Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2022, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe
Resource
win10v2004-20220812-en
General
-
Target
09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe
-
Size
201KB
-
MD5
9a76263bdedf77a8ad97faa1b2a9c854
-
SHA1
45c5ae31e5251ba15842c7a3495babbcc0f990b8
-
SHA256
09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198ef9b92b6c18c804f0bc1
-
SHA512
0a63808b0f25ae8f3764973bb3abc21c52f4cc740561679fbb68460e5e02db5d25748dbd0539923a622d650afbfb5334d15a240545a7e1afc2f7ed172dd924fe
-
SSDEEP
3072:B3oxmILLxgcZKN5ztq2dPqETOYOJcTO8synzAoRjnBd4/PkIXx:6jLtZ6qIqETOHV8swzAoRH
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Extracted
redline
LogsDiller Cloud (TG: @me_golds)
77.73.134.27:7161
-
auth_value
e136da06c7c0400f4091dab1787720ea
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/1124-133-0x00000000006A0000-0x00000000006A9000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/99408-158-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 3180 rhtjsrf 2208 943C.exe 26316 9789.exe 99200 9FC7.exe 100364 A22A.exe 100580 fpvbuers.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 100612 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nkgbczrf\ImagePath = "C:\\Windows\\SysWOW64\\nkgbczrf\\fpvbuers.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9789.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ôf´wôf´wXïv fpvbuers.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2208 set thread context of 99408 2208 943C.exe 98 PID 100580 set thread context of 100840 100580 fpvbuers.exe 114 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 100388 sc.exe 100532 sc.exe 99280 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 100736 26316 WerFault.exe 89 100908 100580 WerFault.exe 106 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhtjsrf Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhtjsrf Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhtjsrf -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1124 09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe 1124 09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 Process not Found -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 1124 09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe 3180 rhtjsrf 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found 2152 Process not Found -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found Token: SeShutdownPrivilege 2152 Process not Found Token: SeCreatePagefilePrivilege 2152 Process not Found -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2208 2152 Process not Found 87 PID 2152 wrote to memory of 2208 2152 Process not Found 87 PID 2152 wrote to memory of 2208 2152 Process not Found 87 PID 2152 wrote to memory of 26316 2152 Process not Found 89 PID 2152 wrote to memory of 26316 2152 Process not Found 89 PID 2152 wrote to memory of 26316 2152 Process not Found 89 PID 26316 wrote to memory of 72724 26316 9789.exe 90 PID 26316 wrote to memory of 72724 26316 9789.exe 90 PID 26316 wrote to memory of 72724 26316 9789.exe 90 PID 26316 wrote to memory of 90676 26316 9789.exe 92 PID 26316 wrote to memory of 90676 26316 9789.exe 92 PID 26316 wrote to memory of 90676 26316 9789.exe 92 PID 2152 wrote to memory of 99200 2152 Process not Found 94 PID 2152 wrote to memory of 99200 2152 Process not Found 94 PID 2152 wrote to memory of 99200 2152 Process not Found 94 PID 26316 wrote to memory of 99280 26316 9789.exe 96 PID 26316 wrote to memory of 99280 26316 9789.exe 96 PID 26316 wrote to memory of 99280 26316 9789.exe 96 PID 2208 wrote to memory of 99408 2208 943C.exe 98 PID 2208 wrote to memory of 99408 2208 943C.exe 98 PID 2208 wrote to memory of 99408 2208 943C.exe 98 PID 2208 wrote to memory of 99408 2208 943C.exe 98 PID 2152 wrote to memory of 100364 2152 Process not Found 99 PID 2152 wrote to memory of 100364 2152 Process not Found 99 PID 2152 wrote to memory of 100364 2152 Process not Found 99 PID 2208 wrote to memory of 99408 2208 943C.exe 98 PID 26316 wrote to memory of 100388 26316 9789.exe 100 PID 26316 wrote to memory of 100388 26316 9789.exe 100 PID 26316 wrote to memory of 100388 26316 9789.exe 100 PID 2152 wrote to memory of 100500 2152 Process not Found 103 PID 2152 wrote to memory of 100500 2152 Process not Found 103 PID 2152 wrote to memory of 100500 2152 Process not Found 103 PID 2152 wrote to memory of 100500 2152 Process not Found 103 PID 26316 wrote to memory of 100532 26316 9789.exe 104 PID 26316 wrote to memory of 100532 26316 9789.exe 104 PID 26316 wrote to memory of 100532 26316 9789.exe 104 PID 26316 wrote to memory of 100612 26316 9789.exe 107 PID 26316 wrote to memory of 100612 26316 9789.exe 107 PID 26316 wrote to memory of 100612 26316 9789.exe 107 PID 2152 wrote to memory of 100748 2152 Process not Found 112 PID 2152 wrote to memory of 100748 2152 Process not Found 112 PID 2152 wrote to memory of 100748 2152 Process not Found 112 PID 2152 wrote to memory of 100808 2152 Process not Found 113 PID 2152 wrote to memory of 100808 2152 Process not Found 113 PID 2152 wrote to memory of 100808 2152 Process not Found 113 PID 2152 wrote to memory of 100808 2152 Process not Found 113 PID 100580 wrote to memory of 100840 100580 fpvbuers.exe 114 PID 100580 wrote to memory of 100840 100580 fpvbuers.exe 114 PID 100580 wrote to memory of 100840 100580 fpvbuers.exe 114 PID 100580 wrote to memory of 100840 100580 fpvbuers.exe 114 PID 100580 wrote to memory of 100840 100580 fpvbuers.exe 114 PID 2152 wrote to memory of 100944 2152 Process not Found 117 PID 2152 wrote to memory of 100944 2152 Process not Found 117 PID 2152 wrote to memory of 100944 2152 Process not Found 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe"C:\Users\Admin\AppData\Local\Temp\09d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1124
-
C:\Users\Admin\AppData\Roaming\rhtjsrfC:\Users\Admin\AppData\Roaming\rhtjsrf1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3180
-
C:\Users\Admin\AppData\Local\Temp\943C.exeC:\Users\Admin\AppData\Local\Temp\943C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:99408
-
-
C:\Users\Admin\AppData\Local\Temp\9789.exeC:\Users\Admin\AppData\Local\Temp\9789.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:26316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nkgbczrf\2⤵PID:72724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fpvbuers.exe" C:\Windows\SysWOW64\nkgbczrf\2⤵PID:90676
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nkgbczrf binPath= "C:\Windows\SysWOW64\nkgbczrf\fpvbuers.exe /d\"C:\Users\Admin\AppData\Local\Temp\9789.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:99280
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nkgbczrf "wifi internet conection"2⤵
- Launches sc.exe
PID:100388
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nkgbczrf2⤵
- Launches sc.exe
PID:100532
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:100612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 26316 -s 10362⤵
- Program crash
PID:100736
-
-
C:\Users\Admin\AppData\Local\Temp\9FC7.exeC:\Users\Admin\AppData\Local\Temp\9FC7.exe1⤵
- Executes dropped EXE
PID:99200
-
C:\Users\Admin\AppData\Local\Temp\A22A.exeC:\Users\Admin\AppData\Local\Temp\A22A.exe1⤵
- Executes dropped EXE
PID:100364
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:100500
-
C:\Windows\SysWOW64\nkgbczrf\fpvbuers.exeC:\Windows\SysWOW64\nkgbczrf\fpvbuers.exe /d"C:\Users\Admin\AppData\Local\Temp\9789.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:100580 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:100840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 100580 -s 1922⤵
- Program crash
PID:100908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 26316 -ip 263161⤵PID:100704
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:100748
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:100808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 100580 -ip 1005801⤵PID:100868
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:100944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ea6fee4ce432602e3dd2b849f8396027
SHA15151b46012f637fe7fdbda551be1651009eb453a
SHA256b44181d7365ab6868e1cf0d7127a56862075944099f6f1f965b11f41c78fd75d
SHA512b567449c006248a4311a1a3325279e2d4edfacacb272ae3152b085d3164e722370aa748cbaa3299425ede1e4910218988e88f24de744944903b2001b70e263be
-
Filesize
2.6MB
MD5ea6fee4ce432602e3dd2b849f8396027
SHA15151b46012f637fe7fdbda551be1651009eb453a
SHA256b44181d7365ab6868e1cf0d7127a56862075944099f6f1f965b11f41c78fd75d
SHA512b567449c006248a4311a1a3325279e2d4edfacacb272ae3152b085d3164e722370aa748cbaa3299425ede1e4910218988e88f24de744944903b2001b70e263be
-
Filesize
201KB
MD52e636c990dc2d04cc549d783da6f462e
SHA19095209d363a69b5f4696d2c1de6435dc9745db5
SHA256857e938e8bef854c67fec66d7fbfc7f19e29b81fe4cd8c1e387a9b34918e2f1d
SHA51222d1b71371f99da9e6211da17feca7e254cf7295b3cc2ab072c6316881ce736c4f5704013b9c03dec72ef098337bb7d5592d5d5cbfed404f76a9aaf945ce9e49
-
Filesize
201KB
MD52e636c990dc2d04cc549d783da6f462e
SHA19095209d363a69b5f4696d2c1de6435dc9745db5
SHA256857e938e8bef854c67fec66d7fbfc7f19e29b81fe4cd8c1e387a9b34918e2f1d
SHA51222d1b71371f99da9e6211da17feca7e254cf7295b3cc2ab072c6316881ce736c4f5704013b9c03dec72ef098337bb7d5592d5d5cbfed404f76a9aaf945ce9e49
-
Filesize
318KB
MD56917d28aae7b190af4cc9e8c82597b99
SHA100ac38f05b4d99691ef09883f7f141a6cd3d4d3a
SHA2565d72a91ee3aeab2a634e8023b2c0530c8429f1151f1e29421ff7a16cec75617d
SHA512e5a2d6d37555a7f06bfd27aa52eb2075b142ffadd155c4e27e76c371ebd01710b4072576d4ae0fabd221a47f6386a44e37bb2097d9db5e88889ea76ed8170fb4
-
Filesize
318KB
MD56917d28aae7b190af4cc9e8c82597b99
SHA100ac38f05b4d99691ef09883f7f141a6cd3d4d3a
SHA2565d72a91ee3aeab2a634e8023b2c0530c8429f1151f1e29421ff7a16cec75617d
SHA512e5a2d6d37555a7f06bfd27aa52eb2075b142ffadd155c4e27e76c371ebd01710b4072576d4ae0fabd221a47f6386a44e37bb2097d9db5e88889ea76ed8170fb4
-
Filesize
365KB
MD51c92b308eeb3ee01d7622de9f8fea0b5
SHA15e5c89f5c6f15bad6b62ca0ea22f6dcfac1a6dda
SHA256775f7f9041236757b05676318037000e221a582bdfd161b89a11a19fc4fde73c
SHA5125a9836b2af8b7088bfca79e84b3d5ef51a620fe1d59f2a0f1f02605907bcedcbb3f95fd16f9812d405045056d688061cb4c5ef47f09ba0e7779de77b45f013eb
-
Filesize
365KB
MD51c92b308eeb3ee01d7622de9f8fea0b5
SHA15e5c89f5c6f15bad6b62ca0ea22f6dcfac1a6dda
SHA256775f7f9041236757b05676318037000e221a582bdfd161b89a11a19fc4fde73c
SHA5125a9836b2af8b7088bfca79e84b3d5ef51a620fe1d59f2a0f1f02605907bcedcbb3f95fd16f9812d405045056d688061cb4c5ef47f09ba0e7779de77b45f013eb
-
Filesize
14.4MB
MD5bf32265654cb54374dbf6047cd42a6e6
SHA17224ca9df6d412d4ce80cc6fc4b1128ee30d580d
SHA2562adaa532d28ef54737ec964b491fc90d55b16757eeff4d7032715523d7cf8aaf
SHA51274fabeaa65e7d59bcce22df38f9be2ecad8aca49c4554464d2f670ca384948c78cabefc75ae37cfd87f750f3cc188a9e3c9a7ccf632e01011e29acf6e410ae99
-
Filesize
201KB
MD59a76263bdedf77a8ad97faa1b2a9c854
SHA145c5ae31e5251ba15842c7a3495babbcc0f990b8
SHA25609d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198ef9b92b6c18c804f0bc1
SHA5120a63808b0f25ae8f3764973bb3abc21c52f4cc740561679fbb68460e5e02db5d25748dbd0539923a622d650afbfb5334d15a240545a7e1afc2f7ed172dd924fe
-
Filesize
201KB
MD59a76263bdedf77a8ad97faa1b2a9c854
SHA145c5ae31e5251ba15842c7a3495babbcc0f990b8
SHA25609d9bb25f1d1bd6f7c3e3aa64df49eaa398e9f26b198ef9b92b6c18c804f0bc1
SHA5120a63808b0f25ae8f3764973bb3abc21c52f4cc740561679fbb68460e5e02db5d25748dbd0539923a622d650afbfb5334d15a240545a7e1afc2f7ed172dd924fe
-
Filesize
14.4MB
MD5bf32265654cb54374dbf6047cd42a6e6
SHA17224ca9df6d412d4ce80cc6fc4b1128ee30d580d
SHA2562adaa532d28ef54737ec964b491fc90d55b16757eeff4d7032715523d7cf8aaf
SHA51274fabeaa65e7d59bcce22df38f9be2ecad8aca49c4554464d2f670ca384948c78cabefc75ae37cfd87f750f3cc188a9e3c9a7ccf632e01011e29acf6e410ae99