Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2022 18:25

General

  • Target

    0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe

  • Size

    130KB

  • MD5

    2ae08b2b339f8593d743991cce0c747c

  • SHA1

    d99acc1fc5702475f27c729be631fb0c4d2f1625

  • SHA256

    0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a

  • SHA512

    bc6c43377168db0d06a682e4f99187bd06f16b1da058e37090ae902ed8dd87fa68578fa17cf3cf9b223b91c5c648e8b3e492030f026a6253aa28efaaf16633f2

  • SSDEEP

    3072:YKiT13Tc5d/Lb4dc+oytXrlvfYa1f+Mxn5B:E1E/vD+Z2aJ+Mx

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @mr_golds)

C2

77.73.134.27:7161

Attributes
  • auth_value

    4b2de03af6b6ac513ac597c2e6c1ad51

Extracted

Family

redline

Botnet

install1part

C2

185.224.133.182:16382

Attributes
  • auth_value

    01759eb8d6120155c19b779c527fb1e2

Signatures

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe
    "C:\Users\Admin\AppData\Local\Temp\0f8b56af0b1be1247a5bf989a92eca657855d96e4b3b9eac1a109cbe8bfbd40a.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3760
  • C:\Users\Admin\AppData\Local\Temp\E302.exe
    C:\Users\Admin\AppData\Local\Temp\E302.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:102488
  • C:\Users\Admin\AppData\Local\Temp\F022.exe
    C:\Users\Admin\AppData\Local\Temp\F022.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:102540
  • C:\Users\Admin\AppData\Local\Temp\F98A.exe
    C:\Users\Admin\AppData\Local\Temp\F98A.exe
    1⤵
    • Executes dropped EXE
    PID:102608
  • C:\Users\Admin\AppData\Local\Temp\199.exe
    C:\Users\Admin\AppData\Local\Temp\199.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:102748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:102408
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:102804
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:46656
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:76056
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:102452
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:102484
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:102592
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:102612
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:102668
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:102740

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Credential Access

                      Credentials in Files

                      2
                      T1081

                      Discovery

                      Query Registry

                      2
                      T1012

                      Peripheral Device Discovery

                      1
                      T1120

                      System Information Discovery

                      1
                      T1082

                      Collection

                      Data from Local System

                      2
                      T1005

                      Command and Control

                      Web Service

                      1
                      T1102

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\199.exe
                        Filesize

                        2.6MB

                        MD5

                        529174498fbbf1c72fb39af656d5f98f

                        SHA1

                        439edbff12742da9e15da5ab4a2710f97f947a50

                        SHA256

                        9e4bb9e9b4a0bd622deb940906c082b65d299d3c768b4957c1a89a8f60572f28

                        SHA512

                        ad760ef8d26f645736a05d076baf98731ce99f3d8dd13f7828a09ade228c3da0ddefe50c7a8e9bc5b53488986c86aa708cbc1717e8ad1636e59b3f0f91141abe

                      • C:\Users\Admin\AppData\Local\Temp\199.exe
                        Filesize

                        2.6MB

                        MD5

                        529174498fbbf1c72fb39af656d5f98f

                        SHA1

                        439edbff12742da9e15da5ab4a2710f97f947a50

                        SHA256

                        9e4bb9e9b4a0bd622deb940906c082b65d299d3c768b4957c1a89a8f60572f28

                        SHA512

                        ad760ef8d26f645736a05d076baf98731ce99f3d8dd13f7828a09ade228c3da0ddefe50c7a8e9bc5b53488986c86aa708cbc1717e8ad1636e59b3f0f91141abe

                      • C:\Users\Admin\AppData\Local\Temp\E302.exe
                        Filesize

                        2.6MB

                        MD5

                        caa086e140d4ffbc78a1a4c91869a973

                        SHA1

                        8d5b4f00412169130ffba2167e502601b007b526

                        SHA256

                        bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8

                        SHA512

                        f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2

                      • C:\Users\Admin\AppData\Local\Temp\E302.exe
                        Filesize

                        2.6MB

                        MD5

                        caa086e140d4ffbc78a1a4c91869a973

                        SHA1

                        8d5b4f00412169130ffba2167e502601b007b526

                        SHA256

                        bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8

                        SHA512

                        f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2

                      • C:\Users\Admin\AppData\Local\Temp\F022.exe
                        Filesize

                        255KB

                        MD5

                        07ea3bc2b9eaacd002de4f59803ef234

                        SHA1

                        8a796069e5eac844f40b4487c80ed1c93316a331

                        SHA256

                        2302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1

                        SHA512

                        d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092

                      • C:\Users\Admin\AppData\Local\Temp\F022.exe
                        Filesize

                        255KB

                        MD5

                        07ea3bc2b9eaacd002de4f59803ef234

                        SHA1

                        8a796069e5eac844f40b4487c80ed1c93316a331

                        SHA256

                        2302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1

                        SHA512

                        d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092

                      • C:\Users\Admin\AppData\Local\Temp\F98A.exe
                        Filesize

                        337KB

                        MD5

                        25e6c3058f4e1331ad1d886f48170866

                        SHA1

                        dac4d0c2a39a76530426bef95ad5a5d10b4b625d

                        SHA256

                        c6e2deb30016057cf4fbe8aecdbbb7142332e3e561c98fb125797e3da6391506

                        SHA512

                        0df3e761e000f1c7bf2e698be541fdd46c9f4bf21cf7c150a4ad6ddb447e834f53447ab8bf70a3965d8c77d2795b988f93c7f5bafb83b67d8a60b674a7ceda64

                      • C:\Users\Admin\AppData\Local\Temp\F98A.exe
                        Filesize

                        337KB

                        MD5

                        25e6c3058f4e1331ad1d886f48170866

                        SHA1

                        dac4d0c2a39a76530426bef95ad5a5d10b4b625d

                        SHA256

                        c6e2deb30016057cf4fbe8aecdbbb7142332e3e561c98fb125797e3da6391506

                        SHA512

                        0df3e761e000f1c7bf2e698be541fdd46c9f4bf21cf7c150a4ad6ddb447e834f53447ab8bf70a3965d8c77d2795b988f93c7f5bafb83b67d8a60b674a7ceda64

                      • memory/3760-132-0x00000000005C8000-0x00000000005D9000-memory.dmp
                        Filesize

                        68KB

                      • memory/3760-136-0x0000000000400000-0x000000000057E000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/3760-135-0x00000000005C8000-0x00000000005D9000-memory.dmp
                        Filesize

                        68KB

                      • memory/3760-133-0x00000000006B0000-0x00000000006B9000-memory.dmp
                        Filesize

                        36KB

                      • memory/3760-134-0x0000000000400000-0x000000000057E000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/4524-137-0x0000000000000000-mapping.dmp
                      • memory/46656-173-0x0000000000560000-0x000000000056F000-memory.dmp
                        Filesize

                        60KB

                      • memory/46656-172-0x0000000000570000-0x0000000000579000-memory.dmp
                        Filesize

                        36KB

                      • memory/46656-170-0x0000000000000000-mapping.dmp
                      • memory/46656-206-0x0000000000570000-0x0000000000579000-memory.dmp
                        Filesize

                        36KB

                      • memory/76056-177-0x0000000000A30000-0x0000000000A35000-memory.dmp
                        Filesize

                        20KB

                      • memory/76056-207-0x0000000000A30000-0x0000000000A35000-memory.dmp
                        Filesize

                        20KB

                      • memory/76056-178-0x0000000000A20000-0x0000000000A29000-memory.dmp
                        Filesize

                        36KB

                      • memory/76056-176-0x0000000000000000-mapping.dmp
                      • memory/102408-180-0x0000000000400000-0x0000000000428000-memory.dmp
                        Filesize

                        160KB

                      • memory/102408-179-0x0000000000000000-mapping.dmp
                      • memory/102452-186-0x00000000010E0000-0x00000000010E6000-memory.dmp
                        Filesize

                        24KB

                      • memory/102452-187-0x00000000010D0000-0x00000000010DC000-memory.dmp
                        Filesize

                        48KB

                      • memory/102452-185-0x0000000000000000-mapping.dmp
                      • memory/102452-208-0x00000000010E0000-0x00000000010E6000-memory.dmp
                        Filesize

                        24KB

                      • memory/102484-209-0x00000000014E0000-0x0000000001502000-memory.dmp
                        Filesize

                        136KB

                      • memory/102484-191-0x00000000014E0000-0x0000000001502000-memory.dmp
                        Filesize

                        136KB

                      • memory/102484-192-0x00000000014B0000-0x00000000014D7000-memory.dmp
                        Filesize

                        156KB

                      • memory/102484-188-0x0000000000000000-mapping.dmp
                      • memory/102488-152-0x0000000005860000-0x000000000589C000-memory.dmp
                        Filesize

                        240KB

                      • memory/102488-150-0x00000000058D0000-0x00000000059DA000-memory.dmp
                        Filesize

                        1.0MB

                      • memory/102488-149-0x0000000005DA0000-0x00000000063B8000-memory.dmp
                        Filesize

                        6.1MB

                      • memory/102488-151-0x0000000005800000-0x0000000005812000-memory.dmp
                        Filesize

                        72KB

                      • memory/102488-141-0x0000000000400000-0x0000000000428000-memory.dmp
                        Filesize

                        160KB

                      • memory/102488-140-0x0000000000000000-mapping.dmp
                      • memory/102540-154-0x0000000000949000-0x0000000000973000-memory.dmp
                        Filesize

                        168KB

                      • memory/102540-175-0x0000000007780000-0x0000000007CAC000-memory.dmp
                        Filesize

                        5.2MB

                      • memory/102540-174-0x00000000075B0000-0x0000000007772000-memory.dmp
                        Filesize

                        1.8MB

                      • memory/102540-171-0x00000000073A0000-0x00000000073BE000-memory.dmp
                        Filesize

                        120KB

                      • memory/102540-146-0x0000000000000000-mapping.dmp
                      • memory/102540-153-0x0000000004CB0000-0x0000000005254000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/102540-155-0x00000000006E0000-0x0000000000718000-memory.dmp
                        Filesize

                        224KB

                      • memory/102540-156-0x0000000000400000-0x000000000059A000-memory.dmp
                        Filesize

                        1.6MB

                      • memory/102540-163-0x0000000006590000-0x0000000006606000-memory.dmp
                        Filesize

                        472KB

                      • memory/102540-162-0x0000000006410000-0x0000000006460000-memory.dmp
                        Filesize

                        320KB

                      • memory/102540-161-0x0000000005D50000-0x0000000005DB6000-memory.dmp
                        Filesize

                        408KB

                      • memory/102540-189-0x0000000000949000-0x0000000000973000-memory.dmp
                        Filesize

                        168KB

                      • memory/102540-190-0x0000000000400000-0x000000000059A000-memory.dmp
                        Filesize

                        1.6MB

                      • memory/102540-160-0x0000000005CB0000-0x0000000005D42000-memory.dmp
                        Filesize

                        584KB

                      • memory/102592-195-0x0000000000410000-0x0000000000419000-memory.dmp
                        Filesize

                        36KB

                      • memory/102592-210-0x0000000000420000-0x0000000000425000-memory.dmp
                        Filesize

                        20KB

                      • memory/102592-194-0x0000000000420000-0x0000000000425000-memory.dmp
                        Filesize

                        20KB

                      • memory/102592-193-0x0000000000000000-mapping.dmp
                      • memory/102608-157-0x0000000000000000-mapping.dmp
                      • memory/102612-196-0x0000000000000000-mapping.dmp
                      • memory/102612-197-0x00000000011E0000-0x00000000011E6000-memory.dmp
                        Filesize

                        24KB

                      • memory/102612-198-0x00000000011D0000-0x00000000011DB000-memory.dmp
                        Filesize

                        44KB

                      • memory/102612-211-0x00000000011E0000-0x00000000011E6000-memory.dmp
                        Filesize

                        24KB

                      • memory/102668-199-0x0000000000000000-mapping.dmp
                      • memory/102668-200-0x00000000003D0000-0x00000000003D7000-memory.dmp
                        Filesize

                        28KB

                      • memory/102668-201-0x00000000003C0000-0x00000000003CD000-memory.dmp
                        Filesize

                        52KB

                      • memory/102668-212-0x00000000003D0000-0x00000000003D7000-memory.dmp
                        Filesize

                        28KB

                      • memory/102740-203-0x00000000009F0000-0x00000000009F8000-memory.dmp
                        Filesize

                        32KB

                      • memory/102740-204-0x00000000009E0000-0x00000000009EB000-memory.dmp
                        Filesize

                        44KB

                      • memory/102740-202-0x0000000000000000-mapping.dmp
                      • memory/102740-213-0x00000000009F0000-0x00000000009F8000-memory.dmp
                        Filesize

                        32KB

                      • memory/102748-164-0x0000000000000000-mapping.dmp
                      • memory/102804-167-0x0000000000000000-mapping.dmp
                      • memory/102804-168-0x0000000000CA0000-0x0000000000CA7000-memory.dmp
                        Filesize

                        28KB

                      • memory/102804-169-0x0000000000C90000-0x0000000000C9B000-memory.dmp
                        Filesize

                        44KB

                      • memory/102804-205-0x0000000000CA0000-0x0000000000CA7000-memory.dmp
                        Filesize

                        28KB