Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-12-2021 06:07
Static task
static1
Behavioral task
behavioral1
Sample
f86d0d79a9d784231d3ea146ccd07b4e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f86d0d79a9d784231d3ea146ccd07b4e.exe
Resource
win10-en-20211208
General
-
Target
f86d0d79a9d784231d3ea146ccd07b4e.exe
-
Size
324KB
-
MD5
f86d0d79a9d784231d3ea146ccd07b4e
-
SHA1
bcbff823c7d54627b3428f847aa300849af1a31f
-
SHA256
d5e488a3b12ac3656c376de4323ecd5e1d5b61877ed6efa2f3d30be09cd197f2
-
SHA512
5fa4937c65c955242b77b15d8ee00b07203a03b94bc1d408fe79562ee787cf6dca0a13c749b96ed8b4d47c21157df26b0ac9b381ba23f94d58bbaafd36f1ed3d
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
redline
1
86.107.197.138:38133
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Extracted
redline
install
62.182.156.187:56323
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
resource yara_rule behavioral1/memory/988-126-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/988-128-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/988-129-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/988-131-0x0000000000419326-mapping.dmp family_redline behavioral1/memory/988-137-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/288-169-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/288-170-0x000000000041932E-mapping.dmp family_redline behavioral1/memory/288-173-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1556-240-0x0000000000419322-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1812-87-0x00000000001B0000-0x00000000001CC000-memory.dmp family_arkei behavioral1/memory/1812-88-0x0000000000400000-0x00000000004D2000-memory.dmp family_arkei -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 1360 8843.exe 1624 DE3F.exe 1812 ED7C.exe 1036 DE3F.exe 1516 F4FC.exe 860 FC2E.exe 1896 AA8.exe 1836 13BE.exe 1140 ttpfhlbs.exe 988 FC2E.exe 1684 207B.exe 1968 tkools.exe 288 207B.exe 1904 3F46.exe 1308 tkools.exe -
Modifies Windows Firewall 1 TTPs
-
resource yara_rule behavioral1/files/0x00090000000125b9-178.dat vmprotect behavioral1/files/0x00090000000125b9-180.dat vmprotect -
Deletes itself 1 IoCs
pid Process 1412 Process not Found -
Loads dropped DLL 10 IoCs
pid Process 1624 DE3F.exe 860 FC2E.exe 1896 AA8.exe 1896 AA8.exe 1684 207B.exe 1812 ED7C.exe 1812 ED7C.exe 1812 ED7C.exe 1812 ED7C.exe 1812 ED7C.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1904 3F46.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1752 set thread context of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1624 set thread context of 1036 1624 DE3F.exe 33 PID 860 set thread context of 988 860 FC2E.exe 39 PID 1140 set thread context of 1604 1140 ttpfhlbs.exe 57 PID 1684 set thread context of 288 1684 207B.exe 55 PID 1904 set thread context of 1556 1904 3F46.exe 72 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f86d0d79a9d784231d3ea146ccd07b4e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f86d0d79a9d784231d3ea146ccd07b4e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f86d0d79a9d784231d3ea146ccd07b4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DE3F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8843.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8843.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8843.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DE3F.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DE3F.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ED7C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ED7C.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1104 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1980 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1620 f86d0d79a9d784231d3ea146ccd07b4e.exe 1620 f86d0d79a9d784231d3ea146ccd07b4e.exe 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1412 Process not Found -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1620 f86d0d79a9d784231d3ea146ccd07b4e.exe 1360 8843.exe 1036 DE3F.exe 1412 Process not Found 1412 Process not Found 1412 Process not Found 1412 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 860 FC2E.exe Token: SeDebugPrivilege 1684 207B.exe Token: SeDebugPrivilege 1836 13BE.exe Token: SeDebugPrivilege 288 207B.exe Token: SeDebugPrivilege 988 FC2E.exe Token: SeDebugPrivilege 1556 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1412 Process not Found 1412 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1412 Process not Found 1412 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1752 wrote to memory of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1752 wrote to memory of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1752 wrote to memory of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1752 wrote to memory of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1752 wrote to memory of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1752 wrote to memory of 1620 1752 f86d0d79a9d784231d3ea146ccd07b4e.exe 27 PID 1412 wrote to memory of 1360 1412 Process not Found 28 PID 1412 wrote to memory of 1360 1412 Process not Found 28 PID 1412 wrote to memory of 1360 1412 Process not Found 28 PID 1412 wrote to memory of 1360 1412 Process not Found 28 PID 1412 wrote to memory of 1624 1412 Process not Found 31 PID 1412 wrote to memory of 1624 1412 Process not Found 31 PID 1412 wrote to memory of 1624 1412 Process not Found 31 PID 1412 wrote to memory of 1624 1412 Process not Found 31 PID 1412 wrote to memory of 1812 1412 Process not Found 32 PID 1412 wrote to memory of 1812 1412 Process not Found 32 PID 1412 wrote to memory of 1812 1412 Process not Found 32 PID 1412 wrote to memory of 1812 1412 Process not Found 32 PID 1624 wrote to memory of 1036 1624 DE3F.exe 33 PID 1624 wrote to memory of 1036 1624 DE3F.exe 33 PID 1624 wrote to memory of 1036 1624 DE3F.exe 33 PID 1624 wrote to memory of 1036 1624 DE3F.exe 33 PID 1624 wrote to memory of 1036 1624 DE3F.exe 33 PID 1624 wrote to memory of 1036 1624 DE3F.exe 33 PID 1624 wrote to memory of 1036 1624 DE3F.exe 33 PID 1412 wrote to memory of 1516 1412 Process not Found 34 PID 1412 wrote to memory of 1516 1412 Process not Found 34 PID 1412 wrote to memory of 1516 1412 Process not Found 34 PID 1412 wrote to memory of 1516 1412 Process not Found 34 PID 1412 wrote to memory of 860 1412 Process not Found 35 PID 1412 wrote to memory of 860 1412 Process not Found 35 PID 1412 wrote to memory of 860 1412 Process not Found 35 PID 1412 wrote to memory of 860 1412 Process not Found 35 PID 1516 wrote to memory of 1968 1516 F4FC.exe 36 PID 1516 wrote to memory of 1968 1516 F4FC.exe 36 PID 1516 wrote to memory of 1968 1516 F4FC.exe 36 PID 1516 wrote to memory of 1968 1516 F4FC.exe 36 PID 1412 wrote to memory of 1896 1412 Process not Found 38 PID 1412 wrote to memory of 1896 1412 Process not Found 38 PID 1412 wrote to memory of 1896 1412 Process not Found 38 PID 1412 wrote to memory of 1896 1412 Process not Found 38 PID 860 wrote to memory of 988 860 FC2E.exe 39 PID 860 wrote to memory of 988 860 FC2E.exe 39 PID 860 wrote to memory of 988 860 FC2E.exe 39 PID 860 wrote to memory of 988 860 FC2E.exe 39 PID 1516 wrote to memory of 736 1516 F4FC.exe 40 PID 1516 wrote to memory of 736 1516 F4FC.exe 40 PID 1516 wrote to memory of 736 1516 F4FC.exe 40 PID 1516 wrote to memory of 736 1516 F4FC.exe 40 PID 1516 wrote to memory of 1324 1516 F4FC.exe 42 PID 1516 wrote to memory of 1324 1516 F4FC.exe 42 PID 1516 wrote to memory of 1324 1516 F4FC.exe 42 PID 1516 wrote to memory of 1324 1516 F4FC.exe 42 PID 1516 wrote to memory of 1696 1516 F4FC.exe 44 PID 1516 wrote to memory of 1696 1516 F4FC.exe 44 PID 1516 wrote to memory of 1696 1516 F4FC.exe 44 PID 1516 wrote to memory of 1696 1516 F4FC.exe 44 PID 1516 wrote to memory of 1612 1516 F4FC.exe 46 PID 1516 wrote to memory of 1612 1516 F4FC.exe 46 PID 1516 wrote to memory of 1612 1516 F4FC.exe 46 PID 1516 wrote to memory of 1612 1516 F4FC.exe 46 PID 1412 wrote to memory of 1836 1412 Process not Found 48 PID 1412 wrote to memory of 1836 1412 Process not Found 48 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f86d0d79a9d784231d3ea146ccd07b4e.exe"C:\Users\Admin\AppData\Local\Temp\f86d0d79a9d784231d3ea146ccd07b4e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\f86d0d79a9d784231d3ea146ccd07b4e.exe"C:\Users\Admin\AppData\Local\Temp\f86d0d79a9d784231d3ea146ccd07b4e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\8843.exeC:\Users\Admin\AppData\Local\Temp\8843.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1360
-
C:\Users\Admin\AppData\Local\Temp\DE3F.exeC:\Users\Admin\AppData\Local\Temp\DE3F.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\DE3F.exeC:\Users\Admin\AppData\Local\Temp\DE3F.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\ED7C.exeC:\Users\Admin\AppData\Local\Temp\ED7C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ED7C.exe" & exit2⤵PID:108
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\F4FC.exeC:\Users\Admin\AppData\Local\Temp\F4FC.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\xhaubezq\2⤵PID:1968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ttpfhlbs.exe" C:\Windows\SysWOW64\xhaubezq\2⤵PID:736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create xhaubezq binPath= "C:\Windows\SysWOW64\xhaubezq\ttpfhlbs.exe /d\"C:\Users\Admin\AppData\Local\Temp\F4FC.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1324
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description xhaubezq "wifi internet conection"2⤵PID:1696
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start xhaubezq2⤵PID:1612
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\FC2E.exeC:\Users\Admin\AppData\Local\Temp\FC2E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\FC2E.exeC:\Users\Admin\AppData\Local\Temp\FC2E.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\AA8.exeC:\Users\Admin\AppData\Local\Temp\AA8.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"2⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\3⤵PID:1548
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵PID:776
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F3⤵
- Creates scheduled task(s)
PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\13BE.exeC:\Users\Admin\AppData\Local\Temp\13BE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
C:\Windows\SysWOW64\xhaubezq\ttpfhlbs.exeC:\Windows\SysWOW64\xhaubezq\ttpfhlbs.exe /d"C:\Users\Admin\AppData\Local\Temp\F4FC.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1140 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\207B.exeC:\Users\Admin\AppData\Local\Temp\207B.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\207B.exeC:\Users\Admin\AppData\Local\Temp\207B.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\3F46.exeC:\Users\Admin\AppData\Local\Temp\3F46.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:1904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1704
-
C:\Windows\system32\taskeng.exetaskeng.exe {D608A1CE-0BA9-44AA-A428-43A19E59181D} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeC:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe2⤵
- Executes dropped EXE
PID:1308
-