Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    15-12-2021 12:11

General

  • Target

    d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe

  • Size

    171KB

  • MD5

    595911ab63d7ce2dea26ed3e9aa427df

  • SHA1

    841da4a7454d379274e231eefaf9428c298804dc

  • SHA256

    d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570

  • SHA512

    b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

3372020928

C2

jeliskvosh.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe
    "C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe
      "C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3856
  • C:\Users\Admin\AppData\Local\Temp\2F49.exe
    C:\Users\Admin\AppData\Local\Temp\2F49.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\2F49.exe
      C:\Users\Admin\AppData\Local\Temp\2F49.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4360
  • C:\Users\Admin\AppData\Local\Temp\D5FA.exe
    C:\Users\Admin\AppData\Local\Temp\D5FA.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2532
  • C:\Users\Admin\AppData\Local\Temp\27A5.exe
    C:\Users\Admin\AppData\Local\Temp\27A5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:824
  • C:\Users\Admin\AppData\Local\Temp\85E3.exe
    C:\Users\Admin\AppData\Local\Temp\85E3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1372
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:1596
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:2360
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B447.dll
      1⤵
      • Loads dropped DLL
      PID:2648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\27A5.exe
      MD5

      0cefed061e2a2241ecd302d7790a2f80

      SHA1

      5f119195af2db118c5fbac21634bea00f5d5b8da

      SHA256

      014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

      SHA512

      7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

    • C:\Users\Admin\AppData\Local\Temp\27A5.exe
      MD5

      0cefed061e2a2241ecd302d7790a2f80

      SHA1

      5f119195af2db118c5fbac21634bea00f5d5b8da

      SHA256

      014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

      SHA512

      7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

    • C:\Users\Admin\AppData\Local\Temp\2F49.exe
      MD5

      595911ab63d7ce2dea26ed3e9aa427df

      SHA1

      841da4a7454d379274e231eefaf9428c298804dc

      SHA256

      d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570

      SHA512

      b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13

    • C:\Users\Admin\AppData\Local\Temp\2F49.exe
      MD5

      595911ab63d7ce2dea26ed3e9aa427df

      SHA1

      841da4a7454d379274e231eefaf9428c298804dc

      SHA256

      d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570

      SHA512

      b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13

    • C:\Users\Admin\AppData\Local\Temp\2F49.exe
      MD5

      595911ab63d7ce2dea26ed3e9aa427df

      SHA1

      841da4a7454d379274e231eefaf9428c298804dc

      SHA256

      d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570

      SHA512

      b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13

    • C:\Users\Admin\AppData\Local\Temp\85E3.exe
      MD5

      a73c4054b630f348c4ffb1f5939c8c02

      SHA1

      8fc966305d9810ffd1aa4c79344a06892be5c9d4

      SHA256

      db8c5ef558a72c5075366149d86e43f8b22c7af51ae71d0456d2c44116a80835

      SHA512

      a53605fe5de2730089db38b58f4b007a081438015119f8742adf99534cff5e7e64c6c5d85bf1f289a4be1a677c7481f5d5d9a2c18d0259ada78c1d7343e8e0cd

    • C:\Users\Admin\AppData\Local\Temp\85E3.exe
      MD5

      a73c4054b630f348c4ffb1f5939c8c02

      SHA1

      8fc966305d9810ffd1aa4c79344a06892be5c9d4

      SHA256

      db8c5ef558a72c5075366149d86e43f8b22c7af51ae71d0456d2c44116a80835

      SHA512

      a53605fe5de2730089db38b58f4b007a081438015119f8742adf99534cff5e7e64c6c5d85bf1f289a4be1a677c7481f5d5d9a2c18d0259ada78c1d7343e8e0cd

    • C:\Users\Admin\AppData\Local\Temp\B447.dll
      MD5

      d59fa2838f83e31ef0d2bd34bd86ef40

      SHA1

      d9115b1a962256b6accabfee45c5654f3ee64a47

      SHA256

      32de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8

      SHA512

      92a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f

    • C:\Users\Admin\AppData\Local\Temp\D5FA.exe
      MD5

      265ed6f79387305a37bd4a598403adf1

      SHA1

      c0647e1d4a77715a54141e4898bebcd322f3d9da

      SHA256

      1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

      SHA512

      1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

    • C:\Users\Admin\AppData\Local\Temp\D5FA.exe
      MD5

      265ed6f79387305a37bd4a598403adf1

      SHA1

      c0647e1d4a77715a54141e4898bebcd322f3d9da

      SHA256

      1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

      SHA512

      1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

    • \Users\Admin\AppData\Local\Temp\B447.dll
      MD5

      d59fa2838f83e31ef0d2bd34bd86ef40

      SHA1

      d9115b1a962256b6accabfee45c5654f3ee64a47

      SHA256

      32de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8

      SHA512

      92a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f

    • memory/824-149-0x00000000762B0000-0x0000000076834000-memory.dmp
      Filesize

      5.5MB

    • memory/824-153-0x000000006FD50000-0x000000006FD9B000-memory.dmp
      Filesize

      300KB

    • memory/824-150-0x0000000074BD0000-0x0000000075F18000-memory.dmp
      Filesize

      19.3MB

    • memory/824-145-0x0000000005280000-0x0000000005281000-memory.dmp
      Filesize

      4KB

    • memory/824-148-0x0000000002A00000-0x0000000002A01000-memory.dmp
      Filesize

      4KB

    • memory/824-147-0x0000000004D80000-0x0000000004D81000-memory.dmp
      Filesize

      4KB

    • memory/824-146-0x0000000002930000-0x0000000002931000-memory.dmp
      Filesize

      4KB

    • memory/824-134-0x0000000000000000-mapping.dmp
    • memory/824-152-0x0000000002960000-0x0000000002961000-memory.dmp
      Filesize

      4KB

    • memory/824-151-0x00000000029B0000-0x00000000029B1000-memory.dmp
      Filesize

      4KB

    • memory/824-137-0x0000000000DA0000-0x0000000000E09000-memory.dmp
      Filesize

      420KB

    • memory/824-138-0x0000000000050000-0x0000000000051000-memory.dmp
      Filesize

      4KB

    • memory/824-139-0x0000000076E20000-0x0000000076FE2000-memory.dmp
      Filesize

      1.8MB

    • memory/824-140-0x0000000002210000-0x0000000002255000-memory.dmp
      Filesize

      276KB

    • memory/824-141-0x0000000074430000-0x0000000074521000-memory.dmp
      Filesize

      964KB

    • memory/824-142-0x0000000000DA0000-0x0000000000DA1000-memory.dmp
      Filesize

      4KB

    • memory/824-144-0x0000000071B00000-0x0000000071B80000-memory.dmp
      Filesize

      512KB

    • memory/1372-163-0x0000000071B00000-0x0000000071B80000-memory.dmp
      Filesize

      512KB

    • memory/1372-157-0x0000000000040000-0x00000000000E6000-memory.dmp
      Filesize

      664KB

    • memory/1372-173-0x000000006FD50000-0x000000006FD9B000-memory.dmp
      Filesize

      300KB

    • memory/1372-171-0x00000000054B0000-0x00000000054B1000-memory.dmp
      Filesize

      4KB

    • memory/1372-169-0x0000000074BD0000-0x0000000075F18000-memory.dmp
      Filesize

      19.3MB

    • memory/1372-170-0x0000000000CA0000-0x0000000000CE5000-memory.dmp
      Filesize

      276KB

    • memory/1372-168-0x00000000762B0000-0x0000000076834000-memory.dmp
      Filesize

      5.5MB

    • memory/1372-161-0x0000000000040000-0x0000000000041000-memory.dmp
      Filesize

      4KB

    • memory/1372-160-0x0000000074430000-0x0000000074521000-memory.dmp
      Filesize

      964KB

    • memory/1372-154-0x0000000000000000-mapping.dmp
    • memory/1372-159-0x0000000076E20000-0x0000000076FE2000-memory.dmp
      Filesize

      1.8MB

    • memory/1372-158-0x0000000002840000-0x0000000002841000-memory.dmp
      Filesize

      4KB

    • memory/1596-175-0x0000000002A80000-0x0000000002AF4000-memory.dmp
      Filesize

      464KB

    • memory/1596-174-0x0000000000000000-mapping.dmp
    • memory/1596-176-0x0000000002A10000-0x0000000002A7B000-memory.dmp
      Filesize

      428KB

    • memory/2360-179-0x0000000000630000-0x000000000063C000-memory.dmp
      Filesize

      48KB

    • memory/2360-177-0x0000000000000000-mapping.dmp
    • memory/2360-178-0x0000000000640000-0x0000000000647000-memory.dmp
      Filesize

      28KB

    • memory/2532-127-0x0000000000000000-mapping.dmp
    • memory/2532-130-0x0000000000786000-0x0000000000797000-memory.dmp
      Filesize

      68KB

    • memory/2532-132-0x0000000000400000-0x00000000004CD000-memory.dmp
      Filesize

      820KB

    • memory/2532-131-0x00000000004D0000-0x000000000061A000-memory.dmp
      Filesize

      1.3MB

    • memory/2648-183-0x00000000024C0000-0x00000000024CA000-memory.dmp
      Filesize

      40KB

    • memory/2648-180-0x0000000000000000-mapping.dmp
    • memory/3032-119-0x0000000002CF0000-0x0000000002D06000-memory.dmp
      Filesize

      88KB

    • memory/3032-133-0x0000000003280000-0x0000000003296000-memory.dmp
      Filesize

      88KB

    • memory/3032-126-0x0000000003150000-0x0000000003166000-memory.dmp
      Filesize

      88KB

    • memory/3652-118-0x0000000000860000-0x0000000000869000-memory.dmp
      Filesize

      36KB

    • memory/3652-117-0x0000000000030000-0x0000000000038000-memory.dmp
      Filesize

      32KB

    • memory/3856-115-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/3856-116-0x0000000000402F47-mapping.dmp
    • memory/4360-124-0x0000000000402F47-mapping.dmp
    • memory/4444-120-0x0000000000000000-mapping.dmp