Resubmissions

17-10-2022 14:19

221017-rm5emacaf4 10

17-10-2022 14:09

221017-rf8tgacbgp 10

15-10-2022 16:38

221015-t5dezafggp 10

Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2022 16:38

General

  • Target

    e41ad88438135bf0b2189701de819be1.exe

  • Size

    213KB

  • MD5

    e41ad88438135bf0b2189701de819be1

  • SHA1

    95de6449d3b39f8e5024456909c867db18f8a72b

  • SHA256

    cd3a2b42f2d770f1f870b2e3be9d0a5262b8038d65e6f95a1e63bed333150db5

  • SHA512

    3cee47029aa2fde04e16f964a5d0c661a623bf6a3a954f30d90ead3859ae4d02c997184d929ba66712b67731cdd17cd664f620ca16241ac04c58e16aea500515

  • SSDEEP

    3072:yXp4AqLOlFA/gtXw4Q5VgHnk9pIZ/cs95SSYPmEpZ0KPDUX56o:ycLOlFPwtgHk9pIpLSSsZ0bo

Malware Config

Extracted

Family

redline

Botnet

535

C2

45.15.156.26:2794

Attributes
  • auth_value

    e7680eed1ef96d61de0f4c54c7c5a594

Signatures

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e41ad88438135bf0b2189701de819be1.exe
    "C:\Users\Admin\AppData\Local\Temp\e41ad88438135bf0b2189701de819be1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1540
  • C:\Users\Admin\AppData\Local\Temp\1D3C.exe
    C:\Users\Admin\AppData\Local\Temp\1D3C.exe
    1⤵
    • Executes dropped EXE
    PID:3736
  • C:\Users\Admin\AppData\Local\Temp\1F31.exe
    C:\Users\Admin\AppData\Local\Temp\1F31.exe
    1⤵
    • Executes dropped EXE
    PID:1888
  • C:\Users\Admin\AppData\Local\Temp\29F0.exe
    C:\Users\Admin\AppData\Local\Temp\29F0.exe
    1⤵
    • Executes dropped EXE
    PID:4408
  • C:\Users\Admin\AppData\Local\Temp\321F.exe
    C:\Users\Admin\AppData\Local\Temp\321F.exe
    1⤵
    • Executes dropped EXE
    PID:4992
  • C:\Users\Admin\AppData\Local\Temp\36D3.exe
    C:\Users\Admin\AppData\Local\Temp\36D3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 1272
      2⤵
      • Program crash
      PID:4872
  • C:\Users\Admin\AppData\Local\Temp\5F6B.exe
    C:\Users\Admin\AppData\Local\Temp\5F6B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Windows\system32\cmd.exe
      cmd.exe /c "del C:\Users\Admin\AppData\Local\Temp\5F6B.exe"
      2⤵
        PID:4400
    • C:\Users\Admin\AppData\Local\Temp\624A.exe
      C:\Users\Admin\AppData\Local\Temp\624A.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:3144
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:924
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:2400
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:4016
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4068 -ip 4068
              1⤵
                PID:2392
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1680
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:1920
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:3600
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:2732
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:3200
                        • C:\Users\Admin\AppData\Roaming\hihsiir
                          C:\Users\Admin\AppData\Roaming\hihsiir
                          1⤵
                          • Executes dropped EXE
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: MapViewOfSection
                          PID:2768

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\1D3C.exe

                          Filesize

                          419KB

                          MD5

                          93773c9cab9b15bd9238aebfe36712bf

                          SHA1

                          5d8878372c87b08a64298db91c884645ccf28443

                          SHA256

                          b88c64f57a70f95f35fbe30ab3614608f34a2b9a6121c055d5da0358e24b6890

                          SHA512

                          78d6ba07ae1e3cad90cc199f41f7d71fd2b69f2d844e7a0a6579509d48634b486165df657cb837eba3dc650612c3c71f4b1f808139d8dc85988a848381c70d87

                        • C:\Users\Admin\AppData\Local\Temp\1D3C.exe

                          Filesize

                          419KB

                          MD5

                          93773c9cab9b15bd9238aebfe36712bf

                          SHA1

                          5d8878372c87b08a64298db91c884645ccf28443

                          SHA256

                          b88c64f57a70f95f35fbe30ab3614608f34a2b9a6121c055d5da0358e24b6890

                          SHA512

                          78d6ba07ae1e3cad90cc199f41f7d71fd2b69f2d844e7a0a6579509d48634b486165df657cb837eba3dc650612c3c71f4b1f808139d8dc85988a848381c70d87

                        • C:\Users\Admin\AppData\Local\Temp\1F31.exe

                          Filesize

                          356KB

                          MD5

                          70682f6421f864560af22030f9592d6e

                          SHA1

                          873c3d4e7237813b74d20f6f598d422c08e536ab

                          SHA256

                          acb8a59668d365181ce19a1fdd19aa992d86a9797f148e408daf5c7e9fa62bd3

                          SHA512

                          27a576447278c55fdee54cdd3e38098774bcabba6f007d494966104572951f11b3984f314cdb1a833e8a69280d1a500a089ba5660f0f4a3a32fef575aba0c5a5

                        • C:\Users\Admin\AppData\Local\Temp\1F31.exe

                          Filesize

                          356KB

                          MD5

                          70682f6421f864560af22030f9592d6e

                          SHA1

                          873c3d4e7237813b74d20f6f598d422c08e536ab

                          SHA256

                          acb8a59668d365181ce19a1fdd19aa992d86a9797f148e408daf5c7e9fa62bd3

                          SHA512

                          27a576447278c55fdee54cdd3e38098774bcabba6f007d494966104572951f11b3984f314cdb1a833e8a69280d1a500a089ba5660f0f4a3a32fef575aba0c5a5

                        • C:\Users\Admin\AppData\Local\Temp\29F0.exe

                          Filesize

                          356KB

                          MD5

                          34c6dc517df5134a240359e7e5bcaa1a

                          SHA1

                          5b933fa9f7634bc9813d5332b0e65e3276ef7148

                          SHA256

                          d1a868c3491d26107fb5f7019b54b1ebd467294091c9675198e2fcf805a3c28e

                          SHA512

                          101e18032ef5634bba987e9d33b2cc1c5f91db0db2beada259dde3367ee363924471f71a4a4cf985255b41995761927910bea0a8a0e790ef978bfbcfe8d7e7fa

                        • C:\Users\Admin\AppData\Local\Temp\29F0.exe

                          Filesize

                          356KB

                          MD5

                          34c6dc517df5134a240359e7e5bcaa1a

                          SHA1

                          5b933fa9f7634bc9813d5332b0e65e3276ef7148

                          SHA256

                          d1a868c3491d26107fb5f7019b54b1ebd467294091c9675198e2fcf805a3c28e

                          SHA512

                          101e18032ef5634bba987e9d33b2cc1c5f91db0db2beada259dde3367ee363924471f71a4a4cf985255b41995761927910bea0a8a0e790ef978bfbcfe8d7e7fa

                        • C:\Users\Admin\AppData\Local\Temp\321F.exe

                          Filesize

                          720KB

                          MD5

                          6a4b0bf0bd9f496ee1398e702dcb25e1

                          SHA1

                          bb020b724fc67dc818ae7a2f354fb268ed42f706

                          SHA256

                          0103856c001d654207c4496b55b06921f5ed3818450a624464c5062b7668abb5

                          SHA512

                          c09b4adf6f8fbb3718ec18aefba052e52179594ecfc6b08daede38815c03fa8ed3ca3b8de0fb4ec9acafb10f40ae835ba7f364e1c5876ae18aaf6291b444f4e2

                        • C:\Users\Admin\AppData\Local\Temp\321F.exe

                          Filesize

                          720KB

                          MD5

                          6a4b0bf0bd9f496ee1398e702dcb25e1

                          SHA1

                          bb020b724fc67dc818ae7a2f354fb268ed42f706

                          SHA256

                          0103856c001d654207c4496b55b06921f5ed3818450a624464c5062b7668abb5

                          SHA512

                          c09b4adf6f8fbb3718ec18aefba052e52179594ecfc6b08daede38815c03fa8ed3ca3b8de0fb4ec9acafb10f40ae835ba7f364e1c5876ae18aaf6291b444f4e2

                        • C:\Users\Admin\AppData\Local\Temp\36D3.exe

                          Filesize

                          447KB

                          MD5

                          89352e8c08c9fd0f48a76822f3f5a3b3

                          SHA1

                          3b1421963698640a76fb0677694f65afe1c75bc1

                          SHA256

                          4b7f5a3df8170c4ea12a0ff058abb3cab8978063f551f32174ec63fa0d39071d

                          SHA512

                          60c111082b26bdd38a401b3b283f63044312d73b14acc95dca474f9eeeca7bac9179d2ddff9f4172d1c5669ca2c8148c3b144bfebf9b8505aa7aeadbb1586db3

                        • C:\Users\Admin\AppData\Local\Temp\36D3.exe

                          Filesize

                          447KB

                          MD5

                          89352e8c08c9fd0f48a76822f3f5a3b3

                          SHA1

                          3b1421963698640a76fb0677694f65afe1c75bc1

                          SHA256

                          4b7f5a3df8170c4ea12a0ff058abb3cab8978063f551f32174ec63fa0d39071d

                          SHA512

                          60c111082b26bdd38a401b3b283f63044312d73b14acc95dca474f9eeeca7bac9179d2ddff9f4172d1c5669ca2c8148c3b144bfebf9b8505aa7aeadbb1586db3

                        • C:\Users\Admin\AppData\Local\Temp\5F6B.exe

                          Filesize

                          7.5MB

                          MD5

                          ee50fb38cb90b613a8c063626d3df2ca

                          SHA1

                          f7d42c03a71d17cdfb93f820dd2147be009fa01e

                          SHA256

                          db098d7fd521ad0112db04626fa4785005a4920521fa31a1e7c8afaf6bed841c

                          SHA512

                          10e17199b14a40fcdb3a3fe2e5601fc5378c5f85019549911efd3b7679e067edf179c3798d852eda611171a9384845cddeb4df2c6ec395b7ea24555a39bb43d9

                        • C:\Users\Admin\AppData\Local\Temp\5F6B.exe

                          Filesize

                          7.5MB

                          MD5

                          ee50fb38cb90b613a8c063626d3df2ca

                          SHA1

                          f7d42c03a71d17cdfb93f820dd2147be009fa01e

                          SHA256

                          db098d7fd521ad0112db04626fa4785005a4920521fa31a1e7c8afaf6bed841c

                          SHA512

                          10e17199b14a40fcdb3a3fe2e5601fc5378c5f85019549911efd3b7679e067edf179c3798d852eda611171a9384845cddeb4df2c6ec395b7ea24555a39bb43d9

                        • C:\Users\Admin\AppData\Local\Temp\624A.exe

                          Filesize

                          331KB

                          MD5

                          ded4b97cc13c25949a138fa987aee2c5

                          SHA1

                          0e19d5ad75ba8bbc0220c1807babcb1f0ee0206b

                          SHA256

                          6fff178fd8292b0ebc310be78ce7f93e9ed29c2f0ef898648bd7765a67471aa6

                          SHA512

                          fc81b97350d8455e4d1b012edf1aa230b2eae871713f18c37c62530efaa43d2ae9cae2693b07146b9c944522800f9d9a49ba2ff6b84e7d2d873803d5e0950345

                        • C:\Users\Admin\AppData\Local\Temp\624A.exe

                          Filesize

                          331KB

                          MD5

                          ded4b97cc13c25949a138fa987aee2c5

                          SHA1

                          0e19d5ad75ba8bbc0220c1807babcb1f0ee0206b

                          SHA256

                          6fff178fd8292b0ebc310be78ce7f93e9ed29c2f0ef898648bd7765a67471aa6

                          SHA512

                          fc81b97350d8455e4d1b012edf1aa230b2eae871713f18c37c62530efaa43d2ae9cae2693b07146b9c944522800f9d9a49ba2ff6b84e7d2d873803d5e0950345

                        • C:\Users\Admin\AppData\Roaming\hihsiir

                          Filesize

                          213KB

                          MD5

                          e41ad88438135bf0b2189701de819be1

                          SHA1

                          95de6449d3b39f8e5024456909c867db18f8a72b

                          SHA256

                          cd3a2b42f2d770f1f870b2e3be9d0a5262b8038d65e6f95a1e63bed333150db5

                          SHA512

                          3cee47029aa2fde04e16f964a5d0c661a623bf6a3a954f30d90ead3859ae4d02c997184d929ba66712b67731cdd17cd664f620ca16241ac04c58e16aea500515

                        • C:\Users\Admin\AppData\Roaming\hihsiir

                          Filesize

                          213KB

                          MD5

                          e41ad88438135bf0b2189701de819be1

                          SHA1

                          95de6449d3b39f8e5024456909c867db18f8a72b

                          SHA256

                          cd3a2b42f2d770f1f870b2e3be9d0a5262b8038d65e6f95a1e63bed333150db5

                          SHA512

                          3cee47029aa2fde04e16f964a5d0c661a623bf6a3a954f30d90ead3859ae4d02c997184d929ba66712b67731cdd17cd664f620ca16241ac04c58e16aea500515

                        • memory/924-182-0x00000000012B0000-0x00000000012B9000-memory.dmp

                          Filesize

                          36KB

                        • memory/924-183-0x00000000012A0000-0x00000000012AF000-memory.dmp

                          Filesize

                          60KB

                        • memory/924-208-0x00000000012B0000-0x00000000012B9000-memory.dmp

                          Filesize

                          36KB

                        • memory/1420-178-0x0000000000400000-0x0000000000436000-memory.dmp

                          Filesize

                          216KB

                        • memory/1540-133-0x0000000000590000-0x0000000000599000-memory.dmp

                          Filesize

                          36KB

                        • memory/1540-134-0x0000000000400000-0x000000000043A000-memory.dmp

                          Filesize

                          232KB

                        • memory/1540-135-0x000000000062E000-0x000000000063E000-memory.dmp

                          Filesize

                          64KB

                        • memory/1540-132-0x000000000062E000-0x000000000063E000-memory.dmp

                          Filesize

                          64KB

                        • memory/1540-136-0x0000000000400000-0x000000000043A000-memory.dmp

                          Filesize

                          232KB

                        • memory/1680-211-0x0000000000850000-0x0000000000872000-memory.dmp

                          Filesize

                          136KB

                        • memory/1680-193-0x0000000000820000-0x0000000000847000-memory.dmp

                          Filesize

                          156KB

                        • memory/1680-192-0x0000000000850000-0x0000000000872000-memory.dmp

                          Filesize

                          136KB

                        • memory/1920-200-0x0000000000120000-0x0000000000125000-memory.dmp

                          Filesize

                          20KB

                        • memory/1920-213-0x0000000000120000-0x0000000000125000-memory.dmp

                          Filesize

                          20KB

                        • memory/1920-194-0x0000000000110000-0x0000000000119000-memory.dmp

                          Filesize

                          36KB

                        • memory/2400-186-0x0000000001140000-0x0000000001149000-memory.dmp

                          Filesize

                          36KB

                        • memory/2400-185-0x0000000001150000-0x0000000001155000-memory.dmp

                          Filesize

                          20KB

                        • memory/2400-209-0x0000000001150000-0x0000000001155000-memory.dmp

                          Filesize

                          20KB

                        • memory/2732-214-0x00000000001E0000-0x00000000001E7000-memory.dmp

                          Filesize

                          28KB

                        • memory/2732-202-0x00000000001E0000-0x00000000001E7000-memory.dmp

                          Filesize

                          28KB

                        • memory/2732-203-0x00000000001D0000-0x00000000001DD000-memory.dmp

                          Filesize

                          52KB

                        • memory/2768-219-0x0000000000400000-0x000000000043A000-memory.dmp

                          Filesize

                          232KB

                        • memory/2768-218-0x000000000072E000-0x000000000073E000-memory.dmp

                          Filesize

                          64KB

                        • memory/2768-220-0x0000000000400000-0x000000000043A000-memory.dmp

                          Filesize

                          232KB

                        • memory/3144-174-0x0000000000330000-0x000000000033B000-memory.dmp

                          Filesize

                          44KB

                        • memory/3144-207-0x0000000000340000-0x0000000000347000-memory.dmp

                          Filesize

                          28KB

                        • memory/3144-173-0x0000000000340000-0x0000000000347000-memory.dmp

                          Filesize

                          28KB

                        • memory/3200-215-0x0000000001150000-0x0000000001158000-memory.dmp

                          Filesize

                          32KB

                        • memory/3200-206-0x0000000001140000-0x000000000114B000-memory.dmp

                          Filesize

                          44KB

                        • memory/3200-205-0x0000000001150000-0x0000000001158000-memory.dmp

                          Filesize

                          32KB

                        • memory/3600-198-0x00000000010C0000-0x00000000010C6000-memory.dmp

                          Filesize

                          24KB

                        • memory/3600-212-0x00000000010C0000-0x00000000010C6000-memory.dmp

                          Filesize

                          24KB

                        • memory/3600-199-0x00000000010B0000-0x00000000010BB000-memory.dmp

                          Filesize

                          44KB

                        • memory/4016-189-0x0000000001200000-0x0000000001206000-memory.dmp

                          Filesize

                          24KB

                        • memory/4016-190-0x0000000000FF0000-0x0000000000FFC000-memory.dmp

                          Filesize

                          48KB

                        • memory/4016-210-0x0000000001200000-0x0000000001206000-memory.dmp

                          Filesize

                          24KB

                        • memory/4068-196-0x0000000000400000-0x0000000000475000-memory.dmp

                          Filesize

                          468KB

                        • memory/4068-153-0x0000000002100000-0x0000000002159000-memory.dmp

                          Filesize

                          356KB

                        • memory/4068-172-0x0000000006D50000-0x0000000006DC6000-memory.dmp

                          Filesize

                          472KB

                        • memory/4068-175-0x0000000006E10000-0x0000000006E2E000-memory.dmp

                          Filesize

                          120KB

                        • memory/4068-171-0x00000000064C0000-0x0000000006510000-memory.dmp

                          Filesize

                          320KB

                        • memory/4068-181-0x000000000052E000-0x0000000000565000-memory.dmp

                          Filesize

                          220KB

                        • memory/4068-152-0x000000000052E000-0x0000000000565000-memory.dmp

                          Filesize

                          220KB

                        • memory/4068-195-0x000000000052E000-0x0000000000565000-memory.dmp

                          Filesize

                          220KB

                        • memory/4068-161-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                          Filesize

                          408KB

                        • memory/4068-160-0x0000000005CA0000-0x0000000005D32000-memory.dmp

                          Filesize

                          584KB

                        • memory/4068-159-0x0000000005990000-0x00000000059CC000-memory.dmp

                          Filesize

                          240KB

                        • memory/4068-158-0x0000000005880000-0x000000000598A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4068-157-0x0000000005860000-0x0000000005872000-memory.dmp

                          Filesize

                          72KB

                        • memory/4068-179-0x0000000006EC0000-0x0000000007082000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4068-156-0x0000000005210000-0x0000000005828000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/4068-180-0x00000000072E0000-0x000000000780C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/4068-155-0x0000000004C10000-0x00000000051B4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/4068-154-0x0000000000400000-0x0000000000475000-memory.dmp

                          Filesize

                          468KB

                        • memory/4896-168-0x0000000000050000-0x00000000000A8000-memory.dmp

                          Filesize

                          352KB