Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-12-2021 01:36
Static task
static1
Behavioral task
behavioral1
Sample
cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe
Resource
win10-en-20211208
General
-
Target
cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe
-
Size
341KB
-
MD5
0c2c37017fbc1b929c9f69ba4dd8a155
-
SHA1
e5f2442c7e1bdef1e9319686b60c842804bf6469
-
SHA256
cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33
-
SHA512
28e6136f937c5abc108fa1c856240ee674e3a6a913cf21ce3ef817d2a23397af2fdc83c08737b4a4f9aa5651e281652a75af5e3ae81e06d86421a0923134e687
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\BA63.exe family_redline C:\Users\Admin\AppData\Local\Temp\BA63.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
BA63.exe5C22.exe5C22.exepid process 740 BA63.exe 4544 5C22.exe 800 5C22.exe -
Deletes itself 1 IoCs
Processes:
pid process 3020 -
Drops file in Windows directory 2 IoCs
Processes:
5C22.exedescription ioc process File created C:\Windows\Tasks\wow64.job 5C22.exe File opened for modification C:\Windows\Tasks\wow64.job 5C22.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exepid process 3548 cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe 3548 cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3020 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exepid process 3548 cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
description pid process target process PID 3020 wrote to memory of 740 3020 BA63.exe PID 3020 wrote to memory of 740 3020 BA63.exe PID 3020 wrote to memory of 740 3020 BA63.exe PID 3020 wrote to memory of 4544 3020 5C22.exe PID 3020 wrote to memory of 4544 3020 5C22.exe PID 3020 wrote to memory of 4544 3020 5C22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe"C:\Users\Admin\AppData\Local\Temp\cc314098116588eacaf0c8a3cbba68ad92ab76f19ed2b63f61f4981fe861da33.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3548
-
C:\Users\Admin\AppData\Local\Temp\BA63.exeC:\Users\Admin\AppData\Local\Temp\BA63.exe1⤵
- Executes dropped EXE
PID:740
-
C:\Users\Admin\AppData\Local\Temp\5C22.exeC:\Users\Admin\AppData\Local\Temp\5C22.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4544
-
C:\Users\Admin\AppData\Local\Temp\5C22.exeC:\Users\Admin\AppData\Local\Temp\5C22.exe start1⤵
- Executes dropped EXE
PID:800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb