Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:48

General

  • Target

    file.exe

  • Size

    251KB

  • MD5

    28676ee6929ed8b6d7082851f6933bc7

  • SHA1

    f391a10869df832a3942b6f3dec017819c5d2e1d

  • SHA256

    58cc5482d7de511b7adc6819c858b1c6de067fec262813396e0f580ada1e1ecd

  • SHA512

    4a47a0b4d04a0bb1ca49f77d3f653bcb4021368f3be1385022314ab48d4e8a6d5b8a32af727cca9d389794b3cf01afc028c7f92fce6587e981312e1c286d9978

  • SSDEEP

    3072:01XwHn5/TE2zdkzLuw/y0/IUIOIMzZ/4+DeuYOXSGEreU23ReOAj5qdqDb:cAHC2RkzLj/d/IKLxAreU23Ms4

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

koreamon

C2

koreamonitoring.com:80

Attributes
  • auth_value

    1a0e1a9f491ef3df873a03577dfa10aa

Signatures

  • Detect rhadamanthys stealer shellcode 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 31 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1960
  • C:\Users\Admin\AppData\Local\Temp\DBFD.exe
    C:\Users\Admin\AppData\Local\Temp\DBFD.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 2336
      2⤵
      • Program crash
      PID:3372
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4616 -ip 4616
    1⤵
      PID:1520
    • C:\Users\Admin\AppData\Local\Temp\4372.exe
      C:\Users\Admin\AppData\Local\Temp\4372.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Windows\system32\dllhost.exe
        "C:\Windows\system32\dllhost.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • outlook_office_path
        • outlook_win_path
        PID:2364
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 732
        2⤵
        • Program crash
        PID:3840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3320 -ip 3320
      1⤵
        PID:1568
      • C:\Users\Admin\AppData\Roaming\gwacihu
        C:\Users\Admin\AppData\Roaming\gwacihu
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:3252

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\4372.exe

        Filesize

        312KB

        MD5

        e6064fdee64cf67d083a2f1d16e6ad5b

        SHA1

        281160e46c60f4f57c12facc0b2575571d7220fa

        SHA256

        0048ab300c6ed6ac61084c54c9d1dfab5338e54b9cfb5fb6a2a765bde03b2191

        SHA512

        e9c85a7276b2242d79fe5b48fe4bfc63bb02a189d1f5860aa18361359b577e594e91d70070c9ca89b0876462fa8574d8ddb5f3d74b3f32f4fb9a000127e4ac56

      • C:\Users\Admin\AppData\Local\Temp\4372.exe

        Filesize

        312KB

        MD5

        e6064fdee64cf67d083a2f1d16e6ad5b

        SHA1

        281160e46c60f4f57c12facc0b2575571d7220fa

        SHA256

        0048ab300c6ed6ac61084c54c9d1dfab5338e54b9cfb5fb6a2a765bde03b2191

        SHA512

        e9c85a7276b2242d79fe5b48fe4bfc63bb02a189d1f5860aa18361359b577e594e91d70070c9ca89b0876462fa8574d8ddb5f3d74b3f32f4fb9a000127e4ac56

      • C:\Users\Admin\AppData\Local\Temp\DBFD.exe

        Filesize

        346KB

        MD5

        6093557e3e84e5ed1b2835e84941df6b

        SHA1

        24db3355c0ff0e30def3e3a99498d2f30cc66cf2

        SHA256

        34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db

        SHA512

        ecefc5eccc7c88a537681a33267598da43c32dbe2961a0fe09e4f4369a280b3cdefb1cc15810e9bcaf55ecd810511c50faf5cda32b0f08adf9a68023a276da8a

      • C:\Users\Admin\AppData\Local\Temp\DBFD.exe

        Filesize

        346KB

        MD5

        6093557e3e84e5ed1b2835e84941df6b

        SHA1

        24db3355c0ff0e30def3e3a99498d2f30cc66cf2

        SHA256

        34fbd6db5481ec0b9e6adb9ed999af2f93b59b834f9cefc76c8eacfaedeb79db

        SHA512

        ecefc5eccc7c88a537681a33267598da43c32dbe2961a0fe09e4f4369a280b3cdefb1cc15810e9bcaf55ecd810511c50faf5cda32b0f08adf9a68023a276da8a

      • C:\Users\Admin\AppData\Roaming\gwacihu

        Filesize

        251KB

        MD5

        28676ee6929ed8b6d7082851f6933bc7

        SHA1

        f391a10869df832a3942b6f3dec017819c5d2e1d

        SHA256

        58cc5482d7de511b7adc6819c858b1c6de067fec262813396e0f580ada1e1ecd

        SHA512

        4a47a0b4d04a0bb1ca49f77d3f653bcb4021368f3be1385022314ab48d4e8a6d5b8a32af727cca9d389794b3cf01afc028c7f92fce6587e981312e1c286d9978

      • C:\Users\Admin\AppData\Roaming\gwacihu

        Filesize

        251KB

        MD5

        28676ee6929ed8b6d7082851f6933bc7

        SHA1

        f391a10869df832a3942b6f3dec017819c5d2e1d

        SHA256

        58cc5482d7de511b7adc6819c858b1c6de067fec262813396e0f580ada1e1ecd

        SHA512

        4a47a0b4d04a0bb1ca49f77d3f653bcb4021368f3be1385022314ab48d4e8a6d5b8a32af727cca9d389794b3cf01afc028c7f92fce6587e981312e1c286d9978

      • memory/1960-134-0x0000000002440000-0x0000000002449000-memory.dmp

        Filesize

        36KB

      • memory/1960-136-0x0000000000400000-0x0000000000702000-memory.dmp

        Filesize

        3.0MB

      • memory/2364-985-0x00007FF448BE0000-0x00007FF448CDA000-memory.dmp

        Filesize

        1000KB

      • memory/2364-979-0x00007FF448BE0000-0x00007FF448CDA000-memory.dmp

        Filesize

        1000KB

      • memory/2364-977-0x0000024F22EA0000-0x0000024F22EA7000-memory.dmp

        Filesize

        28KB

      • memory/3144-135-0x0000000003340000-0x0000000003356000-memory.dmp

        Filesize

        88KB

      • memory/3320-981-0x0000000002340000-0x000000000235C000-memory.dmp

        Filesize

        112KB

      • memory/3320-976-0x0000000002360000-0x000000000237A000-memory.dmp

        Filesize

        104KB

      • memory/3320-973-0x0000000002360000-0x000000000237A000-memory.dmp

        Filesize

        104KB

      • memory/3320-972-0x0000000002360000-0x000000000237A000-memory.dmp

        Filesize

        104KB

      • memory/3320-971-0x0000000002340000-0x000000000235C000-memory.dmp

        Filesize

        112KB

      • memory/3320-965-0x0000000002310000-0x000000000233E000-memory.dmp

        Filesize

        184KB

      • memory/4616-195-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-942-0x00000000054F0000-0x0000000005B08000-memory.dmp

        Filesize

        6.1MB

      • memory/4616-167-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-169-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-171-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-173-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-175-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-177-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-179-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-181-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-183-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-185-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-187-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-189-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-191-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-193-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-163-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-197-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-199-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-201-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-203-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-205-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-207-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-209-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-211-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-165-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-943-0x0000000004E20000-0x0000000004E32000-memory.dmp

        Filesize

        72KB

      • memory/4616-944-0x0000000005B10000-0x0000000005C1A000-memory.dmp

        Filesize

        1.0MB

      • memory/4616-945-0x0000000004E40000-0x0000000004E7C000-memory.dmp

        Filesize

        240KB

      • memory/4616-946-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/4616-947-0x0000000005D50000-0x0000000005DB6000-memory.dmp

        Filesize

        408KB

      • memory/4616-948-0x0000000006E00000-0x0000000006E92000-memory.dmp

        Filesize

        584KB

      • memory/4616-949-0x0000000006ED0000-0x0000000006F46000-memory.dmp

        Filesize

        472KB

      • memory/4616-950-0x0000000006FA0000-0x0000000007162000-memory.dmp

        Filesize

        1.8MB

      • memory/4616-951-0x0000000007170000-0x000000000769C000-memory.dmp

        Filesize

        5.2MB

      • memory/4616-952-0x0000000007900000-0x000000000791E000-memory.dmp

        Filesize

        120KB

      • memory/4616-953-0x0000000007BD0000-0x0000000007C20000-memory.dmp

        Filesize

        320KB

      • memory/4616-955-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/4616-161-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-159-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-157-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-155-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-153-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-152-0x0000000004D50000-0x0000000004DA2000-memory.dmp

        Filesize

        328KB

      • memory/4616-151-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/4616-150-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/4616-149-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/4616-148-0x0000000002340000-0x00000000023A2000-memory.dmp

        Filesize

        392KB

      • memory/4616-147-0x0000000004F40000-0x00000000054E4000-memory.dmp

        Filesize

        5.6MB

      • memory/4616-956-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/4616-957-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB