Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-12-2021 00:16
Static task
static1
Behavioral task
behavioral1
Sample
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe
Resource
win10-en-20211208
General
-
Target
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe
-
Size
182KB
-
MD5
1168d3b5014173d770bb46743876d712
-
SHA1
fde7c3dbe926007a20f030e67b39d90267c769b2
-
SHA256
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f
-
SHA512
d0b57e33a795ce6d197c153353bc50f5ece25f367d7542c2bc6002a87537e134941f3166aa988ec89c9106f693eec82e2f76291d1a19f8cb4b7bc7bf4c853606
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
systembc
185.209.30.180:4001
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/796-122-0x00000000003E0000-0x0000000000448000-memory.dmp family_redline behavioral1/memory/4460-142-0x0000000000ED0000-0x0000000000F3C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
3F86.exe653F.exe83C4.exe83C4.exepid process 796 3F86.exe 4460 653F.exe 2836 83C4.exe 3132 83C4.exe -
Deletes itself 1 IoCs
Processes:
pid process 1640 -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
3F86.exe653F.exepid process 796 3F86.exe 4460 653F.exe -
Drops file in Windows directory 2 IoCs
Processes:
83C4.exedescription ioc process File created C:\Windows\Tasks\wow64.job 83C4.exe File opened for modification C:\Windows\Tasks\wow64.job 83C4.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exepid process 3680 97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe 3680 97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 1640 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1640 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exepid process 3680 97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 Token: SeShutdownPrivilege 1640 Token: SeCreatePagefilePrivilege 1640 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
description pid process target process PID 1640 wrote to memory of 796 1640 3F86.exe PID 1640 wrote to memory of 796 1640 3F86.exe PID 1640 wrote to memory of 796 1640 3F86.exe PID 1640 wrote to memory of 4460 1640 653F.exe PID 1640 wrote to memory of 4460 1640 653F.exe PID 1640 wrote to memory of 4460 1640 653F.exe PID 1640 wrote to memory of 2836 1640 83C4.exe PID 1640 wrote to memory of 2836 1640 83C4.exe PID 1640 wrote to memory of 2836 1640 83C4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe"C:\Users\Admin\AppData\Local\Temp\97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3680
-
C:\Users\Admin\AppData\Local\Temp\3F86.exeC:\Users\Admin\AppData\Local\Temp\3F86.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:796
-
C:\Users\Admin\AppData\Local\Temp\653F.exeC:\Users\Admin\AppData\Local\Temp\653F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4460
-
C:\Users\Admin\AppData\Local\Temp\83C4.exeC:\Users\Admin\AppData\Local\Temp\83C4.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2836
-
C:\Users\Admin\AppData\Local\Temp\83C4.exeC:\Users\Admin\AppData\Local\Temp\83C4.exe start1⤵
- Executes dropped EXE
PID:3132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e