Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe
Resource
win10v2004-20220812-en
General
-
Target
b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe
-
Size
128KB
-
MD5
d12a94ceeea6d180171e87c529e229da
-
SHA1
0081ef3d81851a16adbae7954cf2f9df52156723
-
SHA256
b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c
-
SHA512
9f4b336b6556a7ff44ba965513b7f533f42c05041ea776f0a796160d6ca73dcf60c53041806797d93e23f629a244a2b724318bd702e1dd6aa3bf08fa120856a6
-
SSDEEP
3072:LgwZOT551mJex7AfR9BVmOgTTFucZzGnGL5B:srmcitUxBuS
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @mr_golds)
77.73.134.27:7161
-
auth_value
4b2de03af6b6ac513ac597c2e6c1ad51
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4908-133-0x0000000000710000-0x0000000000719000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/102768-164-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
81C3.exe8ADC.exe9378.exercritdvpid process 1056 81C3.exe 43184 8ADC.exe 68160 9378.exe 103224 rcritdv -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
81C3.exedescription pid process target process PID 1056 set thread context of 102768 1056 81C3.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exercritdvdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rcritdv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rcritdv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rcritdv -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exepid process 4908 b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe 4908 b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2520 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exercritdvpid process 4908 b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 103224 rcritdv -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
8ADC.exeAppLaunch.exedescription pid process Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeDebugPrivilege 43184 8ADC.exe Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeDebugPrivilege 102768 AppLaunch.exe Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
81C3.exedescription pid process target process PID 2520 wrote to memory of 1056 2520 81C3.exe PID 2520 wrote to memory of 1056 2520 81C3.exe PID 2520 wrote to memory of 1056 2520 81C3.exe PID 2520 wrote to memory of 43184 2520 8ADC.exe PID 2520 wrote to memory of 43184 2520 8ADC.exe PID 2520 wrote to memory of 43184 2520 8ADC.exe PID 2520 wrote to memory of 68160 2520 9378.exe PID 2520 wrote to memory of 68160 2520 9378.exe PID 2520 wrote to memory of 68160 2520 9378.exe PID 2520 wrote to memory of 75240 2520 explorer.exe PID 2520 wrote to memory of 75240 2520 explorer.exe PID 2520 wrote to memory of 75240 2520 explorer.exe PID 2520 wrote to memory of 75240 2520 explorer.exe PID 2520 wrote to memory of 83480 2520 explorer.exe PID 2520 wrote to memory of 83480 2520 explorer.exe PID 2520 wrote to memory of 83480 2520 explorer.exe PID 2520 wrote to memory of 92140 2520 explorer.exe PID 2520 wrote to memory of 92140 2520 explorer.exe PID 2520 wrote to memory of 92140 2520 explorer.exe PID 2520 wrote to memory of 92140 2520 explorer.exe PID 1056 wrote to memory of 102768 1056 81C3.exe AppLaunch.exe PID 1056 wrote to memory of 102768 1056 81C3.exe AppLaunch.exe PID 1056 wrote to memory of 102768 1056 81C3.exe AppLaunch.exe PID 1056 wrote to memory of 102768 1056 81C3.exe AppLaunch.exe PID 2520 wrote to memory of 102788 2520 explorer.exe PID 2520 wrote to memory of 102788 2520 explorer.exe PID 2520 wrote to memory of 102788 2520 explorer.exe PID 1056 wrote to memory of 102768 1056 81C3.exe AppLaunch.exe PID 2520 wrote to memory of 102868 2520 explorer.exe PID 2520 wrote to memory of 102868 2520 explorer.exe PID 2520 wrote to memory of 102868 2520 explorer.exe PID 2520 wrote to memory of 102868 2520 explorer.exe PID 2520 wrote to memory of 102908 2520 explorer.exe PID 2520 wrote to memory of 102908 2520 explorer.exe PID 2520 wrote to memory of 102908 2520 explorer.exe PID 2520 wrote to memory of 102908 2520 explorer.exe PID 2520 wrote to memory of 102940 2520 explorer.exe PID 2520 wrote to memory of 102940 2520 explorer.exe PID 2520 wrote to memory of 102940 2520 explorer.exe PID 2520 wrote to memory of 102940 2520 explorer.exe PID 2520 wrote to memory of 102968 2520 explorer.exe PID 2520 wrote to memory of 102968 2520 explorer.exe PID 2520 wrote to memory of 102968 2520 explorer.exe PID 2520 wrote to memory of 103012 2520 explorer.exe PID 2520 wrote to memory of 103012 2520 explorer.exe PID 2520 wrote to memory of 103012 2520 explorer.exe PID 2520 wrote to memory of 103012 2520 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe"C:\Users\Admin\AppData\Local\Temp\b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\81C3.exeC:\Users\Admin\AppData\Local\Temp\81C3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\8ADC.exeC:\Users\Admin\AppData\Local\Temp\8ADC.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\9378.exeC:\Users\Admin\AppData\Local\Temp\9378.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Roaming\rcritdvC:\Users\Admin\AppData\Roaming\rcritdv1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\81C3.exeFilesize
2.6MB
MD5caa086e140d4ffbc78a1a4c91869a973
SHA18d5b4f00412169130ffba2167e502601b007b526
SHA256bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8
SHA512f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2
-
C:\Users\Admin\AppData\Local\Temp\81C3.exeFilesize
2.6MB
MD5caa086e140d4ffbc78a1a4c91869a973
SHA18d5b4f00412169130ffba2167e502601b007b526
SHA256bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8
SHA512f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2
-
C:\Users\Admin\AppData\Local\Temp\8ADC.exeFilesize
255KB
MD507ea3bc2b9eaacd002de4f59803ef234
SHA18a796069e5eac844f40b4487c80ed1c93316a331
SHA2562302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1
SHA512d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092
-
C:\Users\Admin\AppData\Local\Temp\8ADC.exeFilesize
255KB
MD507ea3bc2b9eaacd002de4f59803ef234
SHA18a796069e5eac844f40b4487c80ed1c93316a331
SHA2562302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1
SHA512d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092
-
C:\Users\Admin\AppData\Local\Temp\9378.exeFilesize
337KB
MD56a0e75ac647321c320ddfd7c194b090a
SHA13f1cc8f4d6b09a12d7cd9024a1e8732a6c42b6f8
SHA2560cbf6ed1553e6154f2a13bcd7ce1e66e50fc75aa629bd25038779cf97c860753
SHA512c80a23045b24db08f4db8d9607f9d11ab5bdf3f4ca62c7201467d898b1cb42d08343aba8909b89a6cb5a6fe9a48bb4b12d3badb8220e10a0f4ca343131e68a41
-
C:\Users\Admin\AppData\Local\Temp\9378.exeFilesize
337KB
MD56a0e75ac647321c320ddfd7c194b090a
SHA13f1cc8f4d6b09a12d7cd9024a1e8732a6c42b6f8
SHA2560cbf6ed1553e6154f2a13bcd7ce1e66e50fc75aa629bd25038779cf97c860753
SHA512c80a23045b24db08f4db8d9607f9d11ab5bdf3f4ca62c7201467d898b1cb42d08343aba8909b89a6cb5a6fe9a48bb4b12d3badb8220e10a0f4ca343131e68a41
-
C:\Users\Admin\AppData\Roaming\rcritdvFilesize
128KB
MD5d12a94ceeea6d180171e87c529e229da
SHA10081ef3d81851a16adbae7954cf2f9df52156723
SHA256b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c
SHA5129f4b336b6556a7ff44ba965513b7f533f42c05041ea776f0a796160d6ca73dcf60c53041806797d93e23f629a244a2b724318bd702e1dd6aa3bf08fa120856a6
-
C:\Users\Admin\AppData\Roaming\rcritdvFilesize
128KB
MD5d12a94ceeea6d180171e87c529e229da
SHA10081ef3d81851a16adbae7954cf2f9df52156723
SHA256b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c
SHA5129f4b336b6556a7ff44ba965513b7f533f42c05041ea776f0a796160d6ca73dcf60c53041806797d93e23f629a244a2b724318bd702e1dd6aa3bf08fa120856a6
-
memory/1056-136-0x0000000000000000-mapping.dmp
-
memory/4908-135-0x0000000000400000-0x000000000057D000-memory.dmpFilesize
1.5MB
-
memory/4908-134-0x0000000000400000-0x000000000057D000-memory.dmpFilesize
1.5MB
-
memory/4908-132-0x0000000000748000-0x0000000000758000-memory.dmpFilesize
64KB
-
memory/4908-133-0x0000000000710000-0x0000000000719000-memory.dmpFilesize
36KB
-
memory/43184-143-0x00000000021B0000-0x00000000021E8000-memory.dmpFilesize
224KB
-
memory/43184-187-0x0000000006870000-0x000000000688E000-memory.dmpFilesize
120KB
-
memory/43184-145-0x0000000004CA0000-0x0000000005244000-memory.dmpFilesize
5.6MB
-
memory/43184-144-0x0000000000400000-0x000000000059A000-memory.dmpFilesize
1.6MB
-
memory/43184-172-0x00000000064B0000-0x0000000006542000-memory.dmpFilesize
584KB
-
memory/43184-150-0x00000000052F0000-0x0000000005908000-memory.dmpFilesize
6.1MB
-
memory/43184-151-0x00000000059A0000-0x00000000059B2000-memory.dmpFilesize
72KB
-
memory/43184-152-0x00000000059C0000-0x0000000005ACA000-memory.dmpFilesize
1.0MB
-
memory/43184-153-0x0000000005B10000-0x0000000005B4C000-memory.dmpFilesize
240KB
-
memory/43184-139-0x0000000000000000-mapping.dmp
-
memory/43184-142-0x0000000000829000-0x0000000000853000-memory.dmpFilesize
168KB
-
memory/43184-185-0x00000000067D0000-0x0000000006846000-memory.dmpFilesize
472KB
-
memory/43184-188-0x0000000000829000-0x0000000000853000-memory.dmpFilesize
168KB
-
memory/43184-195-0x0000000000400000-0x000000000059A000-memory.dmpFilesize
1.6MB
-
memory/43184-191-0x00000000069B0000-0x0000000006B72000-memory.dmpFilesize
1.8MB
-
memory/43184-192-0x0000000006B80000-0x00000000070AC000-memory.dmpFilesize
5.2MB
-
memory/43184-193-0x00000000084F0000-0x0000000008540000-memory.dmpFilesize
320KB
-
memory/43184-162-0x0000000005DF0000-0x0000000005E56000-memory.dmpFilesize
408KB
-
memory/43184-194-0x0000000000829000-0x0000000000853000-memory.dmpFilesize
168KB
-
memory/68160-146-0x0000000000000000-mapping.dmp
-
memory/75240-158-0x0000000000F10000-0x0000000000F1B000-memory.dmpFilesize
44KB
-
memory/75240-196-0x0000000000F20000-0x0000000000F27000-memory.dmpFilesize
28KB
-
memory/75240-155-0x0000000000F20000-0x0000000000F27000-memory.dmpFilesize
28KB
-
memory/75240-149-0x0000000000000000-mapping.dmp
-
memory/83480-154-0x0000000000000000-mapping.dmp
-
memory/83480-197-0x0000000000DE0000-0x0000000000DE9000-memory.dmpFilesize
36KB
-
memory/83480-157-0x0000000000DD0000-0x0000000000DDF000-memory.dmpFilesize
60KB
-
memory/83480-156-0x0000000000DE0000-0x0000000000DE9000-memory.dmpFilesize
36KB
-
memory/92140-198-0x0000000000DA0000-0x0000000000DA5000-memory.dmpFilesize
20KB
-
memory/92140-161-0x0000000000D90000-0x0000000000D99000-memory.dmpFilesize
36KB
-
memory/92140-160-0x0000000000DA0000-0x0000000000DA5000-memory.dmpFilesize
20KB
-
memory/92140-159-0x0000000000000000-mapping.dmp
-
memory/102768-164-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/102768-163-0x0000000000000000-mapping.dmp
-
memory/102788-171-0x0000000000EE0000-0x0000000000EEC000-memory.dmpFilesize
48KB
-
memory/102788-166-0x0000000000000000-mapping.dmp
-
memory/102788-170-0x0000000000EF0000-0x0000000000EF6000-memory.dmpFilesize
24KB
-
memory/102788-199-0x0000000000EF0000-0x0000000000EF6000-memory.dmpFilesize
24KB
-
memory/102868-200-0x0000000000A00000-0x0000000000A22000-memory.dmpFilesize
136KB
-
memory/102868-173-0x0000000000000000-mapping.dmp
-
memory/102868-174-0x0000000000A00000-0x0000000000A22000-memory.dmpFilesize
136KB
-
memory/102868-175-0x00000000007C0000-0x00000000007E7000-memory.dmpFilesize
156KB
-
memory/102908-176-0x0000000000000000-mapping.dmp
-
memory/102908-201-0x0000000001230000-0x0000000001235000-memory.dmpFilesize
20KB
-
memory/102908-178-0x0000000001220000-0x0000000001229000-memory.dmpFilesize
36KB
-
memory/102908-177-0x0000000001230000-0x0000000001235000-memory.dmpFilesize
20KB
-
memory/102940-202-0x0000000000C80000-0x0000000000C86000-memory.dmpFilesize
24KB
-
memory/102940-180-0x0000000000C80000-0x0000000000C86000-memory.dmpFilesize
24KB
-
memory/102940-179-0x0000000000000000-mapping.dmp
-
memory/102940-181-0x0000000000C70000-0x0000000000C7B000-memory.dmpFilesize
44KB
-
memory/102968-203-0x00000000006B0000-0x00000000006B7000-memory.dmpFilesize
28KB
-
memory/102968-183-0x00000000006B0000-0x00000000006B7000-memory.dmpFilesize
28KB
-
memory/102968-182-0x0000000000000000-mapping.dmp
-
memory/102968-184-0x00000000006A0000-0x00000000006AD000-memory.dmpFilesize
52KB
-
memory/103012-189-0x00000000007D0000-0x00000000007D8000-memory.dmpFilesize
32KB
-
memory/103012-204-0x00000000007D0000-0x00000000007D8000-memory.dmpFilesize
32KB
-
memory/103012-186-0x0000000000000000-mapping.dmp
-
memory/103012-190-0x00000000007C0000-0x00000000007CB000-memory.dmpFilesize
44KB
-
memory/103224-207-0x00000000005A8000-0x00000000005B8000-memory.dmpFilesize
64KB
-
memory/103224-208-0x0000000000400000-0x000000000057D000-memory.dmpFilesize
1.5MB
-
memory/103224-209-0x0000000000400000-0x000000000057D000-memory.dmpFilesize
1.5MB