2⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1124 -s 16083⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\5254.exeC:\Users\Admin\AppData\Local\Temp\5254.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
C:\Users\Admin\AppData\Local\Temp\58CD.exeC:\Users\Admin\AppData\Local\Temp\58CD.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\58CD.exeC:\Users\Admin\AppData\Local\Temp\58CD.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\58CD.exeC:\Users\Admin\AppData\Local\Temp\58CD.exe3⤵
- Executes dropped EXE
PID:3260
-
-
-
C:\Users\Admin\AppData\Local\Temp\663C.exeC:\Users\Admin\AppData\Local\Temp\663C.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1768
-
C:\Users\Admin\AppData\Local\Temp\663C.exeC:\Users\Admin\AppData\Local\Temp\663C.exe start1⤵
- Executes dropped EXE
PID:3828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
7ade34e7d74c83cee4c8f288c90128d5
SHA113a4bf57f5777cdd9bfb0d9568392e39d3073ed0
SHA256032bf53a2f8d5b6b4512505a44e67c7c1e80f3f8b063cc78d13f2c78c5fb9bad
SHA512d65732c04d81bb5e947d9ff43bf40dc911659919bd662d24795ddddfcabe91135c71d7fcea2e1980f063827a9b8e51d9f16a0e8e0d3c46dc52df4a58f75b4c69
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
a75fdbafa5c317e5af007a6f00131213
SHA1b3989a799e6ad22f6115a30a9d8c797ef31d751c
SHA25616b73591b271b75c36cabd9a48d7970eb0a44559f061835578a98408423712c9
SHA512cb3c61dcf12501c5d21ffd39622c4480fdd94d882e07d495339bf6d048ba60e425eb4a94c72c8416ac0bb846f4dff19a7464a538d27da559249d66a65215f6c4
-
MD5
a75fdbafa5c317e5af007a6f00131213
SHA1b3989a799e6ad22f6115a30a9d8c797ef31d751c
SHA25616b73591b271b75c36cabd9a48d7970eb0a44559f061835578a98408423712c9
SHA512cb3c61dcf12501c5d21ffd39622c4480fdd94d882e07d495339bf6d048ba60e425eb4a94c72c8416ac0bb846f4dff19a7464a538d27da559249d66a65215f6c4
-
MD5
dc437d64e85e97dbd6f38c9a6b3f3ac5
SHA1a99516c79ccf74e535e9ec20270a930662ca48bf
SHA256dbeb81421fc7ded7772e726af95c0d063a64809ed19e1f146960ef3d98ca4e35
SHA512ef5ae14105d722412cf4fcf8e094f6f57816cff34e6be70982f4aa848a9719713d4c83b50ff41d4a60ddaf622eef79e0bc8952cef0e95aaff0c92f366e2e8aa8
-
MD5
dc437d64e85e97dbd6f38c9a6b3f3ac5
SHA1a99516c79ccf74e535e9ec20270a930662ca48bf
SHA256dbeb81421fc7ded7772e726af95c0d063a64809ed19e1f146960ef3d98ca4e35
SHA512ef5ae14105d722412cf4fcf8e094f6f57816cff34e6be70982f4aa848a9719713d4c83b50ff41d4a60ddaf622eef79e0bc8952cef0e95aaff0c92f366e2e8aa8
-
MD5
dc437d64e85e97dbd6f38c9a6b3f3ac5
SHA1a99516c79ccf74e535e9ec20270a930662ca48bf
SHA256dbeb81421fc7ded7772e726af95c0d063a64809ed19e1f146960ef3d98ca4e35
SHA512ef5ae14105d722412cf4fcf8e094f6f57816cff34e6be70982f4aa848a9719713d4c83b50ff41d4a60ddaf622eef79e0bc8952cef0e95aaff0c92f366e2e8aa8