Analysis
-
max time kernel
153s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2022 09:58
Behavioral task
behavioral1
Sample
Installer windows/Settup-Install.exe
Resource
win10v2004-20220901-en
General
-
Target
Installer windows/Settup-Install.exe
-
Size
668.1MB
-
MD5
5f86a7be850ceace8b3592506b44b82e
-
SHA1
d1fa5b683abeb53019c6236fa55e69987a86d321
-
SHA256
7e7e5dfd5a764724f9a653dee16b4371708dd6e6d5f42e0663b48208c6a63bb6
-
SHA512
77fdda3c460be63f291d73026a6a9b9a19abd809a7874b211ef7e5dbd774bcd1366264a2210fc2987b8d708a0d5d41c4962354defefcdbcc734865d6c568170e
-
SSDEEP
3072:ivGyYiSDnt12q5hOL5PFn0wcccccccc5hX:m4Gg0PFn0wcccccccc
Malware Config
Extracted
redline
me
92.119.112.239:22628
-
auth_value
0b41ed1bdf04c7505d47398771081370
Signatures
-
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3096-181-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3096-183-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3096-184-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1476-162-0x0000000000400000-0x0000000000460000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
Processes:
SETUP_~1.EXESlpoythnlzosrwdmmwxmp3gainportable_4_1.exeSETUP_~1.EXESlpoythnlzosrwdmmwxmp3gainportable_4_1.exepid process 220 SETUP_~1.EXE 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe 1476 SETUP_~1.EXE 3096 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SETUP_~1.EXESlpoythnlzosrwdmmwxmp3gainportable_4_1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Settup-Install.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Settup-Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Settup-Install.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
SETUP_~1.EXESlpoythnlzosrwdmmwxmp3gainportable_4_1.exedescription pid process target process PID 220 set thread context of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 3368 set thread context of 3096 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Slpoythnlzosrwdmmwxmp3gainportable_4_1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeSETUP_~1.EXEpowershell.exeSlpoythnlzosrwdmmwxmp3gainportable_4_1.exepid process 2140 powershell.exe 2140 powershell.exe 3608 powershell.exe 3608 powershell.exe 968 powershell.exe 968 powershell.exe 1476 SETUP_~1.EXE 1476 SETUP_~1.EXE 3668 powershell.exe 3668 powershell.exe 3096 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe 3096 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Slpoythnlzosrwdmmwxmp3gainportable_4_1.exepid process 3096 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
SETUP_~1.EXEpowershell.exepowershell.exeSlpoythnlzosrwdmmwxmp3gainportable_4_1.exepowershell.exeSETUP_~1.EXEpowershell.exedescription pid process Token: SeDebugPrivilege 220 SETUP_~1.EXE Token: SeDebugPrivilege 2140 powershell.exe Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Token: SeDebugPrivilege 968 powershell.exe Token: SeDebugPrivilege 1476 SETUP_~1.EXE Token: SeDebugPrivilege 3668 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
Settup-Install.exeSETUP_~1.EXESlpoythnlzosrwdmmwxmp3gainportable_4_1.exedescription pid process target process PID 1740 wrote to memory of 220 1740 Settup-Install.exe SETUP_~1.EXE PID 1740 wrote to memory of 220 1740 Settup-Install.exe SETUP_~1.EXE PID 1740 wrote to memory of 220 1740 Settup-Install.exe SETUP_~1.EXE PID 220 wrote to memory of 2140 220 SETUP_~1.EXE powershell.exe PID 220 wrote to memory of 2140 220 SETUP_~1.EXE powershell.exe PID 220 wrote to memory of 2140 220 SETUP_~1.EXE powershell.exe PID 220 wrote to memory of 3608 220 SETUP_~1.EXE powershell.exe PID 220 wrote to memory of 3608 220 SETUP_~1.EXE powershell.exe PID 220 wrote to memory of 3608 220 SETUP_~1.EXE powershell.exe PID 220 wrote to memory of 3368 220 SETUP_~1.EXE Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 220 wrote to memory of 3368 220 SETUP_~1.EXE Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 220 wrote to memory of 3368 220 SETUP_~1.EXE Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 220 wrote to memory of 1476 220 SETUP_~1.EXE SETUP_~1.EXE PID 3368 wrote to memory of 968 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe powershell.exe PID 3368 wrote to memory of 968 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe powershell.exe PID 3368 wrote to memory of 968 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe powershell.exe PID 3368 wrote to memory of 3668 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe powershell.exe PID 3368 wrote to memory of 3668 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe powershell.exe PID 3368 wrote to memory of 3668 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe powershell.exe PID 3368 wrote to memory of 3096 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 3368 wrote to memory of 3096 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 3368 wrote to memory of 3096 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 3368 wrote to memory of 3096 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 3368 wrote to memory of 3096 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe PID 3368 wrote to memory of 3096 3368 Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer windows\Settup-Install.exe"C:\Users\Admin\AppData\Local\Temp\Installer windows\Settup-Install.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe"C:\Users\Admin\AppData\Local\Temp\Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\Slpoythnlzosrwdmmwxmp3gainportable_4_1.exeC:\Users\Admin\AppData\Local\Temp\Slpoythnlzosrwdmmwxmp3gainportable_4_1.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e87e48b105757e1c7563d1c719059733
SHA128a3f2b2e0672da2b531f4757d2b20b53032dafc
SHA2560aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461
SHA512bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968
-
Filesize
1KB
MD56195a91754effb4df74dbc72cdf4f7a6
SHA1aba262f5726c6d77659fe0d3195e36a85046b427
SHA2563254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5
SHA512ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5e3cb689a07647983c77ffa6aadd3692f
SHA1261f2b4068bb211f1a60f309b13d977dec4d2a67
SHA256ae9eda67c675d4b8d99d63e2862ad6918c06afba9f8381267d4055b78807da7e
SHA512bb063ec3f48fb32e4e9db3c20571e2032999ec5f7e3d9f0d5f30d7ca58720877be4ebee68394e249979ba539173d40e349bf2f4948a17ac87456d27863b77f29
-
Filesize
18KB
MD5b809fa5bd7c89eadba1912b2d401a497
SHA1c01ccd95febbe87780472358ab82a3f88b5cfbad
SHA2561168491fe1d614adcf91ffd1cb307c6b55028ea922144fb543623d9c403c04b8
SHA512e76c64bbc2b6d90d4bd939f0acd462e55f83439980e4882902e4a89beb705baeb923b5fa4189a07b4a9706a58255d381346ed024aa5845a49bf0fce81bbc1439
-
Filesize
15KB
MD542917c158735c4d46cac874ba9b1ce21
SHA1e5d5a6250c79755ea007a87b7c1c9f43a797b63c
SHA2569a948c878eff7b0bee55317104b1bb64739c94c7d028ac41072adc9266a9664d
SHA512424d3c25b41d1187aa862056cb9749c2e2b601990a94237bf2cffefd183751e6b3794c11f98b54fdf2ac55dcf1e57815d7004f5b2f47d89b15bb891a50476e24
-
Filesize
333.8MB
MD58fff8f6de7b9e4164aea231910144cf1
SHA1dfeb58649fc43965d1082af194086dbd690a9be7
SHA256e979688fb6bca7cce9446a6ea2d5c43bc33e8fa32c8954483a73592be9a67f2b
SHA512149c19ad8c2b24602c7921e348aa33084f98e376bce6236902580afa8d2a2dea0ec3eb7d661deba3b5c781bb8faf20a7576df4d4d81bed7b3c569b9680584abf
-
Filesize
333.8MB
MD58fff8f6de7b9e4164aea231910144cf1
SHA1dfeb58649fc43965d1082af194086dbd690a9be7
SHA256e979688fb6bca7cce9446a6ea2d5c43bc33e8fa32c8954483a73592be9a67f2b
SHA512149c19ad8c2b24602c7921e348aa33084f98e376bce6236902580afa8d2a2dea0ec3eb7d661deba3b5c781bb8faf20a7576df4d4d81bed7b3c569b9680584abf
-
Filesize
333.8MB
MD58fff8f6de7b9e4164aea231910144cf1
SHA1dfeb58649fc43965d1082af194086dbd690a9be7
SHA256e979688fb6bca7cce9446a6ea2d5c43bc33e8fa32c8954483a73592be9a67f2b
SHA512149c19ad8c2b24602c7921e348aa33084f98e376bce6236902580afa8d2a2dea0ec3eb7d661deba3b5c781bb8faf20a7576df4d4d81bed7b3c569b9680584abf
-
Filesize
13KB
MD5365bef375b243d9319653d1ace0810c5
SHA13d8b33f0ca550bbbab25d10f62f9dc04330803ee
SHA256c61921e2051c0adf42759980ad91196bdcc0fb5bad257d3aea09da81f7427ecb
SHA512d0cbffc34f726a3c73bfe4cfe74c7aa97f8d9d12ff849ed8e5a381000354c0eb0b2444ec9983838a561b5d3df7af839848ea7531ec88448a7938a11ec01a1828
-
Filesize
13KB
MD5365bef375b243d9319653d1ace0810c5
SHA13d8b33f0ca550bbbab25d10f62f9dc04330803ee
SHA256c61921e2051c0adf42759980ad91196bdcc0fb5bad257d3aea09da81f7427ecb
SHA512d0cbffc34f726a3c73bfe4cfe74c7aa97f8d9d12ff849ed8e5a381000354c0eb0b2444ec9983838a561b5d3df7af839848ea7531ec88448a7938a11ec01a1828
-
Filesize
13KB
MD5365bef375b243d9319653d1ace0810c5
SHA13d8b33f0ca550bbbab25d10f62f9dc04330803ee
SHA256c61921e2051c0adf42759980ad91196bdcc0fb5bad257d3aea09da81f7427ecb
SHA512d0cbffc34f726a3c73bfe4cfe74c7aa97f8d9d12ff849ed8e5a381000354c0eb0b2444ec9983838a561b5d3df7af839848ea7531ec88448a7938a11ec01a1828