Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    09-12-2021 06:38

General

  • Target

    fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe

  • Size

    301KB

  • MD5

    c1ebfd2249abcffe96bd3a22a03d0a76

  • SHA1

    673b29cb11f5df60aa390f58ae2ef256eb9a8b6a

  • SHA256

    fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a

  • SHA512

    6412cbf85e72eb385c196732dc047b7305c7ed9b72c78f5129e0a44bf05d535a4fc1b4d571b5464d14c39f4b986c34da1860ca01a8d57f2fa3407793350b5fce

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

195.133.47.114:38627

Extracted

Family

systembc

C2

185.209.30.180:4001

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe
    "C:\Users\Admin\AppData\Local\Temp\fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2664
  • C:\Users\Admin\AppData\Local\Temp\74DE.exe
    C:\Users\Admin\AppData\Local\Temp\74DE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:3424
  • C:\Users\Admin\AppData\Local\Temp\86D1.exe
    C:\Users\Admin\AppData\Local\Temp\86D1.exe
    1⤵
    • Executes dropped EXE
    PID:2812
  • C:\Users\Admin\AppData\Local\Temp\A825.exe
    C:\Users\Admin\AppData\Local\Temp\A825.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1260
  • C:\Users\Admin\AppData\Local\Temp\D2DF.exe
    C:\Users\Admin\AppData\Local\Temp\D2DF.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:3692
  • C:\Users\Admin\AppData\Local\Temp\D2DF.exe
    C:\Users\Admin\AppData\Local\Temp\D2DF.exe start
    1⤵
    • Executes dropped EXE
    PID:3004
  • C:\Users\Admin\AppData\Roaming\ehvsgrg
    C:\Users\Admin\AppData\Roaming\ehvsgrg
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\74DE.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\74DE.exe

    MD5

    77ce7ab11225c5e723b7b1be0308e8c0

    SHA1

    709a8df1d49f28cf8c293694bbbbd0f07735829b

    SHA256

    d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496

    SHA512

    f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b

  • C:\Users\Admin\AppData\Local\Temp\86D1.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\86D1.exe

    MD5

    3ba1d635fed88d8af279be91b7007bae

    SHA1

    62a1d59c746cdb51e699114f410749384a70cf73

    SHA256

    3151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a

    SHA512

    83254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb

  • C:\Users\Admin\AppData\Local\Temp\A825.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\A825.exe

    MD5

    f80418f12c03a56ac2e8d8b189c13750

    SHA1

    cd0b728375e4e178b50bca8ad65ce79aede30d37

    SHA256

    cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716

    SHA512

    e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196

  • C:\Users\Admin\AppData\Local\Temp\D2DF.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\D2DF.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Local\Temp\D2DF.exe

    MD5

    fd4e0205ce36f99ff343a78ec3e251bc

    SHA1

    b633df31339acb69f708a41fd227298420fd4036

    SHA256

    617f9d822418a44cac50b28755f2d075fac1c2de21995820912f07f4b4ee8075

    SHA512

    f413a054603bc0bc86d1657e3960c4b691e7900be36e9470a408264cb63ad0eb9d7cea7b83dbfdf7f727ea5c359d7d6ab5b565ab60976735d67f00c5a082f50e

  • C:\Users\Admin\AppData\Roaming\ehvsgrg

    MD5

    c1ebfd2249abcffe96bd3a22a03d0a76

    SHA1

    673b29cb11f5df60aa390f58ae2ef256eb9a8b6a

    SHA256

    fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a

    SHA512

    6412cbf85e72eb385c196732dc047b7305c7ed9b72c78f5129e0a44bf05d535a4fc1b4d571b5464d14c39f4b986c34da1860ca01a8d57f2fa3407793350b5fce

  • C:\Users\Admin\AppData\Roaming\ehvsgrg

    MD5

    c1ebfd2249abcffe96bd3a22a03d0a76

    SHA1

    673b29cb11f5df60aa390f58ae2ef256eb9a8b6a

    SHA256

    fa4a1680d755d2dd57841670291d74429079e55b9bf857d4d3f55c6d68cc388a

    SHA512

    6412cbf85e72eb385c196732dc047b7305c7ed9b72c78f5129e0a44bf05d535a4fc1b4d571b5464d14c39f4b986c34da1860ca01a8d57f2fa3407793350b5fce

  • memory/1260-168-0x000000006FD60000-0x000000006FDAB000-memory.dmp

    Filesize

    300KB

  • memory/1260-156-0x0000000075BF0000-0x0000000075CE1000-memory.dmp

    Filesize

    964KB

  • memory/1260-166-0x0000000074110000-0x0000000075458000-memory.dmp

    Filesize

    19.3MB

  • memory/1260-165-0x00000000766F0000-0x0000000076C74000-memory.dmp

    Filesize

    5.5MB

  • memory/1260-162-0x0000000002210000-0x0000000002255000-memory.dmp

    Filesize

    276KB

  • memory/1260-159-0x0000000071B10000-0x0000000071B90000-memory.dmp

    Filesize

    512KB

  • memory/1260-157-0x0000000000B90000-0x0000000000B91000-memory.dmp

    Filesize

    4KB

  • memory/1260-150-0x0000000000000000-mapping.dmp

  • memory/1260-155-0x0000000075D80000-0x0000000075F42000-memory.dmp

    Filesize

    1.8MB

  • memory/1260-154-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/1260-153-0x0000000000B90000-0x0000000000BFC000-memory.dmp

    Filesize

    432KB

  • memory/1260-169-0x0000000004E70000-0x0000000004E71000-memory.dmp

    Filesize

    4KB

  • memory/1516-180-0x0000000000771000-0x0000000000782000-memory.dmp

    Filesize

    68KB

  • memory/1516-181-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2664-116-0x0000000000030000-0x0000000000039000-memory.dmp

    Filesize

    36KB

  • memory/2664-117-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2812-142-0x0000000000010000-0x0000000000011000-memory.dmp

    Filesize

    4KB

  • memory/2812-149-0x00000000047C0000-0x0000000004DC6000-memory.dmp

    Filesize

    6.0MB

  • memory/2812-139-0x0000000000000000-mapping.dmp

  • memory/3004-177-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/3064-182-0x0000000004450000-0x0000000004466000-memory.dmp

    Filesize

    88KB

  • memory/3064-118-0x0000000000930000-0x0000000000946000-memory.dmp

    Filesize

    88KB

  • memory/3424-127-0x0000000001300000-0x0000000001301000-memory.dmp

    Filesize

    4KB

  • memory/3424-123-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/3424-133-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

    Filesize

    4KB

  • memory/3424-132-0x0000000004D30000-0x0000000004D31000-memory.dmp

    Filesize

    4KB

  • memory/3424-131-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/3424-130-0x0000000005230000-0x0000000005231000-memory.dmp

    Filesize

    4KB

  • memory/3424-129-0x0000000071B10000-0x0000000071B90000-memory.dmp

    Filesize

    512KB

  • memory/3424-136-0x0000000004C10000-0x0000000004C11000-memory.dmp

    Filesize

    4KB

  • memory/3424-138-0x000000006FD60000-0x000000006FDAB000-memory.dmp

    Filesize

    300KB

  • memory/3424-126-0x0000000075BF0000-0x0000000075CE1000-memory.dmp

    Filesize

    964KB

  • memory/3424-125-0x0000000000D60000-0x0000000000DA5000-memory.dmp

    Filesize

    276KB

  • memory/3424-137-0x0000000004C20000-0x0000000004C21000-memory.dmp

    Filesize

    4KB

  • memory/3424-119-0x0000000000000000-mapping.dmp

  • memory/3424-122-0x0000000001300000-0x0000000001368000-memory.dmp

    Filesize

    416KB

  • memory/3424-124-0x0000000075D80000-0x0000000075F42000-memory.dmp

    Filesize

    1.8MB

  • memory/3424-135-0x0000000074110000-0x0000000075458000-memory.dmp

    Filesize

    19.3MB

  • memory/3424-134-0x00000000766F0000-0x0000000076C74000-memory.dmp

    Filesize

    5.5MB

  • memory/3692-175-0x0000000000400000-0x0000000002B74000-memory.dmp

    Filesize

    39.5MB

  • memory/3692-174-0x00000000001F0000-0x00000000001F5000-memory.dmp

    Filesize

    20KB

  • memory/3692-173-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/3692-170-0x0000000000000000-mapping.dmp