Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    14-05-2022 16:48

General

  • Target

    8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3.exe

  • Size

    1.4MB

  • MD5

    9909c471f3ce6914389f62d58fa6aa43

  • SHA1

    309be41081b2b05ec1d2e936f5cc2880d4c28391

  • SHA256

    8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3

  • SHA512

    3d4791869810665bef2782025c4330b71d5fb41b8110857c2bcb2b2832ae93bdf2b3f49edee27d4501145ba6139296ec053071db22fe75f45f6209bab618c7ef

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://motionberry999xerz.ru/

http://happyday9risce.com/

http://kokihap7siexz3.com/

https://motionberry999xerz.ru/

https://happyday9risce.com/

https://kokihap7siexz3.com/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

test1

C2

23.88.112.179:19536

Attributes
  • auth_value

    68c6114f4d4c471ad88677f54e75676f

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3.exe
    "C:\Users\Admin\AppData\Local\Temp\8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Users\Admin\AppData\Local\Temp\8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3.exe
      C:\Users\Admin\AppData\Local\Temp\8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3.exe
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3036
  • C:\Users\Admin\AppData\Local\Temp\100D.exe
    C:\Users\Admin\AppData\Local\Temp\100D.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 20
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Windows\SysWOW64\timeout.exe
        timeout 20
        3⤵
        • Delays execution with timeout.exe
        PID:1284
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:4044
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3528
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:1420
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:1208
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:1212
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:1660
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:2416
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:2668
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:1560
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:900
                  • C:\Users\Admin\AppData\Roaming\hwbfatj
                    C:\Users\Admin\AppData\Roaming\hwbfatj
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2264
                    • C:\Users\Admin\AppData\Roaming\hwbfatj
                      C:\Users\Admin\AppData\Roaming\hwbfatj
                      2⤵
                      • Executes dropped EXE
                      PID:860
                    • C:\Users\Admin\AppData\Roaming\hwbfatj
                      C:\Users\Admin\AppData\Roaming\hwbfatj
                      2⤵
                      • Executes dropped EXE
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: MapViewOfSection
                      PID:2196

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  System Information Discovery

                  2
                  T1082

                  Query Registry

                  1
                  T1012

                  Peripheral Device Discovery

                  1
                  T1120

                  Collection

                  Email Collection

                  1
                  T1114

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\100D.exe
                    Filesize

                    1.2MB

                    MD5

                    c52e23f559f027c6af598ff0a4c3497d

                    SHA1

                    0e6de0682ae5d89a6530a6c6e03054f5aaeb0662

                    SHA256

                    409a345a063f2fc853b7b45c060970231d9fdc6b453444ae855b7fda4be50021

                    SHA512

                    802159c0fa6034dfc4278ee470aef46a52947006b007ae6a90391377d6c9b3774c999c30ab8d62a10869bf4d459736da4b70ce97d7771bf849effff7714e6428

                  • C:\Users\Admin\AppData\Local\Temp\100D.exe
                    Filesize

                    1.2MB

                    MD5

                    c52e23f559f027c6af598ff0a4c3497d

                    SHA1

                    0e6de0682ae5d89a6530a6c6e03054f5aaeb0662

                    SHA256

                    409a345a063f2fc853b7b45c060970231d9fdc6b453444ae855b7fda4be50021

                    SHA512

                    802159c0fa6034dfc4278ee470aef46a52947006b007ae6a90391377d6c9b3774c999c30ab8d62a10869bf4d459736da4b70ce97d7771bf849effff7714e6428

                  • C:\Users\Admin\AppData\Roaming\hwbfatj
                    Filesize

                    1.4MB

                    MD5

                    9909c471f3ce6914389f62d58fa6aa43

                    SHA1

                    309be41081b2b05ec1d2e936f5cc2880d4c28391

                    SHA256

                    8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3

                    SHA512

                    3d4791869810665bef2782025c4330b71d5fb41b8110857c2bcb2b2832ae93bdf2b3f49edee27d4501145ba6139296ec053071db22fe75f45f6209bab618c7ef

                  • C:\Users\Admin\AppData\Roaming\hwbfatj
                    Filesize

                    1.4MB

                    MD5

                    9909c471f3ce6914389f62d58fa6aa43

                    SHA1

                    309be41081b2b05ec1d2e936f5cc2880d4c28391

                    SHA256

                    8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3

                    SHA512

                    3d4791869810665bef2782025c4330b71d5fb41b8110857c2bcb2b2832ae93bdf2b3f49edee27d4501145ba6139296ec053071db22fe75f45f6209bab618c7ef

                  • C:\Users\Admin\AppData\Roaming\hwbfatj
                    Filesize

                    1.4MB

                    MD5

                    9909c471f3ce6914389f62d58fa6aa43

                    SHA1

                    309be41081b2b05ec1d2e936f5cc2880d4c28391

                    SHA256

                    8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3

                    SHA512

                    3d4791869810665bef2782025c4330b71d5fb41b8110857c2bcb2b2832ae93bdf2b3f49edee27d4501145ba6139296ec053071db22fe75f45f6209bab618c7ef

                  • C:\Users\Admin\AppData\Roaming\hwbfatj
                    Filesize

                    1.4MB

                    MD5

                    9909c471f3ce6914389f62d58fa6aa43

                    SHA1

                    309be41081b2b05ec1d2e936f5cc2880d4c28391

                    SHA256

                    8502f7db79a06b2327d4894e79d7936cad1d42b45589f1938cbac8506a4624e3

                    SHA512

                    3d4791869810665bef2782025c4330b71d5fb41b8110857c2bcb2b2832ae93bdf2b3f49edee27d4501145ba6139296ec053071db22fe75f45f6209bab618c7ef

                  • memory/900-141-0x0000000000000000-mapping.dmp
                  • memory/1208-135-0x0000000000000000-mapping.dmp
                  • memory/1212-136-0x0000000000000000-mapping.dmp
                  • memory/1284-143-0x0000000000000000-mapping.dmp
                  • memory/1420-133-0x0000000000000000-mapping.dmp
                  • memory/1560-140-0x0000000000000000-mapping.dmp
                  • memory/1660-137-0x0000000000000000-mapping.dmp
                  • memory/2196-164-0x0000000000400000-0x0000000000409000-memory.dmp
                    Filesize

                    36KB

                  • memory/2196-162-0x0000000000402E3F-mapping.dmp
                  • memory/2416-138-0x0000000000000000-mapping.dmp
                  • memory/2576-144-0x00000000053A0000-0x00000000053DA000-memory.dmp
                    Filesize

                    232KB

                  • memory/2576-134-0x0000000008960000-0x0000000008A90000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2576-132-0x0000000000A30000-0x0000000000B74000-memory.dmp
                    Filesize

                    1.3MB

                  • memory/2576-129-0x0000000000000000-mapping.dmp
                  • memory/2668-139-0x0000000000000000-mapping.dmp
                  • memory/3036-125-0x0000000000400000-0x0000000000409000-memory.dmp
                    Filesize

                    36KB

                  • memory/3036-127-0x0000000000400000-0x0000000000409000-memory.dmp
                    Filesize

                    36KB

                  • memory/3036-126-0x0000000000402E3F-mapping.dmp
                  • memory/3040-165-0x0000000000D00000-0x0000000000D16000-memory.dmp
                    Filesize

                    88KB

                  • memory/3040-128-0x0000000000CA0000-0x0000000000CB6000-memory.dmp
                    Filesize

                    88KB

                  • memory/3136-142-0x0000000000000000-mapping.dmp
                  • memory/3528-150-0x0000000007DD0000-0x0000000007EDA000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/3528-155-0x0000000008040000-0x00000000080B6000-memory.dmp
                    Filesize

                    472KB

                  • memory/3528-148-0x00000000082D0000-0x00000000088D6000-memory.dmp
                    Filesize

                    6.0MB

                  • memory/3528-149-0x0000000005800000-0x0000000005812000-memory.dmp
                    Filesize

                    72KB

                  • memory/3528-146-0x000000000041232E-mapping.dmp
                  • memory/3528-151-0x0000000007D00000-0x0000000007D3E000-memory.dmp
                    Filesize

                    248KB

                  • memory/3528-152-0x0000000007D40000-0x0000000007D8B000-memory.dmp
                    Filesize

                    300KB

                  • memory/3528-145-0x0000000000400000-0x0000000000418000-memory.dmp
                    Filesize

                    96KB

                  • memory/3528-159-0x000000000AC80000-0x000000000B1AC000-memory.dmp
                    Filesize

                    5.2MB

                  • memory/3528-147-0x00000000055F0000-0x0000000005610000-memory.dmp
                    Filesize

                    128KB

                  • memory/3528-156-0x0000000008120000-0x000000000813E000-memory.dmp
                    Filesize

                    120KB

                  • memory/3528-157-0x00000000097B0000-0x0000000009800000-memory.dmp
                    Filesize

                    320KB

                  • memory/3528-158-0x000000000A580000-0x000000000A742000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/3696-122-0x00000000275A0000-0x0000000027632000-memory.dmp
                    Filesize

                    584KB

                  • memory/3696-121-0x00000000054D0000-0x0000000005536000-memory.dmp
                    Filesize

                    408KB

                  • memory/3696-120-0x00000000088E0000-0x0000000008A2C000-memory.dmp
                    Filesize

                    1.3MB

                  • memory/3696-123-0x0000000027B40000-0x000000002803E000-memory.dmp
                    Filesize

                    5.0MB

                  • memory/3696-119-0x0000000000A60000-0x0000000000BC0000-memory.dmp
                    Filesize

                    1.4MB

                  • memory/3696-124-0x0000000006790000-0x00000000067C0000-memory.dmp
                    Filesize

                    192KB