Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2022 20:58

General

  • Target

    b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe

  • Size

    128KB

  • MD5

    d12a94ceeea6d180171e87c529e229da

  • SHA1

    0081ef3d81851a16adbae7954cf2f9df52156723

  • SHA256

    b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c

  • SHA512

    9f4b336b6556a7ff44ba965513b7f533f42c05041ea776f0a796160d6ca73dcf60c53041806797d93e23f629a244a2b724318bd702e1dd6aa3bf08fa120856a6

  • SSDEEP

    3072:LgwZOT551mJex7AfR9BVmOgTTFucZzGnGL5B:srmcitUxBuS

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @mr_golds)

C2

77.73.134.27:7161

Attributes
  • auth_value

    4b2de03af6b6ac513ac597c2e6c1ad51

Signatures

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe
    "C:\Users\Admin\AppData\Local\Temp\b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4908
  • C:\Users\Admin\AppData\Local\Temp\81C3.exe
    C:\Users\Admin\AppData\Local\Temp\81C3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:102768
  • C:\Users\Admin\AppData\Local\Temp\8ADC.exe
    C:\Users\Admin\AppData\Local\Temp\8ADC.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:43184
  • C:\Users\Admin\AppData\Local\Temp\9378.exe
    C:\Users\Admin\AppData\Local\Temp\9378.exe
    1⤵
    • Executes dropped EXE
    PID:68160
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:75240
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:83480
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:92140
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:102788
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:102868
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:102908
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:102940
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:102968
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:103012
                    • C:\Users\Admin\AppData\Roaming\rcritdv
                      C:\Users\Admin\AppData\Roaming\rcritdv
                      1⤵
                      • Executes dropped EXE
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: MapViewOfSection
                      PID:103224

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Credential Access

                    Credentials in Files

                    2
                    T1081

                    Discovery

                    Query Registry

                    2
                    T1012

                    Peripheral Device Discovery

                    1
                    T1120

                    System Information Discovery

                    1
                    T1082

                    Collection

                    Data from Local System

                    2
                    T1005

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\81C3.exe
                      Filesize

                      2.6MB

                      MD5

                      caa086e140d4ffbc78a1a4c91869a973

                      SHA1

                      8d5b4f00412169130ffba2167e502601b007b526

                      SHA256

                      bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8

                      SHA512

                      f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2

                    • C:\Users\Admin\AppData\Local\Temp\81C3.exe
                      Filesize

                      2.6MB

                      MD5

                      caa086e140d4ffbc78a1a4c91869a973

                      SHA1

                      8d5b4f00412169130ffba2167e502601b007b526

                      SHA256

                      bd245b6180cf30b67108be0b3afad151434f065c5590a3dae5d8568146090dc8

                      SHA512

                      f94286f599ae3d87e06f1df6f8794e0c7e968237dfa734e69ee68432ef45eb5b7eb3b70287815b0b9225eb5b86f2a010a8c9708e54799c7c12a0d346ec4b1ff2

                    • C:\Users\Admin\AppData\Local\Temp\8ADC.exe
                      Filesize

                      255KB

                      MD5

                      07ea3bc2b9eaacd002de4f59803ef234

                      SHA1

                      8a796069e5eac844f40b4487c80ed1c93316a331

                      SHA256

                      2302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1

                      SHA512

                      d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092

                    • C:\Users\Admin\AppData\Local\Temp\8ADC.exe
                      Filesize

                      255KB

                      MD5

                      07ea3bc2b9eaacd002de4f59803ef234

                      SHA1

                      8a796069e5eac844f40b4487c80ed1c93316a331

                      SHA256

                      2302396062d7523a230f0a81ada322bb8907e11d006c0ec29a37821dd084bfe1

                      SHA512

                      d89e46145536d9b5fc310b72b24a4b1790100bbfd18b39a48dd10938255233132f0d87190c4c84c2b78076d9b0a39c4c9f6f27ece40a9b3f93b3e65aaca2c092

                    • C:\Users\Admin\AppData\Local\Temp\9378.exe
                      Filesize

                      337KB

                      MD5

                      6a0e75ac647321c320ddfd7c194b090a

                      SHA1

                      3f1cc8f4d6b09a12d7cd9024a1e8732a6c42b6f8

                      SHA256

                      0cbf6ed1553e6154f2a13bcd7ce1e66e50fc75aa629bd25038779cf97c860753

                      SHA512

                      c80a23045b24db08f4db8d9607f9d11ab5bdf3f4ca62c7201467d898b1cb42d08343aba8909b89a6cb5a6fe9a48bb4b12d3badb8220e10a0f4ca343131e68a41

                    • C:\Users\Admin\AppData\Local\Temp\9378.exe
                      Filesize

                      337KB

                      MD5

                      6a0e75ac647321c320ddfd7c194b090a

                      SHA1

                      3f1cc8f4d6b09a12d7cd9024a1e8732a6c42b6f8

                      SHA256

                      0cbf6ed1553e6154f2a13bcd7ce1e66e50fc75aa629bd25038779cf97c860753

                      SHA512

                      c80a23045b24db08f4db8d9607f9d11ab5bdf3f4ca62c7201467d898b1cb42d08343aba8909b89a6cb5a6fe9a48bb4b12d3badb8220e10a0f4ca343131e68a41

                    • C:\Users\Admin\AppData\Roaming\rcritdv
                      Filesize

                      128KB

                      MD5

                      d12a94ceeea6d180171e87c529e229da

                      SHA1

                      0081ef3d81851a16adbae7954cf2f9df52156723

                      SHA256

                      b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c

                      SHA512

                      9f4b336b6556a7ff44ba965513b7f533f42c05041ea776f0a796160d6ca73dcf60c53041806797d93e23f629a244a2b724318bd702e1dd6aa3bf08fa120856a6

                    • C:\Users\Admin\AppData\Roaming\rcritdv
                      Filesize

                      128KB

                      MD5

                      d12a94ceeea6d180171e87c529e229da

                      SHA1

                      0081ef3d81851a16adbae7954cf2f9df52156723

                      SHA256

                      b370bb3e4d5bc2dbddc11d6a9d3263a71d8ec67cd23e1d510f78a5b0a17f7b1c

                      SHA512

                      9f4b336b6556a7ff44ba965513b7f533f42c05041ea776f0a796160d6ca73dcf60c53041806797d93e23f629a244a2b724318bd702e1dd6aa3bf08fa120856a6

                    • memory/1056-136-0x0000000000000000-mapping.dmp
                    • memory/4908-135-0x0000000000400000-0x000000000057D000-memory.dmp
                      Filesize

                      1.5MB

                    • memory/4908-134-0x0000000000400000-0x000000000057D000-memory.dmp
                      Filesize

                      1.5MB

                    • memory/4908-132-0x0000000000748000-0x0000000000758000-memory.dmp
                      Filesize

                      64KB

                    • memory/4908-133-0x0000000000710000-0x0000000000719000-memory.dmp
                      Filesize

                      36KB

                    • memory/43184-143-0x00000000021B0000-0x00000000021E8000-memory.dmp
                      Filesize

                      224KB

                    • memory/43184-187-0x0000000006870000-0x000000000688E000-memory.dmp
                      Filesize

                      120KB

                    • memory/43184-145-0x0000000004CA0000-0x0000000005244000-memory.dmp
                      Filesize

                      5.6MB

                    • memory/43184-144-0x0000000000400000-0x000000000059A000-memory.dmp
                      Filesize

                      1.6MB

                    • memory/43184-172-0x00000000064B0000-0x0000000006542000-memory.dmp
                      Filesize

                      584KB

                    • memory/43184-150-0x00000000052F0000-0x0000000005908000-memory.dmp
                      Filesize

                      6.1MB

                    • memory/43184-151-0x00000000059A0000-0x00000000059B2000-memory.dmp
                      Filesize

                      72KB

                    • memory/43184-152-0x00000000059C0000-0x0000000005ACA000-memory.dmp
                      Filesize

                      1.0MB

                    • memory/43184-153-0x0000000005B10000-0x0000000005B4C000-memory.dmp
                      Filesize

                      240KB

                    • memory/43184-139-0x0000000000000000-mapping.dmp
                    • memory/43184-142-0x0000000000829000-0x0000000000853000-memory.dmp
                      Filesize

                      168KB

                    • memory/43184-185-0x00000000067D0000-0x0000000006846000-memory.dmp
                      Filesize

                      472KB

                    • memory/43184-188-0x0000000000829000-0x0000000000853000-memory.dmp
                      Filesize

                      168KB

                    • memory/43184-195-0x0000000000400000-0x000000000059A000-memory.dmp
                      Filesize

                      1.6MB

                    • memory/43184-191-0x00000000069B0000-0x0000000006B72000-memory.dmp
                      Filesize

                      1.8MB

                    • memory/43184-192-0x0000000006B80000-0x00000000070AC000-memory.dmp
                      Filesize

                      5.2MB

                    • memory/43184-193-0x00000000084F0000-0x0000000008540000-memory.dmp
                      Filesize

                      320KB

                    • memory/43184-162-0x0000000005DF0000-0x0000000005E56000-memory.dmp
                      Filesize

                      408KB

                    • memory/43184-194-0x0000000000829000-0x0000000000853000-memory.dmp
                      Filesize

                      168KB

                    • memory/68160-146-0x0000000000000000-mapping.dmp
                    • memory/75240-158-0x0000000000F10000-0x0000000000F1B000-memory.dmp
                      Filesize

                      44KB

                    • memory/75240-196-0x0000000000F20000-0x0000000000F27000-memory.dmp
                      Filesize

                      28KB

                    • memory/75240-155-0x0000000000F20000-0x0000000000F27000-memory.dmp
                      Filesize

                      28KB

                    • memory/75240-149-0x0000000000000000-mapping.dmp
                    • memory/83480-154-0x0000000000000000-mapping.dmp
                    • memory/83480-197-0x0000000000DE0000-0x0000000000DE9000-memory.dmp
                      Filesize

                      36KB

                    • memory/83480-157-0x0000000000DD0000-0x0000000000DDF000-memory.dmp
                      Filesize

                      60KB

                    • memory/83480-156-0x0000000000DE0000-0x0000000000DE9000-memory.dmp
                      Filesize

                      36KB

                    • memory/92140-198-0x0000000000DA0000-0x0000000000DA5000-memory.dmp
                      Filesize

                      20KB

                    • memory/92140-161-0x0000000000D90000-0x0000000000D99000-memory.dmp
                      Filesize

                      36KB

                    • memory/92140-160-0x0000000000DA0000-0x0000000000DA5000-memory.dmp
                      Filesize

                      20KB

                    • memory/92140-159-0x0000000000000000-mapping.dmp
                    • memory/102768-164-0x0000000000400000-0x0000000000428000-memory.dmp
                      Filesize

                      160KB

                    • memory/102768-163-0x0000000000000000-mapping.dmp
                    • memory/102788-171-0x0000000000EE0000-0x0000000000EEC000-memory.dmp
                      Filesize

                      48KB

                    • memory/102788-166-0x0000000000000000-mapping.dmp
                    • memory/102788-170-0x0000000000EF0000-0x0000000000EF6000-memory.dmp
                      Filesize

                      24KB

                    • memory/102788-199-0x0000000000EF0000-0x0000000000EF6000-memory.dmp
                      Filesize

                      24KB

                    • memory/102868-200-0x0000000000A00000-0x0000000000A22000-memory.dmp
                      Filesize

                      136KB

                    • memory/102868-173-0x0000000000000000-mapping.dmp
                    • memory/102868-174-0x0000000000A00000-0x0000000000A22000-memory.dmp
                      Filesize

                      136KB

                    • memory/102868-175-0x00000000007C0000-0x00000000007E7000-memory.dmp
                      Filesize

                      156KB

                    • memory/102908-176-0x0000000000000000-mapping.dmp
                    • memory/102908-201-0x0000000001230000-0x0000000001235000-memory.dmp
                      Filesize

                      20KB

                    • memory/102908-178-0x0000000001220000-0x0000000001229000-memory.dmp
                      Filesize

                      36KB

                    • memory/102908-177-0x0000000001230000-0x0000000001235000-memory.dmp
                      Filesize

                      20KB

                    • memory/102940-202-0x0000000000C80000-0x0000000000C86000-memory.dmp
                      Filesize

                      24KB

                    • memory/102940-180-0x0000000000C80000-0x0000000000C86000-memory.dmp
                      Filesize

                      24KB

                    • memory/102940-179-0x0000000000000000-mapping.dmp
                    • memory/102940-181-0x0000000000C70000-0x0000000000C7B000-memory.dmp
                      Filesize

                      44KB

                    • memory/102968-203-0x00000000006B0000-0x00000000006B7000-memory.dmp
                      Filesize

                      28KB

                    • memory/102968-183-0x00000000006B0000-0x00000000006B7000-memory.dmp
                      Filesize

                      28KB

                    • memory/102968-182-0x0000000000000000-mapping.dmp
                    • memory/102968-184-0x00000000006A0000-0x00000000006AD000-memory.dmp
                      Filesize

                      52KB

                    • memory/103012-189-0x00000000007D0000-0x00000000007D8000-memory.dmp
                      Filesize

                      32KB

                    • memory/103012-204-0x00000000007D0000-0x00000000007D8000-memory.dmp
                      Filesize

                      32KB

                    • memory/103012-186-0x0000000000000000-mapping.dmp
                    • memory/103012-190-0x00000000007C0000-0x00000000007CB000-memory.dmp
                      Filesize

                      44KB

                    • memory/103224-207-0x00000000005A8000-0x00000000005B8000-memory.dmp
                      Filesize

                      64KB

                    • memory/103224-208-0x0000000000400000-0x000000000057D000-memory.dmp
                      Filesize

                      1.5MB

                    • memory/103224-209-0x0000000000400000-0x000000000057D000-memory.dmp
                      Filesize

                      1.5MB