Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    09-12-2021 00:16

General

  • Target

    97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe

  • Size

    182KB

  • MD5

    1168d3b5014173d770bb46743876d712

  • SHA1

    fde7c3dbe926007a20f030e67b39d90267c769b2

  • SHA256

    97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f

  • SHA512

    d0b57e33a795ce6d197c153353bc50f5ece25f367d7542c2bc6002a87537e134941f3166aa988ec89c9106f693eec82e2f76291d1a19f8cb4b7bc7bf4c853606

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe
    "C:\Users\Admin\AppData\Local\Temp\97d6b1252c76acc7ed9bdda30b7824a2aaf64fd6a586a1818bfaf2104e277c2f.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3680
  • C:\Users\Admin\AppData\Local\Temp\3F86.exe
    C:\Users\Admin\AppData\Local\Temp\3F86.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:796
  • C:\Users\Admin\AppData\Local\Temp\653F.exe
    C:\Users\Admin\AppData\Local\Temp\653F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4460
  • C:\Users\Admin\AppData\Local\Temp\83C4.exe
    C:\Users\Admin\AppData\Local\Temp\83C4.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2836
  • C:\Users\Admin\AppData\Local\Temp\83C4.exe
    C:\Users\Admin\AppData\Local\Temp\83C4.exe start
    1⤵
    • Executes dropped EXE
    PID:3132

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3F86.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\3F86.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\653F.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\653F.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\83C4.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\83C4.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\83C4.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • memory/796-138-0x00000000709F0000-0x0000000070A3B000-memory.dmp

    Filesize

    300KB

  • memory/796-135-0x0000000074C00000-0x0000000075F48000-memory.dmp

    Filesize

    19.3MB

  • memory/796-124-0x00000000767B0000-0x0000000076972000-memory.dmp

    Filesize

    1.8MB

  • memory/796-125-0x00000000025E0000-0x0000000002625000-memory.dmp

    Filesize

    276KB

  • memory/796-126-0x0000000077550000-0x0000000077641000-memory.dmp

    Filesize

    964KB

  • memory/796-127-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/796-129-0x00000000727A0000-0x0000000072820000-memory.dmp

    Filesize

    512KB

  • memory/796-130-0x0000000005660000-0x0000000005661000-memory.dmp

    Filesize

    4KB

  • memory/796-131-0x0000000005050000-0x0000000005051000-memory.dmp

    Filesize

    4KB

  • memory/796-132-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/796-133-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/796-134-0x0000000076980000-0x0000000076F04000-memory.dmp

    Filesize

    5.5MB

  • memory/796-136-0x0000000005040000-0x0000000005041000-memory.dmp

    Filesize

    4KB

  • memory/796-123-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB

  • memory/796-137-0x00000000050F0000-0x00000000050F1000-memory.dmp

    Filesize

    4KB

  • memory/796-119-0x0000000000000000-mapping.dmp

  • memory/796-122-0x00000000003E0000-0x0000000000448000-memory.dmp

    Filesize

    416KB

  • memory/1640-118-0x00000000010F0000-0x0000000001106000-memory.dmp

    Filesize

    88KB

  • memory/2836-159-0x0000000000000000-mapping.dmp

  • memory/2836-165-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/2836-162-0x0000000002B80000-0x0000000002C2E000-memory.dmp

    Filesize

    696KB

  • memory/2836-163-0x0000000002B80000-0x0000000002C2E000-memory.dmp

    Filesize

    696KB

  • memory/3132-167-0x0000000003430000-0x0000000003435000-memory.dmp

    Filesize

    20KB

  • memory/3132-168-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/3132-166-0x0000000003420000-0x0000000003426000-memory.dmp

    Filesize

    24KB

  • memory/3680-116-0x00000000001C0000-0x00000000001C9000-memory.dmp

    Filesize

    36KB

  • memory/3680-115-0x0000000000030000-0x0000000000038000-memory.dmp

    Filesize

    32KB

  • memory/3680-117-0x0000000000400000-0x0000000000820000-memory.dmp

    Filesize

    4.1MB

  • memory/4460-142-0x0000000000ED0000-0x0000000000F3C000-memory.dmp

    Filesize

    432KB

  • memory/4460-158-0x00000000709F0000-0x0000000070A3B000-memory.dmp

    Filesize

    300KB

  • memory/4460-156-0x0000000005300000-0x0000000005301000-memory.dmp

    Filesize

    4KB

  • memory/4460-155-0x0000000000DF0000-0x0000000000E35000-memory.dmp

    Filesize

    276KB

  • memory/4460-154-0x0000000074C00000-0x0000000075F48000-memory.dmp

    Filesize

    19.3MB

  • memory/4460-153-0x0000000076980000-0x0000000076F04000-memory.dmp

    Filesize

    5.5MB

  • memory/4460-148-0x00000000727A0000-0x0000000072820000-memory.dmp

    Filesize

    512KB

  • memory/4460-146-0x0000000000ED0000-0x0000000000ED1000-memory.dmp

    Filesize

    4KB

  • memory/4460-145-0x0000000077550000-0x0000000077641000-memory.dmp

    Filesize

    964KB

  • memory/4460-144-0x00000000767B0000-0x0000000076972000-memory.dmp

    Filesize

    1.8MB

  • memory/4460-143-0x00000000007F0000-0x00000000007F1000-memory.dmp

    Filesize

    4KB

  • memory/4460-139-0x0000000000000000-mapping.dmp