Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 15:56
Static task
static1
Behavioral task
behavioral1
Sample
6b5788674568961860422191b3a23010.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6b5788674568961860422191b3a23010.exe
Resource
win10v2004-20230220-en
General
-
Target
6b5788674568961860422191b3a23010.exe
-
Size
283KB
-
MD5
6b5788674568961860422191b3a23010
-
SHA1
5ae408ce2dbf46b553a8e89db5b311ca40af3466
-
SHA256
3358510dd07f7a0f84f6b8ff788bf5fb661c2259ebff3696c964f928a166a58c
-
SHA512
32b11c9d8cc82f3cca441bc6d437a26113b785e2e6358fc9512701a0f04a1ea5d1640a9188a66fa6de77ae9f80f09f3c499944ee563d6f2439af0b0ee2590ce9
-
SSDEEP
3072:IR/M5lL68U8+CTnMvkHFaMLdH2cj+l3CjixKud+fYpS9BOS1FtTxvC:+ULotlvCaMLtPaldxdIwr6tT
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://vispik.at/tmp/
http://ekcentric.com/tmp/
http://hbeat.ru/tmp/
http://mordo.ru/tmp/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 31 IoCs
Processes:
resource yara_rule behavioral2/memory/3992-150-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-151-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-153-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-155-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-157-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-159-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-161-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-163-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-165-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-167-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-169-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-171-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-173-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-175-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-177-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-179-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-181-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-185-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-187-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-191-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-189-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-193-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-195-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-197-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-199-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-201-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-203-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-205-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-207-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-209-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline behavioral2/memory/3992-211-0x00000000028F0000-0x0000000002942000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
D854.exe6FC2.exe7FD1.exepid process 3992 D854.exe 376 6FC2.exe 2748 7FD1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1372 3992 WerFault.exe D854.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6b5788674568961860422191b3a23010.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6b5788674568961860422191b3a23010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6b5788674568961860422191b3a23010.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6b5788674568961860422191b3a23010.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6b5788674568961860422191b3a23010.exepid process 1060 6b5788674568961860422191b3a23010.exe 1060 6b5788674568961860422191b3a23010.exe 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 3192 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3192 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6b5788674568961860422191b3a23010.exepid process 1060 6b5788674568961860422191b3a23010.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
D854.exedescription pid process Token: SeDebugPrivilege 3992 D854.exe Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 Token: SeShutdownPrivilege 3192 Token: SeCreatePagefilePrivilege 3192 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3192 3192 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
description pid process target process PID 3192 wrote to memory of 3992 3192 D854.exe PID 3192 wrote to memory of 3992 3192 D854.exe PID 3192 wrote to memory of 3992 3192 D854.exe PID 3192 wrote to memory of 376 3192 6FC2.exe PID 3192 wrote to memory of 376 3192 6FC2.exe PID 3192 wrote to memory of 376 3192 6FC2.exe PID 3192 wrote to memory of 2748 3192 7FD1.exe PID 3192 wrote to memory of 2748 3192 7FD1.exe PID 3192 wrote to memory of 2748 3192 7FD1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b5788674568961860422191b3a23010.exe"C:\Users\Admin\AppData\Local\Temp\6b5788674568961860422191b3a23010.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1060
-
C:\Users\Admin\AppData\Local\Temp\D854.exeC:\Users\Admin\AppData\Local\Temp\D854.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 12802⤵
- Program crash
PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3992 -ip 39921⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\6FC2.exeC:\Users\Admin\AppData\Local\Temp\6FC2.exe1⤵
- Executes dropped EXE
PID:376
-
C:\Users\Admin\AppData\Local\Temp\7FD1.exeC:\Users\Admin\AppData\Local\Temp\7FD1.exe1⤵
- Executes dropped EXE
PID:2748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6FC2.exeFilesize
283KB
MD5eb9b9624c44ec36f6489d30e5213045b
SHA1eb64885704c59350b0f2dd7a4e144a54480d6f22
SHA256f4ad9b9bf522392502cb31ccdda5313f3bd41195da5ab179604a450a3239b3b7
SHA5127b153daa7ab6f24017c82ab0507e194e9528e1ed632c4f3e6c25f7b29494434eb3d6a76b4aa0791be436feb906711f5f4483662ba8ec62f5cb96e8bb1df1f7d9
-
C:\Users\Admin\AppData\Local\Temp\6FC2.exeFilesize
283KB
MD5eb9b9624c44ec36f6489d30e5213045b
SHA1eb64885704c59350b0f2dd7a4e144a54480d6f22
SHA256f4ad9b9bf522392502cb31ccdda5313f3bd41195da5ab179604a450a3239b3b7
SHA5127b153daa7ab6f24017c82ab0507e194e9528e1ed632c4f3e6c25f7b29494434eb3d6a76b4aa0791be436feb906711f5f4483662ba8ec62f5cb96e8bb1df1f7d9
-
C:\Users\Admin\AppData\Local\Temp\7FD1.exeFilesize
283KB
MD55e6634f3e902cc40d0a94c9266b42221
SHA169dd1f7e03d2c89504d6c7b288ca40f337ee60dd
SHA2561edf30d94cabdd323fb90fe6882418335c731c25ec22ffe71650a749721474df
SHA512f2a32b2875f9e4949136cd92d7d3d16c674f75e7cdabce4d84689b2dd5564c34f0d7c761b20df81eb18aa607c667b1643573983314f0520ab6273a00dbdc2466
-
C:\Users\Admin\AppData\Local\Temp\7FD1.exeFilesize
283KB
MD55e6634f3e902cc40d0a94c9266b42221
SHA169dd1f7e03d2c89504d6c7b288ca40f337ee60dd
SHA2561edf30d94cabdd323fb90fe6882418335c731c25ec22ffe71650a749721474df
SHA512f2a32b2875f9e4949136cd92d7d3d16c674f75e7cdabce4d84689b2dd5564c34f0d7c761b20df81eb18aa607c667b1643573983314f0520ab6273a00dbdc2466
-
C:\Users\Admin\AppData\Local\Temp\D854.exeFilesize
378KB
MD5731c639d004843f2c66fe6270b390754
SHA1605c3ae537bf210fda80b2cd492827b85e30ae83
SHA2565b1681d06c0bdff4730d772fdd7be80b97bdeb0c614ad6b082dcfc0565c71d61
SHA512ea657767328a33bc9073ef512ce6f0b3fb5059ba4d8621c346c120f4207506dbcf7ebd9e6349e9b585daf6fc8ea876c54607a34489c1840655a6f607519f40e8
-
C:\Users\Admin\AppData\Local\Temp\D854.exeFilesize
378KB
MD5731c639d004843f2c66fe6270b390754
SHA1605c3ae537bf210fda80b2cd492827b85e30ae83
SHA2565b1681d06c0bdff4730d772fdd7be80b97bdeb0c614ad6b082dcfc0565c71d61
SHA512ea657767328a33bc9073ef512ce6f0b3fb5059ba4d8621c346c120f4207506dbcf7ebd9e6349e9b585daf6fc8ea876c54607a34489c1840655a6f607519f40e8
-
memory/376-966-0x0000000000720000-0x0000000000723000-memory.dmpFilesize
12KB
-
memory/1060-134-0x0000000000680000-0x0000000000689000-memory.dmpFilesize
36KB
-
memory/1060-136-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/2748-972-0x0000000000550000-0x0000000000553000-memory.dmpFilesize
12KB
-
memory/3192-135-0x0000000000620000-0x0000000000636000-memory.dmpFilesize
88KB
-
memory/3992-187-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-199-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-155-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-157-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-159-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-161-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-163-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-165-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-167-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-169-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-171-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-173-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-175-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-177-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-179-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-181-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-183-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/3992-184-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/3992-185-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-151-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-191-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-189-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-193-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-195-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-197-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-153-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-201-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-203-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-205-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-207-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-209-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-211-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-942-0x00000000053C0000-0x00000000059D8000-memory.dmpFilesize
6.1MB
-
memory/3992-943-0x00000000029E0000-0x00000000029F2000-memory.dmpFilesize
72KB
-
memory/3992-944-0x00000000059E0000-0x0000000005AEA000-memory.dmpFilesize
1.0MB
-
memory/3992-945-0x0000000002A00000-0x0000000002A3C000-memory.dmpFilesize
240KB
-
memory/3992-946-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/3992-947-0x0000000005D60000-0x0000000005DC6000-memory.dmpFilesize
408KB
-
memory/3992-948-0x0000000006D00000-0x0000000006D92000-memory.dmpFilesize
584KB
-
memory/3992-949-0x0000000006DE0000-0x0000000006E56000-memory.dmpFilesize
472KB
-
memory/3992-950-0x0000000006EA0000-0x0000000007062000-memory.dmpFilesize
1.8MB
-
memory/3992-951-0x0000000007080000-0x00000000075AC000-memory.dmpFilesize
5.2MB
-
memory/3992-952-0x00000000076D0000-0x00000000076EE000-memory.dmpFilesize
120KB
-
memory/3992-954-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/3992-955-0x00000000079D0000-0x0000000007A20000-memory.dmpFilesize
320KB
-
memory/3992-150-0x00000000028F0000-0x0000000002942000-memory.dmpFilesize
328KB
-
memory/3992-149-0x0000000004E10000-0x00000000053B4000-memory.dmpFilesize
5.6MB
-
memory/3992-148-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/3992-147-0x0000000000670000-0x00000000006D2000-memory.dmpFilesize
392KB
-
memory/3992-956-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/3992-957-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB