Analysis
-
max time kernel
153s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
08-12-2021 19:17
Static task
static1
General
-
Target
b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe
-
Size
234KB
-
MD5
76dd90ecbc481bb70caf5ee41078c80b
-
SHA1
1719ef9e23a5b8717052ff64dc14164d311c57b0
-
SHA256
b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1
-
SHA512
22a9c274aebdc937f2434889ddb756abe3173896c9d9e4a8b70b64c75698fd6b21f846d63cb2554efcfdd96b064939a26fd301f684c07b0b464c78ec4293e6b9
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Extracted
redline
1488
80.66.87.52:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3A08.exe family_redline C:\Users\Admin\AppData\Local\Temp\3A08.exe family_redline behavioral1/memory/924-137-0x0000000000B80000-0x0000000000BEC000-memory.dmp family_redline behavioral1/memory/920-172-0x0000000002B80000-0x0000000002CCA000-memory.dmp family_redline behavioral1/memory/3160-192-0x0000000000400000-0x0000000000826000-memory.dmp family_redline behavioral1/memory/300-257-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/300-258-0x0000000000418FB6-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
2CC9.exe3A08.exe4F76.exe736A.exe736A.exegkm4040_crypted2.exeKnots.exeKnots.exeKnots.exeKnots.exepid process 3576 2CC9.exe 3904 3A08.exe 924 4F76.exe 920 736A.exe 1688 736A.exe 3160 gkm4040_crypted2.exe 2076 Knots.exe 3216 Knots.exe 3104 Knots.exe 300 Knots.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
gkm4040_crypted2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gkm4040_crypted2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gkm4040_crypted2.exe -
Deletes itself 1 IoCs
Processes:
pid process 3060 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
gkm4040_crypted2.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gkm4040_crypted2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
4F76.exepid process 924 4F76.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Knots.exedescription pid process target process PID 2076 set thread context of 300 2076 Knots.exe Knots.exe -
Drops file in Windows directory 2 IoCs
Processes:
736A.exedescription ioc process File opened for modification C:\Windows\Tasks\wow64.job 736A.exe File created C:\Windows\Tasks\wow64.job 736A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exepid process 2128 b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe 2128 b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3060 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exepid process 2128 b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
4F76.exe3A08.exeKnots.exegkm4040_crypted2.exeKnots.exedescription pid process Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 924 4F76.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 3904 3A08.exe Token: SeDebugPrivilege 2076 Knots.exe Token: SeDebugPrivilege 3160 gkm4040_crypted2.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 300 Knots.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
3A08.exeKnots.exedescription pid process target process PID 3060 wrote to memory of 3576 3060 2CC9.exe PID 3060 wrote to memory of 3576 3060 2CC9.exe PID 3060 wrote to memory of 3576 3060 2CC9.exe PID 3060 wrote to memory of 3904 3060 3A08.exe PID 3060 wrote to memory of 3904 3060 3A08.exe PID 3060 wrote to memory of 3904 3060 3A08.exe PID 3060 wrote to memory of 924 3060 4F76.exe PID 3060 wrote to memory of 924 3060 4F76.exe PID 3060 wrote to memory of 924 3060 4F76.exe PID 3060 wrote to memory of 920 3060 736A.exe PID 3060 wrote to memory of 920 3060 736A.exe PID 3060 wrote to memory of 920 3060 736A.exe PID 3904 wrote to memory of 3160 3904 3A08.exe gkm4040_crypted2.exe PID 3904 wrote to memory of 3160 3904 3A08.exe gkm4040_crypted2.exe PID 3904 wrote to memory of 3160 3904 3A08.exe gkm4040_crypted2.exe PID 3904 wrote to memory of 2076 3904 3A08.exe Knots.exe PID 3904 wrote to memory of 2076 3904 3A08.exe Knots.exe PID 3904 wrote to memory of 2076 3904 3A08.exe Knots.exe PID 2076 wrote to memory of 3216 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 3216 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 3216 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 3104 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 3104 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 3104 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe PID 2076 wrote to memory of 300 2076 Knots.exe Knots.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe"C:\Users\Admin\AppData\Local\Temp\b9c47906c0e783c835b06b4a8dd8faa336202ba40e18699296020dd02ca769e1.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2128
-
C:\Users\Admin\AppData\Local\Temp\2CC9.exeC:\Users\Admin\AppData\Local\Temp\2CC9.exe1⤵
- Executes dropped EXE
PID:3576
-
C:\Users\Admin\AppData\Local\Temp\3A08.exeC:\Users\Admin\AppData\Local\Temp\3A08.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\gkm4040_crypted2.exe"C:\Users\Admin\AppData\Local\Temp\gkm4040_crypted2.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\Knots.exe"C:\Users\Admin\AppData\Local\Temp\Knots.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Knots.exeC:\Users\Admin\AppData\Local\Temp\Knots.exe3⤵
- Executes dropped EXE
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\Knots.exeC:\Users\Admin\AppData\Local\Temp\Knots.exe3⤵
- Executes dropped EXE
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\Knots.exeC:\Users\Admin\AppData\Local\Temp\Knots.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
-
C:\Users\Admin\AppData\Local\Temp\4F76.exeC:\Users\Admin\AppData\Local\Temp\4F76.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:924
-
C:\Users\Admin\AppData\Local\Temp\736A.exeC:\Users\Admin\AppData\Local\Temp\736A.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:920
-
C:\Users\Admin\AppData\Local\Temp\736A.exeC:\Users\Admin\AppData\Local\Temp\736A.exe start1⤵
- Executes dropped EXE
PID:1688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
e1c9ff41a69e7b381d498c56243e3f19
SHA1b09e041a9d71ab8bc5965ffb3dd14d74ea932bce
SHA2561482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc
SHA512a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e
-
MD5
e1c9ff41a69e7b381d498c56243e3f19
SHA1b09e041a9d71ab8bc5965ffb3dd14d74ea932bce
SHA2561482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc
SHA512a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e
-
MD5
e1c9ff41a69e7b381d498c56243e3f19
SHA1b09e041a9d71ab8bc5965ffb3dd14d74ea932bce
SHA2561482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc
SHA512a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e
-
MD5
e1c9ff41a69e7b381d498c56243e3f19
SHA1b09e041a9d71ab8bc5965ffb3dd14d74ea932bce
SHA2561482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc
SHA512a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e
-
MD5
e1c9ff41a69e7b381d498c56243e3f19
SHA1b09e041a9d71ab8bc5965ffb3dd14d74ea932bce
SHA2561482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc
SHA512a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e
-
MD5
64974fdb5884200d65a297c9ebc3f387
SHA11013524776f12cfe9b3ba22b36d9db0ba4cd1a07
SHA2565ab7e586060e99a8fbd0fa6aeea0fec65a6a16bf25304f73782a64428426c458
SHA512c2e84554e75f571724848410bf57739484c1bd0b8a935f2746975e717e8810f8c972b8ab0dbd0d6d46c17780ade4015d65239f2b5d6ef02cf5325ea37852c802
-
MD5
64974fdb5884200d65a297c9ebc3f387
SHA11013524776f12cfe9b3ba22b36d9db0ba4cd1a07
SHA2565ab7e586060e99a8fbd0fa6aeea0fec65a6a16bf25304f73782a64428426c458
SHA512c2e84554e75f571724848410bf57739484c1bd0b8a935f2746975e717e8810f8c972b8ab0dbd0d6d46c17780ade4015d65239f2b5d6ef02cf5325ea37852c802