Resubmissions
21-10-2022 14:49
221021-r7edyaffe2 1019-10-2022 14:15
221019-rknzvsbggq 1019-10-2022 09:36
221019-lkxn4sfgcq 10Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 09:36
Static task
static1
Behavioral task
behavioral1
Sample
20540f8cbd1837c3d99da3b542a7155d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20540f8cbd1837c3d99da3b542a7155d.exe
Resource
win10v2004-20220812-en
General
-
Target
20540f8cbd1837c3d99da3b542a7155d.exe
-
Size
687KB
-
MD5
20540f8cbd1837c3d99da3b542a7155d
-
SHA1
1b33b15b168d69b6d594ea049f8d92812f25b9a6
-
SHA256
a0bf7c1184092027ccea8b4381e7f359662bcc317ac4c7a2e02459d1b66d9da6
-
SHA512
2ab4669b9429aab13e43993e6dd7cdbcfdaa0c8942364081bc8ace85997c6b641769615f54f41ba1e7751fbd83639644f533294392617c201e6951c9188e2de0
-
SSDEEP
3072:9ahKyd2n31s5nFiizBaaAjLtdyuIIkIA4QWMHb030FhCt64yo:9ahOABdGLnyuIIkIxV0FB
Malware Config
Extracted
redline
Testing
46.3.199.124:27968
-
auth_value
2e03f2e71c0fde73929d6d088968e2de
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/1172-97-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1172-98-0x0000000000402E87-mapping.dmp family_smokeloader behavioral1/memory/1172-101-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/1172-102-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/1668-79-0x000000000042211E-mapping.dmp family_redline behavioral1/memory/1668-82-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1668-78-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1668-76-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1668-84-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1668-77-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 1008 CARNAT~2.EXE 1320 Gvnufnpwhsacqcarnature_s.exe 1668 CARNAT~2.EXE 1172 Gvnufnpwhsacqcarnature_s.exe -
Loads dropped DLL 3 IoCs
pid Process 1008 CARNAT~2.EXE 1008 CARNAT~2.EXE 1320 Gvnufnpwhsacqcarnature_s.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20540f8cbd1837c3d99da3b542a7155d.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 20540f8cbd1837c3d99da3b542a7155d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1008 set thread context of 1668 1008 CARNAT~2.EXE 32 PID 1320 set thread context of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Gvnufnpwhsacqcarnature_s.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Gvnufnpwhsacqcarnature_s.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Gvnufnpwhsacqcarnature_s.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 CARNAT~2.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 CARNAT~2.EXE -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 668 powershell.exe 1936 powershell.exe 1668 CARNAT~2.EXE 1668 CARNAT~2.EXE 1172 Gvnufnpwhsacqcarnature_s.exe 1172 Gvnufnpwhsacqcarnature_s.exe 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1172 Gvnufnpwhsacqcarnature_s.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1008 CARNAT~2.EXE Token: SeDebugPrivilege 668 powershell.exe Token: SeDebugPrivilege 1320 Gvnufnpwhsacqcarnature_s.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 1668 CARNAT~2.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1008 1076 20540f8cbd1837c3d99da3b542a7155d.exe 28 PID 1076 wrote to memory of 1008 1076 20540f8cbd1837c3d99da3b542a7155d.exe 28 PID 1076 wrote to memory of 1008 1076 20540f8cbd1837c3d99da3b542a7155d.exe 28 PID 1076 wrote to memory of 1008 1076 20540f8cbd1837c3d99da3b542a7155d.exe 28 PID 1008 wrote to memory of 668 1008 CARNAT~2.EXE 29 PID 1008 wrote to memory of 668 1008 CARNAT~2.EXE 29 PID 1008 wrote to memory of 668 1008 CARNAT~2.EXE 29 PID 1008 wrote to memory of 668 1008 CARNAT~2.EXE 29 PID 1008 wrote to memory of 1320 1008 CARNAT~2.EXE 31 PID 1008 wrote to memory of 1320 1008 CARNAT~2.EXE 31 PID 1008 wrote to memory of 1320 1008 CARNAT~2.EXE 31 PID 1008 wrote to memory of 1320 1008 CARNAT~2.EXE 31 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1008 wrote to memory of 1668 1008 CARNAT~2.EXE 32 PID 1320 wrote to memory of 1936 1320 Gvnufnpwhsacqcarnature_s.exe 34 PID 1320 wrote to memory of 1936 1320 Gvnufnpwhsacqcarnature_s.exe 34 PID 1320 wrote to memory of 1936 1320 Gvnufnpwhsacqcarnature_s.exe 34 PID 1320 wrote to memory of 1936 1320 Gvnufnpwhsacqcarnature_s.exe 34 PID 1320 wrote to memory of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36 PID 1320 wrote to memory of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36 PID 1320 wrote to memory of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36 PID 1320 wrote to memory of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36 PID 1320 wrote to memory of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36 PID 1320 wrote to memory of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36 PID 1320 wrote to memory of 1172 1320 Gvnufnpwhsacqcarnature_s.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\20540f8cbd1837c3d99da3b542a7155d.exe"C:\Users\Admin\AppData\Local\Temp\20540f8cbd1837c3d99da3b542a7155d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe"C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exeC:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD569d0272e2d6cfee950467863be0348db
SHA115b2c9a800b2fdcbf39f23285751fea6e6568c9a
SHA25624ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e
SHA51218773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5
-
Filesize
6KB
MD569d0272e2d6cfee950467863be0348db
SHA115b2c9a800b2fdcbf39f23285751fea6e6568c9a
SHA25624ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e
SHA51218773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5
-
Filesize
6KB
MD569d0272e2d6cfee950467863be0348db
SHA115b2c9a800b2fdcbf39f23285751fea6e6568c9a
SHA25624ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e
SHA51218773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5
-
Filesize
333.8MB
MD50195b0838e4bafd5e9eed41ac4e8a9cc
SHA1d813f54a41899ea02a97cf4988737787a431abe5
SHA2561af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca
SHA5120ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a
-
Filesize
333.8MB
MD50195b0838e4bafd5e9eed41ac4e8a9cc
SHA1d813f54a41899ea02a97cf4988737787a431abe5
SHA2561af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca
SHA5120ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a
-
Filesize
333.8MB
MD50195b0838e4bafd5e9eed41ac4e8a9cc
SHA1d813f54a41899ea02a97cf4988737787a431abe5
SHA2561af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca
SHA5120ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e49dbe47be8a25a43fcde6007d4adebc
SHA153ae83bc0b0ea1791032bd7cad8f7d55dfcf29fb
SHA256efd792f22dd39381f71a235588233fa333d4fbc4c61f3e41273869d3ce8d3942
SHA5121d16b84329910443e3806a8897ffe035ea6d15bc59b38a7f7b539fdad32de73b2f198bfa9112a31c12ca1beada6377901a5d904e9f31fb4171bba06c863d18cd
-
Filesize
6KB
MD569d0272e2d6cfee950467863be0348db
SHA115b2c9a800b2fdcbf39f23285751fea6e6568c9a
SHA25624ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e
SHA51218773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5
-
Filesize
6KB
MD569d0272e2d6cfee950467863be0348db
SHA115b2c9a800b2fdcbf39f23285751fea6e6568c9a
SHA25624ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e
SHA51218773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5
-
Filesize
333.8MB
MD50195b0838e4bafd5e9eed41ac4e8a9cc
SHA1d813f54a41899ea02a97cf4988737787a431abe5
SHA2561af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca
SHA5120ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a