Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2022 18:06

General

  • Target

    file.exe

  • Size

    300KB

  • MD5

    6d018cc2ba2f59f2e1e214a13530df70

  • SHA1

    c903fe5d835882bdcb1498d42b942a52d52b7f0d

  • SHA256

    97cdc8291c3e88742b152e68d8521cffdf47faedd1aad2fadd353837d398d47e

  • SHA512

    26f482d44d757a314153a59bf8491ac609e3a0af18852fabb74dba43c8c30982c0484af412c6292f1c883330b07868d2a060800cbd7ef8861aa6178f0debef82

  • SSDEEP

    96:45SJtr5iduUg8urAFQn1b+cDuQQCrTl7rCgVkfgNRPzNtF:4sJJ5irev+NQRp7rCgVkfg7Z

Malware Config

Extracted

Family

redline

Botnet

Nigh

C2

80.66.87.20:80

Attributes
  • auth_value

    dab8506635d1dc134af4ebaedf4404eb

Signatures

  • Detects Smokeloader packer 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2212
    • C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe
      "C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
      • C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe
        C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:1776
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      C:\Users\Admin\AppData\Local\Temp\file.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3872
  • C:\Users\Admin\AppData\Local\Temp\7579.exe
    C:\Users\Admin\AppData\Local\Temp\7579.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4988
    • C:\Users\Admin\AppData\Local\Temp\7579.exe
      C:\Users\Admin\AppData\Local\Temp\7579.exe
      2⤵
        PID:1052
    • C:\Users\Admin\AppData\Local\Temp\7914.exe
      C:\Users\Admin\AppData\Local\Temp\7914.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1936
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:4640
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:4360

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      3
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      2
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
        Filesize

        1KB

        MD5

        4f3fab3e5f44399e7f4162fd367eca2d

        SHA1

        adada0591db5f53bcc0565942047156de3464e6e

        SHA256

        5db52f2a6a0fbfaa29e27418a1b72b660298dfa58a12ac0f12897a06e557caef

        SHA512

        d8c3fe3a91e572627e31a44d88a71fc3072786b074d04484ff6aacfeab43e0d29ec88bf6ad2af2a5f8e70f0c0eea95dcea59a8159adf4c642e5f8fd5fc632db7

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        Filesize

        1KB

        MD5

        4280e36a29fa31c01e4d8b2ba726a0d8

        SHA1

        c485c2c9ce0a99747b18d899b71dfa9a64dabe32

        SHA256

        e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

        SHA512

        494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
        Filesize

        53KB

        MD5

        06ad34f9739c5159b4d92d702545bd49

        SHA1

        9152a0d4f153f3f40f7e606be75f81b582ee0c17

        SHA256

        474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

        SHA512

        c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
        Filesize

        53KB

        MD5

        687ff3bb8a8b15736d686119a681097c

        SHA1

        18f43aa14e56d4fb158a8804f79fc3c604903991

        SHA256

        51fd45579a0bee4beabbf7aa825ccc646f907dfdf27b2fc1791fa47dc90d5aa2

        SHA512

        047b21b92e74c93f264e2547900decd295f3089b22165372c4060b76bb813ffa6f2af924974936e25a2db551ea1eec722329ae78e1fff08f6f104d041090094a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        e7d78e1adae107af100b79c906a258d1

        SHA1

        bffc914f51a0b05bd9242ef35d2142ba48558a99

        SHA256

        af8b06d73bfbd069a38270a6f13c246a89e85796e086d0d32b0aa31be7348a07

        SHA512

        7ada8a1dca20b7894912cdc608530619bcb7c524f267170efb059154439634b4b5f79446917a89ceeee9c38840e67df9ae34f054a00cb035de76aac3d59a13fe

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        15KB

        MD5

        33566c9bdf50677750f4b21f5e2653e7

        SHA1

        9cc182fd05f266d87c503f6648ade6b68c3e899a

        SHA256

        c7dbd82bfd7344b9dbafe9089849746333d56032ae3b6e563aaa129158e0d468

        SHA512

        c18a437bf873f958bff25ef90c48da599f8f72d515b969b84dbf9530bb8af969be0e38ab31fa737dc4f8c0b70dfc73c280f67b9c1ea586fbc678f721e02c0e5d

      • C:\Users\Admin\AppData\Local\Temp\7579.exe
        Filesize

        2.4MB

        MD5

        989cb0bfa4cc0bd8e8302f47add8e368

        SHA1

        515b82386397ec822edbce6f24a6c4b9d13b0344

        SHA256

        932380926bc6bffcdf0bc446af37d140ce22426f651679e3b7d1c8fea83d14ef

        SHA512

        9211bb8622c7dee790db4847a9095bfd8dc48d324a400f374ab42ce65c1e2295cc6392a16e031282f6b3fa29a1881487016c9b817e05d65420d7db41f4548583

      • C:\Users\Admin\AppData\Local\Temp\7579.exe
        Filesize

        2.4MB

        MD5

        989cb0bfa4cc0bd8e8302f47add8e368

        SHA1

        515b82386397ec822edbce6f24a6c4b9d13b0344

        SHA256

        932380926bc6bffcdf0bc446af37d140ce22426f651679e3b7d1c8fea83d14ef

        SHA512

        9211bb8622c7dee790db4847a9095bfd8dc48d324a400f374ab42ce65c1e2295cc6392a16e031282f6b3fa29a1881487016c9b817e05d65420d7db41f4548583

      • C:\Users\Admin\AppData\Local\Temp\7579.exe
        Filesize

        64KB

        MD5

        92165f5632f04d17157e3e242718e79a

        SHA1

        6b6b3e1f7f26e519413df601fa50b52da7e51267

        SHA256

        b6a2b47df5dd12c81a0091968297a2dda0d787ed769bad2655ba7e9114abeb08

        SHA512

        f914ae79e2bdf1e84a9c6cebe909e27bb693d79a7b2ba97b040d7d1dbe84fc76ef468d62b413f32d3a146137b96a0c12be02e47c281fef1d1e584218a60a2cff

      • C:\Users\Admin\AppData\Local\Temp\7914.exe
        Filesize

        8KB

        MD5

        fd1489c65b0d75f4cdc7b1f2634b5359

        SHA1

        f8431629d627f8dc13ca486e8b5d0a46f47d46fd

        SHA256

        463d0b090396ffa05d579521256e421080a955415554feebe490482551eb08ea

        SHA512

        e4fc02e1567e188caaf67ccd3a068e6b9db1c20b22a6949ec9ffd9d1a037afe36d744ac8c94a0fd5df55c7e2a51c10a9bcf05c3274175c8296cf16be718a99a2

      • C:\Users\Admin\AppData\Local\Temp\7914.exe
        Filesize

        8KB

        MD5

        fd1489c65b0d75f4cdc7b1f2634b5359

        SHA1

        f8431629d627f8dc13ca486e8b5d0a46f47d46fd

        SHA256

        463d0b090396ffa05d579521256e421080a955415554feebe490482551eb08ea

        SHA512

        e4fc02e1567e188caaf67ccd3a068e6b9db1c20b22a6949ec9ffd9d1a037afe36d744ac8c94a0fd5df55c7e2a51c10a9bcf05c3274175c8296cf16be718a99a2

      • C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe
        Filesize

        8KB

        MD5

        54edd17fd9fd91adaf2eabf6154e9069

        SHA1

        3d42a84759a73de16cb5462b57a528137f1cf3dc

        SHA256

        2394807c5ab534916b8d1a7b5ee63958363432093a55e0361849d8bf47839530

        SHA512

        aef537d09f91b1be9dfd105e7e823c7c5fe9d2bdddcbf5fe10ff4c37951645235fcd6a58a58f2c328813f0af1006b78f4dd4c21e29759b52b362a45cbef46d2f

      • C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe
        Filesize

        8KB

        MD5

        54edd17fd9fd91adaf2eabf6154e9069

        SHA1

        3d42a84759a73de16cb5462b57a528137f1cf3dc

        SHA256

        2394807c5ab534916b8d1a7b5ee63958363432093a55e0361849d8bf47839530

        SHA512

        aef537d09f91b1be9dfd105e7e823c7c5fe9d2bdddcbf5fe10ff4c37951645235fcd6a58a58f2c328813f0af1006b78f4dd4c21e29759b52b362a45cbef46d2f

      • C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe
        Filesize

        8KB

        MD5

        54edd17fd9fd91adaf2eabf6154e9069

        SHA1

        3d42a84759a73de16cb5462b57a528137f1cf3dc

        SHA256

        2394807c5ab534916b8d1a7b5ee63958363432093a55e0361849d8bf47839530

        SHA512

        aef537d09f91b1be9dfd105e7e823c7c5fe9d2bdddcbf5fe10ff4c37951645235fcd6a58a58f2c328813f0af1006b78f4dd4c21e29759b52b362a45cbef46d2f

      • memory/1044-174-0x0000000000000000-mapping.dmp
      • memory/1044-177-0x0000000000130000-0x0000000000136000-memory.dmp
        Filesize

        24KB

      • memory/1044-180-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/1044-191-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/1052-196-0x0000000140000000-0x0000000140078000-memory.dmp
        Filesize

        480KB

      • memory/1284-145-0x0000000000000000-mapping.dmp
      • memory/1284-148-0x00000000002F0000-0x00000000002F8000-memory.dmp
        Filesize

        32KB

      • memory/1776-164-0x0000000000000000-mapping.dmp
      • memory/1776-165-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/1776-168-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/1776-167-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/1936-193-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/1936-189-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/1936-188-0x0000000000000000-mapping.dmp
      • memory/2212-140-0x00000000050C0000-0x0000000005126000-memory.dmp
        Filesize

        408KB

      • memory/2212-142-0x0000000005E00000-0x0000000005E1E000-memory.dmp
        Filesize

        120KB

      • memory/2212-137-0x0000000000000000-mapping.dmp
      • memory/2212-138-0x00000000024E0000-0x0000000002516000-memory.dmp
        Filesize

        216KB

      • memory/2212-139-0x0000000005320000-0x0000000005948000-memory.dmp
        Filesize

        6.2MB

      • memory/2212-144-0x0000000006310000-0x000000000632A000-memory.dmp
        Filesize

        104KB

      • memory/2212-143-0x0000000007480000-0x0000000007AFA000-memory.dmp
        Filesize

        6.5MB

      • memory/2212-141-0x00000000051A0000-0x0000000005206000-memory.dmp
        Filesize

        408KB

      • memory/2444-133-0x00000000053E0000-0x0000000005984000-memory.dmp
        Filesize

        5.6MB

      • memory/2444-134-0x0000000004E30000-0x0000000004EC2000-memory.dmp
        Filesize

        584KB

      • memory/2444-132-0x0000000000580000-0x0000000000588000-memory.dmp
        Filesize

        32KB

      • memory/2444-135-0x0000000004DF0000-0x0000000004DFA000-memory.dmp
        Filesize

        40KB

      • memory/2444-136-0x0000000007EE0000-0x0000000007F02000-memory.dmp
        Filesize

        136KB

      • memory/3872-152-0x00000000053E0000-0x00000000054EA000-memory.dmp
        Filesize

        1.0MB

      • memory/3872-159-0x0000000006C20000-0x0000000006C96000-memory.dmp
        Filesize

        472KB

      • memory/3872-162-0x0000000007C90000-0x00000000081BC000-memory.dmp
        Filesize

        5.2MB

      • memory/3872-154-0x0000000005380000-0x00000000053BC000-memory.dmp
        Filesize

        240KB

      • memory/3872-150-0x0000000000400000-0x0000000000428000-memory.dmp
        Filesize

        160KB

      • memory/3872-160-0x0000000006CA0000-0x0000000006CF0000-memory.dmp
        Filesize

        320KB

      • memory/3872-149-0x0000000000000000-mapping.dmp
      • memory/3872-151-0x0000000005860000-0x0000000005E78000-memory.dmp
        Filesize

        6.1MB

      • memory/3872-153-0x0000000005320000-0x0000000005332000-memory.dmp
        Filesize

        72KB

      • memory/3872-161-0x0000000007590000-0x0000000007752000-memory.dmp
        Filesize

        1.8MB

      • memory/4084-155-0x0000000000000000-mapping.dmp
      • memory/4360-181-0x0000000000000000-mapping.dmp
      • memory/4360-184-0x0000000000810000-0x000000000081C000-memory.dmp
        Filesize

        48KB

      • memory/4468-173-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/4468-190-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/4468-179-0x000001F9D3210000-0x000001F9D3232000-memory.dmp
        Filesize

        136KB

      • memory/4468-169-0x0000000000000000-mapping.dmp
      • memory/4468-172-0x000001F9B8B00000-0x000001F9B8D66000-memory.dmp
        Filesize

        2.4MB

      • memory/4640-183-0x0000000000D00000-0x0000000000D6B000-memory.dmp
        Filesize

        428KB

      • memory/4640-182-0x0000000000D70000-0x0000000000DE5000-memory.dmp
        Filesize

        468KB

      • memory/4640-178-0x0000000000000000-mapping.dmp
      • memory/4988-187-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/4988-185-0x0000000000000000-mapping.dmp
      • memory/4988-192-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB

      • memory/4988-195-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmp
        Filesize

        10.8MB