Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
08-12-2021 17:44
Static task
static1
Behavioral task
behavioral1
Sample
5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe
Resource
win10-en-20211208
General
-
Target
5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe
-
Size
234KB
-
MD5
f8bbf08d10d25f581f0c72b8821d0e80
-
SHA1
365a5e56870bf91ddd085d0b4cad7f731199e003
-
SHA256
5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7
-
SHA512
f0b78a508e8449e64af45b1ef8e57ade04b2a5e46fdf63190cb22094db7c1cbf6097e47429bde3580ef7cd27c4e358fe7fa173f798ce093d38c5708320de7bd4
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2548-122-0x0000000000B60000-0x0000000000BC8000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\920C.exe family_redline C:\Users\Admin\AppData\Local\Temp\920C.exe family_redline behavioral1/memory/2908-153-0x0000000001280000-0x00000000012EC000-memory.dmp family_redline behavioral1/memory/3720-203-0x00000000008A0000-0x0000000000A76000-memory.dmp family_redline behavioral1/memory/3720-205-0x00000000008A0000-0x0000000000A76000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
8866.exe920C.exeA42D.exeCCE4.exeCCE4.exe120721_.exepid process 2548 8866.exe 3536 920C.exe 2908 A42D.exe 2240 CCE4.exe 3836 CCE4.exe 3720 120721_.exe -
Deletes itself 1 IoCs
Processes:
pid process 3024 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
8866.exeA42D.exe120721_.exepid process 2548 8866.exe 2908 A42D.exe 3720 120721_.exe -
Drops file in Windows directory 2 IoCs
Processes:
CCE4.exedescription ioc process File created C:\Windows\Tasks\wow64.job CCE4.exe File opened for modification C:\Windows\Tasks\wow64.job CCE4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exepid process 2732 5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe 2732 5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3024 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exepid process 2732 5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
8866.exeA42D.exe920C.exedescription pid process Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeDebugPrivilege 2548 8866.exe Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeDebugPrivilege 2908 A42D.exe Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeDebugPrivilege 3536 920C.exe Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
920C.exedescription pid process target process PID 3024 wrote to memory of 2548 3024 8866.exe PID 3024 wrote to memory of 2548 3024 8866.exe PID 3024 wrote to memory of 2548 3024 8866.exe PID 3024 wrote to memory of 3536 3024 920C.exe PID 3024 wrote to memory of 3536 3024 920C.exe PID 3024 wrote to memory of 3536 3024 920C.exe PID 3024 wrote to memory of 2908 3024 A42D.exe PID 3024 wrote to memory of 2908 3024 A42D.exe PID 3024 wrote to memory of 2908 3024 A42D.exe PID 3024 wrote to memory of 2240 3024 CCE4.exe PID 3024 wrote to memory of 2240 3024 CCE4.exe PID 3024 wrote to memory of 2240 3024 CCE4.exe PID 3536 wrote to memory of 3720 3536 920C.exe 120721_.exe PID 3536 wrote to memory of 3720 3536 920C.exe 120721_.exe PID 3536 wrote to memory of 3720 3536 920C.exe 120721_.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe"C:\Users\Admin\AppData\Local\Temp\5acb8f20c0b92063e91cf94e2ad686e9c9dbf74f185361b78a8b7bdbd81c0ba7.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2732
-
C:\Users\Admin\AppData\Local\Temp\8866.exeC:\Users\Admin\AppData\Local\Temp\8866.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
C:\Users\Admin\AppData\Local\Temp\920C.exeC:\Users\Admin\AppData\Local\Temp\920C.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\120721_.exe"C:\Users\Admin\AppData\Local\Temp\120721_.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\ferrari2.exe"C:\Users\Admin\AppData\Local\Temp\ferrari2.exe"2⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\gkm4040_crypted2.exe"C:\Users\Admin\AppData\Local\Temp\gkm4040_crypted2.exe"2⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\A42D.exeC:\Users\Admin\AppData\Local\Temp\A42D.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
C:\Users\Admin\AppData\Local\Temp\CCE4.exeC:\Users\Admin\AppData\Local\Temp\CCE4.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2240
-
C:\Users\Admin\AppData\Local\Temp\CCE4.exeC:\Users\Admin\AppData\Local\Temp\CCE4.exe start1⤵
- Executes dropped EXE
PID:3836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4058653cf590a72f1ce4d014a8e4b864
SHA1e28b2c830b299f449814e522ec27c042f6a56e93
SHA256d8f5064942fcb0a86a9f12eea8de7b67efc5a874843484d770cad49a2db1ebc0
SHA51237e34dd71c005d86b7b2a1a5bf66c17b99a827b06ad25acd777251996ed75b88d6c20a72063281ad95cf93ea9c6534bc73bcc4480074a762dff932c966876842
-
MD5
4058653cf590a72f1ce4d014a8e4b864
SHA1e28b2c830b299f449814e522ec27c042f6a56e93
SHA256d8f5064942fcb0a86a9f12eea8de7b67efc5a874843484d770cad49a2db1ebc0
SHA51237e34dd71c005d86b7b2a1a5bf66c17b99a827b06ad25acd777251996ed75b88d6c20a72063281ad95cf93ea9c6534bc73bcc4480074a762dff932c966876842
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
0fc7b07fef185aa42fc44532348b6650
SHA1a3f089a7e7ab028c3e5159f8599f8fafe8bab1cd
SHA256d9af145ed7f6d88a19b63d60d9f05a3785762332b9a4f441feb639327f0d1b9d
SHA512c9670bbd771b5df2f19990a87979d4faa2b07f1aa7f6d7842f0faebc7e15a97756ef7d002e66986ac538465906a1ee9a518d05fae63f5d9ec814553ef74aed4b
-
MD5
0fc7b07fef185aa42fc44532348b6650
SHA1a3f089a7e7ab028c3e5159f8599f8fafe8bab1cd
SHA256d9af145ed7f6d88a19b63d60d9f05a3785762332b9a4f441feb639327f0d1b9d
SHA512c9670bbd771b5df2f19990a87979d4faa2b07f1aa7f6d7842f0faebc7e15a97756ef7d002e66986ac538465906a1ee9a518d05fae63f5d9ec814553ef74aed4b
-
MD5
d8f82725a7bd1e3433d3a177f161cc5a
SHA1035c552d841fb9827e7fdca7531b6e4c38409cfa
SHA256f67c7daba78ba3285d4312caa71ae5537f85487b875796fe2e3554038042bd28
SHA5122c98fd3ee25990158ddf82dd22f3708e6949a79cccc30a436dc73b61698ec84a3b557e435c5f7959f6b4a3429a81ed9235c6b40a044a2ace67b58432e77ff3d0
-
MD5
53c17efca0e2ca5a07bd88823ea90ad6
SHA153c1a593ff526f12ff63d6c4ff304d0a2f5c21aa
SHA256a46840e03397e9f419ac6e9dc31debc7d7662faffbdb240dd62f589e8c2faff3
SHA512a6d3bf019dfbb66c6cbe7f9b7ff0774bfda9789c28290aef5029cb6712689eba4e5d4adcdd558e39347c9e131e228359c68046678ff89ccaa7a52cb357acb0fe