Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2022 13:13

General

  • Target

    7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe

  • Size

    427KB

  • MD5

    c34729173ecc820eb7674431597d78be

  • SHA1

    884f343876a8bb0ebac63c28191c22c6f69590f8

  • SHA256

    7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0

  • SHA512

    f9c93a0c6f55217016fe5ba550e9948662901b9240662708ac93074bf9692427b73ce10864927026b118aeb6622a47cfa04976bbc9b482a31aef21a5c96786a0

  • SSDEEP

    3072:yvGyYiSDnt1Et5CmPo8VGAnxoctr6Byd4TUISI:24UCp6n756BmlI

Malware Config

Extracted

Family

redline

Botnet

Nigh

C2

80.66.87.20:80

Attributes
  • auth_value

    dab8506635d1dc134af4ebaedf4404eb

Signatures

  • Detects Smokeloader packer 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe
    "C:\Users\Admin\AppData\Local\Temp\7ad55278a8285dace5bb637348e5990c356a7c35bbcb8e2d53fd3dc64573d4c0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:320
      • C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe
        "C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3816
        • C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe
          C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2368
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
  • C:\Users\Admin\AppData\Local\Temp\110D.exe
    C:\Users\Admin\AppData\Local\Temp\110D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4936
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==
      2⤵
        PID:2572
    • C:\Users\Admin\AppData\Local\Temp\1A75.exe
      C:\Users\Admin\AppData\Local\Temp\1A75.exe
      1⤵
      • Executes dropped EXE
      PID:4320
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
        2⤵
          PID:3748
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:4224
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:5060

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SETUP_~1.EXE.log
          Filesize

          1KB

          MD5

          e87e48b105757e1c7563d1c719059733

          SHA1

          28a3f2b2e0672da2b531f4757d2b20b53032dafc

          SHA256

          0aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461

          SHA512

          bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
          Filesize

          1KB

          MD5

          4280e36a29fa31c01e4d8b2ba726a0d8

          SHA1

          c485c2c9ce0a99747b18d899b71dfa9a64dabe32

          SHA256

          e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

          SHA512

          494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
          Filesize

          53KB

          MD5

          06ad34f9739c5159b4d92d702545bd49

          SHA1

          9152a0d4f153f3f40f7e606be75f81b582ee0c17

          SHA256

          474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

          SHA512

          c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          16KB

          MD5

          b9391200d17147d244cbbd251f242ca9

          SHA1

          95487ffd9a11fa9577f6e56c98f98b38af2eb831

          SHA256

          eb09b63f134b1c49710728639ff493c6671472adb266f0fcb381957f35fb0f05

          SHA512

          74e8c119030c72949283928f46abde907fc8bd5da8eadfdca1fbace7fb57a48d84ad6a01117c0295d203a4f9062df2780ff5de78383aa89179c7763086441e51

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          15KB

          MD5

          d487add1d989dabd1604ff1e817bfce8

          SHA1

          1f0132ebc4f2e84f103ad4e4706856d0e2a17ee9

          SHA256

          9271b2023c4bbf05484080bc43ac3669a00864d8d438b58c38a040ad6c78deca

          SHA512

          32294efc650111c66dfe37d25e4b2a4762d4bd058506c0f4d77401d1eee58e87be32189103cdbe2cf4b834c33b9783cc85c9f9afb87852db9ecbbcac9f92333a

        • C:\Users\Admin\AppData\Local\Temp\110D.exe
          Filesize

          5KB

          MD5

          a2f8e03e3c173ca5375b211ff4129d88

          SHA1

          9963026e9aa2a26f220ec88a7168895131dee6f3

          SHA256

          52daa06f3b8f61e4f564ca96eda06911460e187b8d99e492e57e7e3e0c6b28dc

          SHA512

          1d7dcff402f848779534b6db55064b784cf64b99afaca929dd5c02645873f71b3d7229199e6ebf74b0eb8b61b1fcae4d62c2d6404e22f52b3333155b57c743f5

        • C:\Users\Admin\AppData\Local\Temp\110D.exe
          Filesize

          5KB

          MD5

          a2f8e03e3c173ca5375b211ff4129d88

          SHA1

          9963026e9aa2a26f220ec88a7168895131dee6f3

          SHA256

          52daa06f3b8f61e4f564ca96eda06911460e187b8d99e492e57e7e3e0c6b28dc

          SHA512

          1d7dcff402f848779534b6db55064b784cf64b99afaca929dd5c02645873f71b3d7229199e6ebf74b0eb8b61b1fcae4d62c2d6404e22f52b3333155b57c743f5

        • C:\Users\Admin\AppData\Local\Temp\1A75.exe
          Filesize

          2.3MB

          MD5

          fafdf59aed55dd1722f9aff24b573d6f

          SHA1

          f6a9f61e547f23d9794c396da0bf5b696e5eeb05

          SHA256

          a07b14225d793feae931a1802ced0c28da489e18072313586ec6c7df83d2c3bf

          SHA512

          52b1b7281da803b7fca4cd6e2295e82165fd9bdbc96d70dbf2e87b12188e21eaaa59bc27611ac07fe7dfd099140d4cf7576895201abc27ae0a3d40d23417fff1

        • C:\Users\Admin\AppData\Local\Temp\1A75.exe
          Filesize

          2.3MB

          MD5

          fafdf59aed55dd1722f9aff24b573d6f

          SHA1

          f6a9f61e547f23d9794c396da0bf5b696e5eeb05

          SHA256

          a07b14225d793feae931a1802ced0c28da489e18072313586ec6c7df83d2c3bf

          SHA512

          52b1b7281da803b7fca4cd6e2295e82165fd9bdbc96d70dbf2e87b12188e21eaaa59bc27611ac07fe7dfd099140d4cf7576895201abc27ae0a3d40d23417fff1

        • C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe
          Filesize

          6KB

          MD5

          d0b53e53092311bc055630adf3e4ccdc

          SHA1

          bf66777607a1d968e3194fe047f9a0e03f249f28

          SHA256

          0cdff2f53a06a63f46dd3e773c3ae99f1d29826975295407046d2d87f609fc3e

          SHA512

          34ecfda7dcad85b6e29fe4a51d7798517d1c2432879eee547e254d251c7f21a52616af58c1a5ce6d50a6a505cf2d03a8e46a3d3a441ca18df1aa86ed9bc546c6

        • C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe
          Filesize

          6KB

          MD5

          d0b53e53092311bc055630adf3e4ccdc

          SHA1

          bf66777607a1d968e3194fe047f9a0e03f249f28

          SHA256

          0cdff2f53a06a63f46dd3e773c3ae99f1d29826975295407046d2d87f609fc3e

          SHA512

          34ecfda7dcad85b6e29fe4a51d7798517d1c2432879eee547e254d251c7f21a52616af58c1a5ce6d50a6a505cf2d03a8e46a3d3a441ca18df1aa86ed9bc546c6

        • C:\Users\Admin\AppData\Local\Temp\Hwqujbjwlyvggktrainingadministrator_s.exe
          Filesize

          6KB

          MD5

          d0b53e53092311bc055630adf3e4ccdc

          SHA1

          bf66777607a1d968e3194fe047f9a0e03f249f28

          SHA256

          0cdff2f53a06a63f46dd3e773c3ae99f1d29826975295407046d2d87f609fc3e

          SHA512

          34ecfda7dcad85b6e29fe4a51d7798517d1c2432879eee547e254d251c7f21a52616af58c1a5ce6d50a6a505cf2d03a8e46a3d3a441ca18df1aa86ed9bc546c6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
          Filesize

          214.6MB

          MD5

          4786de75433835fdc9d3d08edf8116ca

          SHA1

          2c6843f4b1992eeb9215c4d582a94c4ceb7284f9

          SHA256

          d70c8ccf220b6424009b114c1af14df7e472b368f3c72b186322eeb86604b4eb

          SHA512

          e828ee36882c3d95c4c86ee0bd396527d3eb89f036c706f6f108e2caf8c2e87f946dbaddfb71db9a386cb7c111622cbcdbe46feff0563a7f4cb4fd59f32c9ad9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
          Filesize

          214.6MB

          MD5

          4786de75433835fdc9d3d08edf8116ca

          SHA1

          2c6843f4b1992eeb9215c4d582a94c4ceb7284f9

          SHA256

          d70c8ccf220b6424009b114c1af14df7e472b368f3c72b186322eeb86604b4eb

          SHA512

          e828ee36882c3d95c4c86ee0bd396527d3eb89f036c706f6f108e2caf8c2e87f946dbaddfb71db9a386cb7c111622cbcdbe46feff0563a7f4cb4fd59f32c9ad9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
          Filesize

          214.6MB

          MD5

          4786de75433835fdc9d3d08edf8116ca

          SHA1

          2c6843f4b1992eeb9215c4d582a94c4ceb7284f9

          SHA256

          d70c8ccf220b6424009b114c1af14df7e472b368f3c72b186322eeb86604b4eb

          SHA512

          e828ee36882c3d95c4c86ee0bd396527d3eb89f036c706f6f108e2caf8c2e87f946dbaddfb71db9a386cb7c111622cbcdbe46feff0563a7f4cb4fd59f32c9ad9

        • memory/320-138-0x00000000025C0000-0x00000000025F6000-memory.dmp
          Filesize

          216KB

        • memory/320-144-0x00000000048D0000-0x00000000048EA000-memory.dmp
          Filesize

          104KB

        • memory/320-143-0x00000000073C0000-0x0000000007A3A000-memory.dmp
          Filesize

          6.5MB

        • memory/320-142-0x0000000005B80000-0x0000000005B9E000-memory.dmp
          Filesize

          120KB

        • memory/320-141-0x0000000005540000-0x00000000055A6000-memory.dmp
          Filesize

          408KB

        • memory/320-140-0x0000000005420000-0x0000000005486000-memory.dmp
          Filesize

          408KB

        • memory/320-139-0x0000000004C40000-0x0000000005268000-memory.dmp
          Filesize

          6.2MB

        • memory/320-137-0x0000000000000000-mapping.dmp
        • memory/1900-148-0x0000000000BC0000-0x0000000000BC8000-memory.dmp
          Filesize

          32KB

        • memory/1900-145-0x0000000000000000-mapping.dmp
        • memory/2024-162-0x00000000068A0000-0x0000000006932000-memory.dmp
          Filesize

          584KB

        • memory/2024-153-0x00000000056E0000-0x0000000005CF8000-memory.dmp
          Filesize

          6.1MB

        • memory/2024-156-0x0000000005220000-0x000000000525C000-memory.dmp
          Filesize

          240KB

        • memory/2024-155-0x0000000005190000-0x00000000051A2000-memory.dmp
          Filesize

          72KB

        • memory/2024-161-0x0000000006D40000-0x00000000072E4000-memory.dmp
          Filesize

          5.6MB

        • memory/2024-149-0x0000000000000000-mapping.dmp
        • memory/2024-163-0x0000000006940000-0x00000000069B6000-memory.dmp
          Filesize

          472KB

        • memory/2024-164-0x00000000069C0000-0x0000000006A10000-memory.dmp
          Filesize

          320KB

        • memory/2024-165-0x00000000074C0000-0x0000000007682000-memory.dmp
          Filesize

          1.8MB

        • memory/2024-166-0x0000000007BC0000-0x00000000080EC000-memory.dmp
          Filesize

          5.2MB

        • memory/2024-150-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2024-154-0x0000000005260000-0x000000000536A000-memory.dmp
          Filesize

          1.0MB

        • memory/2368-168-0x0000000000400000-0x0000000000409000-memory.dmp
          Filesize

          36KB

        • memory/2368-170-0x0000000000400000-0x0000000000409000-memory.dmp
          Filesize

          36KB

        • memory/2368-171-0x0000000000400000-0x0000000000409000-memory.dmp
          Filesize

          36KB

        • memory/2368-167-0x0000000000000000-mapping.dmp
        • memory/2572-192-0x00007FFAB6830000-0x00007FFAB72F1000-memory.dmp
          Filesize

          10.8MB

        • memory/2572-188-0x0000000000000000-mapping.dmp
        • memory/3748-193-0x00007FFAB6830000-0x00007FFAB72F1000-memory.dmp
          Filesize

          10.8MB

        • memory/3748-189-0x0000000000000000-mapping.dmp
        • memory/3816-157-0x0000000000000000-mapping.dmp
        • memory/4224-186-0x0000000001000000-0x0000000001075000-memory.dmp
          Filesize

          468KB

        • memory/4224-187-0x0000000000D80000-0x0000000000DEB000-memory.dmp
          Filesize

          428KB

        • memory/4224-190-0x0000000000D80000-0x0000000000DEB000-memory.dmp
          Filesize

          428KB

        • memory/4224-181-0x0000000000000000-mapping.dmp
        • memory/4320-177-0x0000000000000000-mapping.dmp
        • memory/4320-183-0x000001F42D8F0000-0x000001F42D912000-memory.dmp
          Filesize

          136KB

        • memory/4320-182-0x00007FFAB6830000-0x00007FFAB72F1000-memory.dmp
          Filesize

          10.8MB

        • memory/4320-180-0x000001F4126B0000-0x000001F412904000-memory.dmp
          Filesize

          2.3MB

        • memory/4884-136-0x00000000058A0000-0x00000000058C2000-memory.dmp
          Filesize

          136KB

        • memory/4884-135-0x00000000002B0000-0x00000000002C2000-memory.dmp
          Filesize

          72KB

        • memory/4884-132-0x0000000000000000-mapping.dmp
        • memory/4936-176-0x00007FFAB6830000-0x00007FFAB72F1000-memory.dmp
          Filesize

          10.8MB

        • memory/4936-175-0x00000000000D0000-0x00000000000D6000-memory.dmp
          Filesize

          24KB

        • memory/4936-172-0x0000000000000000-mapping.dmp
        • memory/5060-184-0x0000000000000000-mapping.dmp
        • memory/5060-185-0x00000000007C0000-0x00000000007CC000-memory.dmp
          Filesize

          48KB