Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-12-2021 06:38
Static task
static1
Behavioral task
behavioral1
Sample
fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe
Resource
win10-en-20211208
General
-
Target
fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe
-
Size
301KB
-
MD5
c1ebfd2249abcffe96bd3a22a03d0a76
-
SHA1
673b29cb11f5df60aa390f58ae2ef256eb9a8b6a
-
SHA256
fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a
-
SHA512
6412cbf85e72eb385c196732dc047b7305c7ed9b72c78f5129e0a44bf05d535a4fc1b4d571b5464d14c39f4b986c34da1860ca01a8d57f2fa3407793350b5fce
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
systembc
185.209.30.180:4001
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3424-122-0x0000000001300000-0x0000000001368000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\86D1.exe family_redline C:\Users\Admin\AppData\Local\Temp\86D1.exe family_redline behavioral1/memory/2812-149-0x00000000047C0000-0x0000000004DC6000-memory.dmp family_redline behavioral1/memory/1260-153-0x0000000000B90000-0x0000000000BFC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
74DE.exe86D1.exeA825.exeD2DF.exeD2DF.exeehvsgrgpid process 3424 74DE.exe 2812 86D1.exe 1260 A825.exe 3692 D2DF.exe 3004 D2DF.exe 1516 ehvsgrg -
Deletes itself 1 IoCs
Processes:
pid process 3064 -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
74DE.exeA825.exepid process 3424 74DE.exe 1260 A825.exe -
Drops file in Windows directory 2 IoCs
Processes:
D2DF.exedescription ioc process File created C:\Windows\Tasks\wow64.job D2DF.exe File opened for modification C:\Windows\Tasks\wow64.job D2DF.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ehvsgrgfa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ehvsgrg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ehvsgrg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ehvsgrg -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exepid process 2664 fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe 2664 fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3064 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exeehvsgrgpid process 2664 fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe 1516 ehvsgrg -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 Token: SeShutdownPrivilege 3064 Token: SeCreatePagefilePrivilege 3064 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3064 wrote to memory of 3424 3064 74DE.exe PID 3064 wrote to memory of 3424 3064 74DE.exe PID 3064 wrote to memory of 3424 3064 74DE.exe PID 3064 wrote to memory of 2812 3064 86D1.exe PID 3064 wrote to memory of 2812 3064 86D1.exe PID 3064 wrote to memory of 2812 3064 86D1.exe PID 3064 wrote to memory of 1260 3064 A825.exe PID 3064 wrote to memory of 1260 3064 A825.exe PID 3064 wrote to memory of 1260 3064 A825.exe PID 3064 wrote to memory of 3692 3064 D2DF.exe PID 3064 wrote to memory of 3692 3064 D2DF.exe PID 3064 wrote to memory of 3692 3064 D2DF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe"C:\Users\Admin\AppData\Local\Temp\fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2664
-
C:\Users\Admin\AppData\Local\Temp\74DE.exeC:\Users\Admin\AppData\Local\Temp\74DE.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3424
-
C:\Users\Admin\AppData\Local\Temp\86D1.exeC:\Users\Admin\AppData\Local\Temp\86D1.exe1⤵
- Executes dropped EXE
PID:2812
-
C:\Users\Admin\AppData\Local\Temp\A825.exeC:\Users\Admin\AppData\Local\Temp\A825.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1260
-
C:\Users\Admin\AppData\Local\Temp\D2DF.exeC:\Users\Admin\AppData\Local\Temp\D2DF.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3692
-
C:\Users\Admin\AppData\Local\Temp\D2DF.exeC:\Users\Admin\AppData\Local\Temp\D2DF.exe start1⤵
- Executes dropped EXE
PID:3004
-
C:\Users\Admin\AppData\Roaming\ehvsgrgC:\Users\Admin\AppData\Roaming\ehvsgrg1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
fd4e0205ce36f99ff343a78ec3e251bc
SHA1b633df31339acb69f708a41fd227298420fd4036
SHA256617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075
SHA512f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e
-
MD5
c1ebfd2249abcffe96bd3a22a03d0a76
SHA1673b29cb11f5df60aa390f58ae2ef256eb9a8b6a
SHA256fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a
SHA5126412cbf85e72eb385c196732dc047b7305c7ed9b72c78f5129e0a44bf05d535a4fc1b4d571b5464d14c39f4b986c34da1860ca01a8d57f2fa3407793350b5fce
-
MD5
c1ebfd2249abcffe96bd3a22a03d0a76
SHA1673b29cb11f5df60aa390f58ae2ef256eb9a8b6a
SHA256fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a
SHA5126412cbf85e72eb385c196732dc047b7305c7ed9b72c78f5129e0a44bf05d535a4fc1b4d571b5464d14c39f4b986c34da1860ca01a8d57f2fa3407793350b5fce