Resubmissions

21-10-2022 14:49

221021-r7edyaffe2 10

19-10-2022 14:15

221019-rknzvsbggq 10

19-10-2022 09:36

221019-lkxn4sfgcq 10

Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2022 09:36

General

  • Target

    20540f8cbd1837c3d99da3b542a7155d.exe

  • Size

    687KB

  • MD5

    20540f8cbd1837c3d99da3b542a7155d

  • SHA1

    1b33b15b168d69b6d594ea049f8d92812f25b9a6

  • SHA256

    a0bf7c1184092027ccea8b4381e7f359662bcc317ac4c7a2e02459d1b66d9da6

  • SHA512

    2ab4669b9429aab13e43993e6dd7cdbcfdaa0c8942364081bc8ace85997c6b641769615f54f41ba1e7751fbd83639644f533294392617c201e6951c9188e2de0

  • SSDEEP

    3072:9ahKyd2n31s5nFiizBaaAjLtdyuIIkIA4QWMHb030FhCt64yo:9ahOABdGLnyuIIkIxV0FB

Malware Config

Extracted

Family

redline

Botnet

Testing

C2

46.3.199.124:27968

Attributes
  • auth_value

    2e03f2e71c0fde73929d6d088968e2de

Signatures

  • Detects Smokeloader packer 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20540f8cbd1837c3d99da3b542a7155d.exe
    "C:\Users\Admin\AppData\Local\Temp\20540f8cbd1837c3d99da3b542a7155d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:668
      • C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe
        "C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1936
        • C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe
          C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe

    Filesize

    6KB

    MD5

    69d0272e2d6cfee950467863be0348db

    SHA1

    15b2c9a800b2fdcbf39f23285751fea6e6568c9a

    SHA256

    24ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e

    SHA512

    18773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5

  • C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe

    Filesize

    6KB

    MD5

    69d0272e2d6cfee950467863be0348db

    SHA1

    15b2c9a800b2fdcbf39f23285751fea6e6568c9a

    SHA256

    24ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e

    SHA512

    18773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5

  • C:\Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe

    Filesize

    6KB

    MD5

    69d0272e2d6cfee950467863be0348db

    SHA1

    15b2c9a800b2fdcbf39f23285751fea6e6568c9a

    SHA256

    24ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e

    SHA512

    18773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE

    Filesize

    333.8MB

    MD5

    0195b0838e4bafd5e9eed41ac4e8a9cc

    SHA1

    d813f54a41899ea02a97cf4988737787a431abe5

    SHA256

    1af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca

    SHA512

    0ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE

    Filesize

    333.8MB

    MD5

    0195b0838e4bafd5e9eed41ac4e8a9cc

    SHA1

    d813f54a41899ea02a97cf4988737787a431abe5

    SHA256

    1af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca

    SHA512

    0ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE

    Filesize

    333.8MB

    MD5

    0195b0838e4bafd5e9eed41ac4e8a9cc

    SHA1

    d813f54a41899ea02a97cf4988737787a431abe5

    SHA256

    1af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca

    SHA512

    0ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    e49dbe47be8a25a43fcde6007d4adebc

    SHA1

    53ae83bc0b0ea1791032bd7cad8f7d55dfcf29fb

    SHA256

    efd792f22dd39381f71a235588233fa333d4fbc4c61f3e41273869d3ce8d3942

    SHA512

    1d16b84329910443e3806a8897ffe035ea6d15bc59b38a7f7b539fdad32de73b2f198bfa9112a31c12ca1beada6377901a5d904e9f31fb4171bba06c863d18cd

  • \Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe

    Filesize

    6KB

    MD5

    69d0272e2d6cfee950467863be0348db

    SHA1

    15b2c9a800b2fdcbf39f23285751fea6e6568c9a

    SHA256

    24ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e

    SHA512

    18773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5

  • \Users\Admin\AppData\Local\Temp\Gvnufnpwhsacqcarnature_s.exe

    Filesize

    6KB

    MD5

    69d0272e2d6cfee950467863be0348db

    SHA1

    15b2c9a800b2fdcbf39f23285751fea6e6568c9a

    SHA256

    24ec524af5843d89d406b72abf735106f2e1b6e28cf234ff4713dc5ee51e515e

    SHA512

    18773567df920d1046d672607de44a828debd6dbc15297e594a2f730c62961c2b508ea0c28f958ab370ccf52db70cc4d53324647ff6018e9cb97e15fdea527b5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\CARNAT~2.EXE

    Filesize

    333.8MB

    MD5

    0195b0838e4bafd5e9eed41ac4e8a9cc

    SHA1

    d813f54a41899ea02a97cf4988737787a431abe5

    SHA256

    1af1b6698ab7e6fa795eb5748832aef7d98b9fa8ea3d3f05f724691014c96bca

    SHA512

    0ea148d95b56f586e4d12e49d56ddaff02ed031f9200c7e521120cd49234827d682be99cb75380ccab9cdd4fdf322b98c8a733edc09f98bd70bd570b7e1f5c3a

  • memory/668-64-0x000000006F230000-0x000000006F7DB000-memory.dmp

    Filesize

    5.7MB

  • memory/668-63-0x000000006F230000-0x000000006F7DB000-memory.dmp

    Filesize

    5.7MB

  • memory/668-65-0x000000006F230000-0x000000006F7DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1008-59-0x0000000005540000-0x0000000005602000-memory.dmp

    Filesize

    776KB

  • memory/1008-57-0x00000000000E0000-0x00000000000E8000-memory.dmp

    Filesize

    32KB

  • memory/1008-60-0x00000000057C0000-0x0000000005852000-memory.dmp

    Filesize

    584KB

  • memory/1008-58-0x0000000075C51000-0x0000000075C53000-memory.dmp

    Filesize

    8KB

  • memory/1172-97-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1172-101-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1172-102-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1172-94-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1172-95-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1320-70-0x00000000010C0000-0x00000000010C8000-memory.dmp

    Filesize

    32KB

  • memory/1320-86-0x00000000053A0000-0x000000000546E000-memory.dmp

    Filesize

    824KB

  • memory/1668-77-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1668-84-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1668-76-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1668-78-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1668-82-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1668-73-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1668-74-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1936-90-0x000000006B210000-0x000000006B7BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1936-91-0x000000006B210000-0x000000006B7BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1936-92-0x000000006B210000-0x000000006B7BB000-memory.dmp

    Filesize

    5.7MB