Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    08-12-2021 19:57

General

  • Target

    df81e2c130757a997d2c984781735d6351b05c41c4fd34970a8e7a0a969b009d.exe

  • Size

    233KB

  • MD5

    aa8b2397e9c6c50444997ac7562c694e

  • SHA1

    84416fa7ed22759705e4d7871fe3d39620d9b374

  • SHA256

    df81e2c130757a997d2c984781735d6351b05c41c4fd34970a8e7a0a969b009d

  • SHA512

    bbed151c57637428c57e00185bcb1ee0180d990f723ab17962e928844e099e584a7c96d8c7f82a94a663a0416c512be29e2cb6d444d8800b6c3242485d363735

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

systembc

C2

185.209.30.180:4001

Extracted

Family

redline

Botnet

1488

C2

80.66.87.52:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df81e2c130757a997d2c984781735d6351b05c41c4fd34970a8e7a0a969b009d.exe
    "C:\Users\Admin\AppData\Local\Temp\df81e2c130757a997d2c984781735d6351b05c41c4fd34970a8e7a0a969b009d.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3432
  • C:\Users\Admin\AppData\Local\Temp\7972.exe
    C:\Users\Admin\AppData\Local\Temp\7972.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4584
  • C:\Users\Admin\AppData\Local\Temp\8654.exe
    C:\Users\Admin\AppData\Local\Temp\8654.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Users\Admin\AppData\Local\Temp\Knots.exe
      "C:\Users\Admin\AppData\Local\Temp\Knots.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Users\Admin\AppData\Local\Temp\Knots.exe
        C:\Users\Admin\AppData\Local\Temp\Knots.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1284
  • C:\Users\Admin\AppData\Local\Temp\9817.exe
    C:\Users\Admin\AppData\Local\Temp\9817.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4432
  • C:\Users\Admin\AppData\Local\Temp\B507.exe
    C:\Users\Admin\AppData\Local\Temp\B507.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1736
  • C:\Users\Admin\AppData\Local\Temp\B507.exe
    C:\Users\Admin\AppData\Local\Temp\B507.exe start
    1⤵
    • Executes dropped EXE
    PID:2672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Knots.exe.log

    MD5

    41fbed686f5700fc29aaccf83e8ba7fd

    SHA1

    5271bc29538f11e42a3b600c8dc727186e912456

    SHA256

    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

    SHA512

    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

  • C:\Users\Admin\AppData\Local\Temp\7972.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\7972.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\8654.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\8654.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\9817.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\9817.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\B507.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\B507.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\B507.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\Knots.exe

    MD5

    e1c9ff41a69e7b381d498c56243e3f19

    SHA1

    b09e041a9d71ab8bc5965ffb3dd14d74ea932bce

    SHA256

    1482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc

    SHA512

    a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e

  • C:\Users\Admin\AppData\Local\Temp\Knots.exe

    MD5

    e1c9ff41a69e7b381d498c56243e3f19

    SHA1

    b09e041a9d71ab8bc5965ffb3dd14d74ea932bce

    SHA256

    1482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc

    SHA512

    a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e

  • C:\Users\Admin\AppData\Local\Temp\Knots.exe

    MD5

    e1c9ff41a69e7b381d498c56243e3f19

    SHA1

    b09e041a9d71ab8bc5965ffb3dd14d74ea932bce

    SHA256

    1482d5afef2f604625b850fbe609699c64a342d1880e9d27ef62a77817b75cdc

    SHA512

    a005c87491bb48d96af386e8ed9cf3604a2fa708ea03219404587d69470e4516e8e71f7306e107c98b9baea83de29490cf81cdd216e752fce9b4019cf069885e

  • memory/1284-221-0x0000000004F80000-0x0000000005586000-memory.dmp

    Filesize

    6.0MB

  • memory/1284-211-0x0000000000418FB6-mapping.dmp

  • memory/1284-210-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1736-196-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/1736-195-0x00000000001F0000-0x00000000001F5000-memory.dmp

    Filesize

    20KB

  • memory/1736-185-0x0000000000000000-mapping.dmp

  • memory/1736-194-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2024-118-0x00000000005A0000-0x00000000005B6000-memory.dmp

    Filesize

    88KB

  • memory/2672-208-0x0000000002CC0000-0x0000000002E0A000-memory.dmp

    Filesize

    1.3MB

  • memory/2672-209-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/3432-115-0x0000000000030000-0x0000000000038000-memory.dmp

    Filesize

    32KB

  • memory/3432-117-0x0000000000400000-0x000000000082D000-memory.dmp

    Filesize

    4.2MB

  • memory/3432-116-0x00000000001C0000-0x00000000001C9000-memory.dmp

    Filesize

    36KB

  • memory/3816-207-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/3816-206-0x00000000059B0000-0x00000000059B1000-memory.dmp

    Filesize

    4KB

  • memory/3816-201-0x0000000000F60000-0x0000000000F61000-memory.dmp

    Filesize

    4KB

  • memory/3816-198-0x0000000000000000-mapping.dmp

  • memory/4432-156-0x0000000073C20000-0x0000000073D11000-memory.dmp

    Filesize

    964KB

  • memory/4432-153-0x0000000000880000-0x00000000008EC000-memory.dmp

    Filesize

    432KB

  • memory/4432-154-0x00000000009D0000-0x00000000009D1000-memory.dmp

    Filesize

    4KB

  • memory/4432-155-0x0000000075E80000-0x0000000076042000-memory.dmp

    Filesize

    1.8MB

  • memory/4432-150-0x0000000000000000-mapping.dmp

  • memory/4432-158-0x0000000002550000-0x0000000002595000-memory.dmp

    Filesize

    276KB

  • memory/4432-157-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB

  • memory/4432-160-0x0000000071B10000-0x0000000071B90000-memory.dmp

    Filesize

    512KB

  • memory/4432-165-0x0000000076220000-0x00000000767A4000-memory.dmp

    Filesize

    5.5MB

  • memory/4432-166-0x00000000747D0000-0x0000000075B18000-memory.dmp

    Filesize

    19.3MB

  • memory/4432-169-0x000000006FCC0000-0x000000006FD0B000-memory.dmp

    Filesize

    300KB

  • memory/4432-168-0x0000000004F20000-0x0000000004F21000-memory.dmp

    Filesize

    4KB

  • memory/4584-149-0x000000006FCC0000-0x000000006FD0B000-memory.dmp

    Filesize

    300KB

  • memory/4584-129-0x0000000071B10000-0x0000000071B90000-memory.dmp

    Filesize

    512KB

  • memory/4584-119-0x0000000000000000-mapping.dmp

  • memory/4584-122-0x0000000000EB0000-0x0000000000F18000-memory.dmp

    Filesize

    416KB

  • memory/4584-178-0x00000000060A0000-0x00000000060A1000-memory.dmp

    Filesize

    4KB

  • memory/4584-123-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-182-0x0000000007240000-0x0000000007241000-memory.dmp

    Filesize

    4KB

  • memory/4584-124-0x0000000075E80000-0x0000000076042000-memory.dmp

    Filesize

    1.8MB

  • memory/4584-147-0x0000000005160000-0x0000000005161000-memory.dmp

    Filesize

    4KB

  • memory/4584-125-0x0000000000B30000-0x0000000000B75000-memory.dmp

    Filesize

    276KB

  • memory/4584-135-0x00000000747D0000-0x0000000075B18000-memory.dmp

    Filesize

    19.3MB

  • memory/4584-126-0x0000000073C20000-0x0000000073D11000-memory.dmp

    Filesize

    964KB

  • memory/4584-127-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

    Filesize

    4KB

  • memory/4584-136-0x0000000005200000-0x0000000005201000-memory.dmp

    Filesize

    4KB

  • memory/4584-134-0x0000000076220000-0x00000000767A4000-memory.dmp

    Filesize

    5.5MB

  • memory/4584-133-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB

  • memory/4584-132-0x0000000005320000-0x0000000005321000-memory.dmp

    Filesize

    4KB

  • memory/4584-131-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

    Filesize

    4KB

  • memory/4584-130-0x0000000005820000-0x0000000005821000-memory.dmp

    Filesize

    4KB

  • memory/4716-172-0x00000000051B0000-0x00000000051B1000-memory.dmp

    Filesize

    4KB

  • memory/4716-137-0x0000000000000000-mapping.dmp

  • memory/4716-140-0x00000000004D0000-0x00000000004D1000-memory.dmp

    Filesize

    4KB

  • memory/4716-146-0x0000000004C90000-0x0000000004C91000-memory.dmp

    Filesize

    4KB

  • memory/4716-170-0x0000000005090000-0x0000000005091000-memory.dmp

    Filesize

    4KB

  • memory/4716-180-0x0000000006790000-0x0000000006791000-memory.dmp

    Filesize

    4KB

  • memory/4716-176-0x0000000005350000-0x0000000005351000-memory.dmp

    Filesize

    4KB

  • memory/4716-174-0x0000000005EC0000-0x0000000005EC1000-memory.dmp

    Filesize

    4KB