Analysis
-
max time kernel
150s -
max time network
105s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
25-05-2022 11:41
Static task
static1
Behavioral task
behavioral1
Sample
1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe
Resource
win10-20220414-en
General
-
Target
1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe
-
Size
277KB
-
MD5
85622fa9087654c497da7a64ff745994
-
SHA1
4c7f9294aa2826cb6109560718883e03e5fbd793
-
SHA256
1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034
-
SHA512
8be1879c51989808968887cc1bf4c62d4e21039d60b6137656bfb51dc49174646a5246782a00a6f20cf89c8f8408ac50113a5b443101a8d587ef54f65512f969
Malware Config
Extracted
smokeloader
2020
http://monsutiur4.com/
http://nusurionuy5ff.at/
http://moroitomo4.net/
http://susuerulianita1.net/
http://cucumbetuturel4.com/
http://nunuslushau.com/
http://linislominyt11.at/
http://luxulixionus.net/
http://lilisjjoer44.com/
http://nikogminut88.at/
http://limo00ruling.org/
http://mini55tunul.com/
http://samnutu11nuli.com/
http://nikogkojam.org/
Extracted
redline
4
45.10.43.167:26696
-
auth_value
907b4009a916888062785688f81bc6b3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1568-336-0x000000000041AD9E-mapping.dmp family_redline behavioral1/memory/1568-369-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
Processes:
3F89.exepid process 4688 3F89.exe -
Deletes itself 1 IoCs
Processes:
pid process 2836 -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3F89.exedescription pid process target process PID 4688 set thread context of 1568 4688 3F89.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4848 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exepid process 2356 1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe 2356 1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 2836 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2836 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exepid process 2356 1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe 2836 2836 2836 2836 -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
3F89.exeInstallUtil.exedescription pid process Token: SeShutdownPrivilege 2836 Token: SeCreatePagefilePrivilege 2836 Token: SeDebugPrivilege 4688 3F89.exe Token: SeDebugPrivilege 1568 InstallUtil.exe Token: SeShutdownPrivilege 2836 Token: SeCreatePagefilePrivilege 2836 Token: SeShutdownPrivilege 2836 Token: SeCreatePagefilePrivilege 2836 Token: SeShutdownPrivilege 2836 Token: SeCreatePagefilePrivilege 2836 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
pid process 2836 -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pid process 2836 -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3F89.execmd.exedescription pid process target process PID 2836 wrote to memory of 4688 2836 3F89.exe PID 2836 wrote to memory of 4688 2836 3F89.exe PID 2836 wrote to memory of 4688 2836 3F89.exe PID 2836 wrote to memory of 4448 2836 explorer.exe PID 2836 wrote to memory of 4448 2836 explorer.exe PID 2836 wrote to memory of 4448 2836 explorer.exe PID 2836 wrote to memory of 4448 2836 explorer.exe PID 2836 wrote to memory of 1416 2836 explorer.exe PID 2836 wrote to memory of 1416 2836 explorer.exe PID 2836 wrote to memory of 1416 2836 explorer.exe PID 4688 wrote to memory of 4036 4688 3F89.exe cmd.exe PID 4688 wrote to memory of 4036 4688 3F89.exe cmd.exe PID 4688 wrote to memory of 4036 4688 3F89.exe cmd.exe PID 4036 wrote to memory of 4848 4036 cmd.exe timeout.exe PID 4036 wrote to memory of 4848 4036 cmd.exe timeout.exe PID 4036 wrote to memory of 4848 4036 cmd.exe timeout.exe PID 4688 wrote to memory of 4228 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 4228 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 4228 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe PID 4688 wrote to memory of 1568 4688 3F89.exe InstallUtil.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe"C:\Users\Admin\AppData\Local\Temp\1af27fb1a1ce8aa956f685a80ad8c65d4d9d3b0f54a693a5c3dfd896e3c60034.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3F89.exeC:\Users\Admin\AppData\Local\Temp\3F89.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 102⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3F89.exeFilesize
342KB
MD55081f141de74d785dacfe8254097d29f
SHA1bd8f230e9c79d66718871c0b2a770988e021aa21
SHA256dac6ad2b96313e9fed6a84abc829204b40effc0f89fc602889377b589c28fe4a
SHA51209d507af2faece517c5bdc69ab37d468a9cc9dc177e3737d4e31beffcb38037827c1d3f95a7de5321c914a85e69e1b4fb1c9f5d93ef08457bef57109cca0b6dc
-
C:\Users\Admin\AppData\Local\Temp\3F89.exeFilesize
342KB
MD55081f141de74d785dacfe8254097d29f
SHA1bd8f230e9c79d66718871c0b2a770988e021aa21
SHA256dac6ad2b96313e9fed6a84abc829204b40effc0f89fc602889377b589c28fe4a
SHA51209d507af2faece517c5bdc69ab37d468a9cc9dc177e3737d4e31beffcb38037827c1d3f95a7de5321c914a85e69e1b4fb1c9f5d93ef08457bef57109cca0b6dc
-
memory/1416-214-0x0000000000000000-mapping.dmp
-
memory/1568-391-0x0000000005490000-0x00000000054A2000-memory.dmpFilesize
72KB
-
memory/1568-369-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1568-390-0x0000000005A00000-0x0000000006006000-memory.dmpFilesize
6.0MB
-
memory/1568-420-0x0000000006E90000-0x0000000006EE0000-memory.dmpFilesize
320KB
-
memory/1568-392-0x00000000055C0000-0x00000000056CA000-memory.dmpFilesize
1.0MB
-
memory/1568-395-0x0000000005500000-0x000000000553E000-memory.dmpFilesize
248KB
-
memory/1568-397-0x0000000005540000-0x000000000558B000-memory.dmpFilesize
300KB
-
memory/1568-401-0x0000000005850000-0x00000000058C6000-memory.dmpFilesize
472KB
-
memory/1568-405-0x0000000005990000-0x00000000059AE000-memory.dmpFilesize
120KB
-
memory/1568-415-0x0000000007AC0000-0x0000000007C82000-memory.dmpFilesize
1.8MB
-
memory/1568-416-0x00000000081C0000-0x00000000086EC000-memory.dmpFilesize
5.2MB
-
memory/1568-336-0x000000000041AD9E-mapping.dmp
-
memory/2356-132-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-153-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-136-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-137-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-138-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-139-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-141-0x0000000000490000-0x00000000005DA000-memory.dmpFilesize
1.3MB
-
memory/2356-142-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-144-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-145-0x0000000000400000-0x000000000048A000-memory.dmpFilesize
552KB
-
memory/2356-143-0x00000000001E0000-0x00000000001E9000-memory.dmpFilesize
36KB
-
memory/2356-140-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-146-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-147-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-148-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-149-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-150-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-151-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-152-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-135-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-154-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-119-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-134-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-133-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-118-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-131-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-130-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-129-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-128-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-127-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-126-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-124-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-123-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-122-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-121-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2356-120-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/2836-155-0x0000000000C30000-0x0000000000C46000-memory.dmpFilesize
88KB
-
memory/4036-295-0x0000000000000000-mapping.dmp
-
memory/4448-181-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-184-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-174-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-170-0x0000000000000000-mapping.dmp
-
memory/4448-178-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-180-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-179-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-182-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-176-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-185-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-186-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-187-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-189-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-190-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4448-188-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-260-0x0000000005700000-0x0000000005752000-memory.dmpFilesize
328KB
-
memory/4688-334-0x0000000025900000-0x0000000025DFE000-memory.dmpFilesize
5.0MB
-
memory/4688-183-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-173-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-177-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-249-0x0000000000EF0000-0x0000000000F4C000-memory.dmpFilesize
368KB
-
memory/4688-175-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-277-0x0000000005790000-0x00000000057E4000-memory.dmpFilesize
336KB
-
memory/4688-278-0x0000000005930000-0x000000000597C000-memory.dmpFilesize
304KB
-
memory/4688-171-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-156-0x0000000000000000-mapping.dmp
-
memory/4688-325-0x00000000058A0000-0x0000000005906000-memory.dmpFilesize
408KB
-
memory/4688-333-0x0000000025360000-0x00000000253F2000-memory.dmpFilesize
584KB
-
memory/4688-172-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-169-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-168-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-167-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-165-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-164-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-162-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-163-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-161-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-160-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-159-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4688-158-0x0000000077CE0000-0x0000000077E6E000-memory.dmpFilesize
1.6MB
-
memory/4848-301-0x0000000000000000-mapping.dmp