Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2022, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
356KB
-
MD5
5e55c29ef2374a155d6d0b982d8da876
-
SHA1
1f63135197e92529290592791adb61c095c69707
-
SHA256
1e6ad44f556fd90565bd2318291f94e5250306c5e988343ff259c6b4cb466f53
-
SHA512
64ca111cac0ca2cb8326198efe072e507f1eead65facd284646f9c37a04910015e449f9d905d45b2b262d63793b493a0cbb41ad045b9d87e5a3d9842fe4c4043
-
SSDEEP
1536:cI47GyTGCwiSnmQUt0LB1w4s5gG2HFjJL:cvGyYiSDnt1wx5h2lN
Malware Config
Extracted
redline
Neo2
yarbiegishola.xyz:80
vingerdatol.xyz:80
amikshenale.xyz:80
-
auth_value
194c8224e21516df70bb251b3601c4d4
Signatures
-
Detects Smokeloader packer 3 IoCs
resource yara_rule behavioral2/memory/4748-168-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4748-170-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4748-171-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1072-150-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 1848 SETUP_~1.EXE 3184 Gukxmmmmanagementelectronic_1s.exe 1072 SETUP_~1.EXE 4748 Gukxmmmmanagementelectronic_1s.exe 5068 2495.exe 1732 ReNamer_12.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Gukxmmmmanagementelectronic_1s.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 2495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" 2495.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1848 set thread context of 1072 1848 SETUP_~1.EXE 89 PID 3184 set thread context of 4748 3184 Gukxmmmmanagementelectronic_1s.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2520 1008 WerFault.exe 94 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Gukxmmmmanagementelectronic_1s.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Gukxmmmmanagementelectronic_1s.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Gukxmmmmanagementelectronic_1s.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3212 powershell.exe 3212 powershell.exe 1368 powershell.exe 1368 powershell.exe 1072 SETUP_~1.EXE 1072 SETUP_~1.EXE 4748 Gukxmmmmanagementelectronic_1s.exe 4748 Gukxmmmmanagementelectronic_1s.exe 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4748 Gukxmmmmanagementelectronic_1s.exe 2792 Process not Found 2792 Process not Found 2792 Process not Found 2792 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1848 SETUP_~1.EXE Token: SeDebugPrivilege 3212 powershell.exe Token: SeDebugPrivilege 3184 Gukxmmmmanagementelectronic_1s.exe Token: SeDebugPrivilege 1368 powershell.exe Token: SeDebugPrivilege 1072 SETUP_~1.EXE Token: SeShutdownPrivilege 2792 Process not Found Token: SeCreatePagefilePrivilege 2792 Process not Found -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1848 1944 file.exe 76 PID 1944 wrote to memory of 1848 1944 file.exe 76 PID 1944 wrote to memory of 1848 1944 file.exe 76 PID 1848 wrote to memory of 3212 1848 SETUP_~1.EXE 83 PID 1848 wrote to memory of 3212 1848 SETUP_~1.EXE 83 PID 1848 wrote to memory of 3212 1848 SETUP_~1.EXE 83 PID 1848 wrote to memory of 3184 1848 SETUP_~1.EXE 88 PID 1848 wrote to memory of 3184 1848 SETUP_~1.EXE 88 PID 1848 wrote to memory of 3184 1848 SETUP_~1.EXE 88 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 1848 wrote to memory of 1072 1848 SETUP_~1.EXE 89 PID 3184 wrote to memory of 1368 3184 Gukxmmmmanagementelectronic_1s.exe 90 PID 3184 wrote to memory of 1368 3184 Gukxmmmmanagementelectronic_1s.exe 90 PID 3184 wrote to memory of 1368 3184 Gukxmmmmanagementelectronic_1s.exe 90 PID 3184 wrote to memory of 4748 3184 Gukxmmmmanagementelectronic_1s.exe 92 PID 3184 wrote to memory of 4748 3184 Gukxmmmmanagementelectronic_1s.exe 92 PID 3184 wrote to memory of 4748 3184 Gukxmmmmanagementelectronic_1s.exe 92 PID 3184 wrote to memory of 4748 3184 Gukxmmmmanagementelectronic_1s.exe 92 PID 3184 wrote to memory of 4748 3184 Gukxmmmmanagementelectronic_1s.exe 92 PID 3184 wrote to memory of 4748 3184 Gukxmmmmanagementelectronic_1s.exe 92 PID 2792 wrote to memory of 5068 2792 Process not Found 93 PID 2792 wrote to memory of 5068 2792 Process not Found 93 PID 2792 wrote to memory of 1008 2792 Process not Found 94 PID 2792 wrote to memory of 1008 2792 Process not Found 94 PID 2792 wrote to memory of 1008 2792 Process not Found 94 PID 2792 wrote to memory of 1008 2792 Process not Found 94 PID 2792 wrote to memory of 708 2792 Process not Found 97 PID 2792 wrote to memory of 708 2792 Process not Found 97 PID 2792 wrote to memory of 708 2792 Process not Found 97 PID 5068 wrote to memory of 1732 5068 2495.exe 99 PID 5068 wrote to memory of 1732 5068 2495.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\Gukxmmmmanagementelectronic_1s.exe"C:\Users\Admin\AppData\Local\Temp\Gukxmmmmanagementelectronic_1s.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\Gukxmmmmanagementelectronic_1s.exeC:\Users\Admin\AppData\Local\Temp\Gukxmmmmanagementelectronic_1s.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Users\Admin\AppData\Local\Temp\2495.exeC:\Users\Admin\AppData\Local\Temp\2495.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ReNamer_12.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ReNamer_12.exe2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 8842⤵
- Program crash
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1008 -ip 10081⤵PID:1760
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e87e48b105757e1c7563d1c719059733
SHA128a3f2b2e0672da2b531f4757d2b20b53032dafc
SHA2560aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461
SHA512bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5f15569717d09676b447c90b121621ef4
SHA19f217f89d565e5616bf9401cecf5e783f3c24cfd
SHA256d55bea94f631d67b2826e49f00881f4f511050c0716eb6b556cae3cdaa87b9ee
SHA512e948432c70a7660320af44f4995359dba8bb12eb19ed4a1c23f8e3598c26823f40cd09b823a27982b5a5f85da1cd77c3763d7d521a8f6fcaa196f9963d6b4e4d
-
Filesize
1.6MB
MD5e595f1a301c0d83be0a5d0adcd298597
SHA1d3ecb9e5987efafaad4ee9713ec973f3327a276c
SHA25626d680b27e6ddb5e9c1318e52f2568b2869f01cd0365442be82da45c34e1cd99
SHA51205b33444420fdd74647678a8d5d506ddb722a434f434aa6be8406bd8f1fe67c4ba23ab2ab05c005cd274c429ec94c75bc60560fa90f9271e28f78d153e73322d
-
Filesize
6KB
MD5050dfb733e290ef59da36731a529d736
SHA1d0ae23fdc66f982932d89cb4cd09aa101f0f4caa
SHA2560e1345b8631aa5950abd8f8d49666885fdf113ab6c76bc1e3fd2bafd4a90463e
SHA512cb9f441fffd817f94ae9cb476ae11d83e080a60af1d596315abe31aba38f0d5c7c41473f3167a2c6d8f40c112ab09ec3779d40641e34665a94b976c22b41a443
-
Filesize
6KB
MD5050dfb733e290ef59da36731a529d736
SHA1d0ae23fdc66f982932d89cb4cd09aa101f0f4caa
SHA2560e1345b8631aa5950abd8f8d49666885fdf113ab6c76bc1e3fd2bafd4a90463e
SHA512cb9f441fffd817f94ae9cb476ae11d83e080a60af1d596315abe31aba38f0d5c7c41473f3167a2c6d8f40c112ab09ec3779d40641e34665a94b976c22b41a443
-
Filesize
6KB
MD5050dfb733e290ef59da36731a529d736
SHA1d0ae23fdc66f982932d89cb4cd09aa101f0f4caa
SHA2560e1345b8631aa5950abd8f8d49666885fdf113ab6c76bc1e3fd2bafd4a90463e
SHA512cb9f441fffd817f94ae9cb476ae11d83e080a60af1d596315abe31aba38f0d5c7c41473f3167a2c6d8f40c112ab09ec3779d40641e34665a94b976c22b41a443
-
Filesize
214.6MB
MD5082f5d3f35899fc7fa49ce9fdb1d9366
SHA139b8fb40c71eb37e8a220e0e0679368961c75ba9
SHA25690104bf87a2ee9117ee3a74e2ba8f08a31bef300adb533bba67b536b01b20cde
SHA51222ca3f52b86f41b765bca399afa79bbc0fda6e24ece37c7caccacfc323d30368de1b9e052e468005d8e253712f297fa89aca82539dee80b6ba43518e13e8fe18
-
Filesize
214.6MB
MD5082f5d3f35899fc7fa49ce9fdb1d9366
SHA139b8fb40c71eb37e8a220e0e0679368961c75ba9
SHA25690104bf87a2ee9117ee3a74e2ba8f08a31bef300adb533bba67b536b01b20cde
SHA51222ca3f52b86f41b765bca399afa79bbc0fda6e24ece37c7caccacfc323d30368de1b9e052e468005d8e253712f297fa89aca82539dee80b6ba43518e13e8fe18
-
Filesize
214.6MB
MD5082f5d3f35899fc7fa49ce9fdb1d9366
SHA139b8fb40c71eb37e8a220e0e0679368961c75ba9
SHA25690104bf87a2ee9117ee3a74e2ba8f08a31bef300adb533bba67b536b01b20cde
SHA51222ca3f52b86f41b765bca399afa79bbc0fda6e24ece37c7caccacfc323d30368de1b9e052e468005d8e253712f297fa89aca82539dee80b6ba43518e13e8fe18
-
Filesize
2.4MB
MD57691ec798abb3f78babd948b8efb725c
SHA1ae85dbdad994008775aecf64e8f8716ead72a90d
SHA256b3c08f5783471203935def92765188398ca257d8567c69879fabba3103f7312f
SHA5121b0b27b5ebe1dbad16f92884419b8a3586330b39fb03e0de7ad769a26ed9088b09e36fa488988a2cbb1734f54ce8ea3bf6edd51771b8efed4a6f89ad8b0a7f36
-
Filesize
1.4MB
MD5674c38d552f58caa4a93387e79267c42
SHA1acc3a10e14d5bd37cc675c4b9e15600980bc1ebc
SHA25656b5050f70f74c54dc03196c46f394d1eeb0db62558d51fff8dc646a507bc3de
SHA512c6e67014800826b65bcf5a5c6bba36568c717c6a3382256a7671a9ff41c1da4fd4396f244e833aaf55266b5fbca236dd04bbfe1b479dd42ca5b710f9a7bab93b