Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 09:22
Static task
static1
General
-
Target
95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe
-
Size
303KB
-
MD5
566a85715428e226f1c5d48ca90b9e15
-
SHA1
f252975240083fd3ce4ff62a059d6dab226dd41d
-
SHA256
95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a
-
SHA512
2d716809dc374f5cc74f58e3ffca09d2bc7bbff8d27eef21ae768b9ee2148592b2572b194323fa64b814734b1a141d9c05db9a060f2c8e1080a566fc16672e4e
-
SSDEEP
3072:phLIBaL3BklS19u655D+kMxqrnRdFe1soM+e5CD9iwlgZDGW:PLIYL3BkgCS5vLejMID9iFG
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Extracted
redline
cc
94.228.169.160:43800
-
auth_value
ec4d19a9dd758ace38b4f5b4a447b048
Extracted
lumma
gstatic-node.io
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/3204-216-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-217-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-219-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-221-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-223-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-225-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-227-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-229-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-231-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-234-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-236-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-238-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-240-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-242-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-244-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-246-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-248-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-250-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-252-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-254-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-256-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-258-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-260-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline behavioral1/memory/3204-262-0x00000000051C0000-0x0000000005202000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
F721.exeFDE9.exe404.exepid process 3204 F721.exe 2636 FDE9.exe 1408 404.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
FDE9.exedescription pid process target process PID 2636 set thread context of 3948 2636 FDE9.exe AppLaunch.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1916 2636 WerFault.exe FDE9.exe 3436 1408 WerFault.exe 404.exe 1272 3204 WerFault.exe F721.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exepid process 3384 95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe 3384 95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3156 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exepid process 3384 95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 3156 -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
F721.exedescription pid process Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeDebugPrivilege 3204 F721.exe Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 Token: SeShutdownPrivilege 3156 Token: SeCreatePagefilePrivilege 3156 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3156 -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
FDE9.exedescription pid process target process PID 3156 wrote to memory of 3204 3156 F721.exe PID 3156 wrote to memory of 3204 3156 F721.exe PID 3156 wrote to memory of 3204 3156 F721.exe PID 3156 wrote to memory of 2636 3156 FDE9.exe PID 3156 wrote to memory of 2636 3156 FDE9.exe PID 3156 wrote to memory of 2636 3156 FDE9.exe PID 2636 wrote to memory of 3948 2636 FDE9.exe AppLaunch.exe PID 2636 wrote to memory of 3948 2636 FDE9.exe AppLaunch.exe PID 2636 wrote to memory of 3948 2636 FDE9.exe AppLaunch.exe PID 2636 wrote to memory of 3948 2636 FDE9.exe AppLaunch.exe PID 2636 wrote to memory of 3948 2636 FDE9.exe AppLaunch.exe PID 3156 wrote to memory of 1408 3156 404.exe PID 3156 wrote to memory of 1408 3156 404.exe PID 3156 wrote to memory of 1408 3156 404.exe PID 3156 wrote to memory of 2484 3156 explorer.exe PID 3156 wrote to memory of 2484 3156 explorer.exe PID 3156 wrote to memory of 2484 3156 explorer.exe PID 3156 wrote to memory of 2484 3156 explorer.exe PID 3156 wrote to memory of 4868 3156 explorer.exe PID 3156 wrote to memory of 4868 3156 explorer.exe PID 3156 wrote to memory of 4868 3156 explorer.exe PID 3156 wrote to memory of 4968 3156 explorer.exe PID 3156 wrote to memory of 4968 3156 explorer.exe PID 3156 wrote to memory of 4968 3156 explorer.exe PID 3156 wrote to memory of 4968 3156 explorer.exe PID 3156 wrote to memory of 1676 3156 explorer.exe PID 3156 wrote to memory of 1676 3156 explorer.exe PID 3156 wrote to memory of 1676 3156 explorer.exe PID 3156 wrote to memory of 1236 3156 explorer.exe PID 3156 wrote to memory of 1236 3156 explorer.exe PID 3156 wrote to memory of 1236 3156 explorer.exe PID 3156 wrote to memory of 1236 3156 explorer.exe PID 3156 wrote to memory of 916 3156 explorer.exe PID 3156 wrote to memory of 916 3156 explorer.exe PID 3156 wrote to memory of 916 3156 explorer.exe PID 3156 wrote to memory of 916 3156 explorer.exe PID 3156 wrote to memory of 1816 3156 explorer.exe PID 3156 wrote to memory of 1816 3156 explorer.exe PID 3156 wrote to memory of 1816 3156 explorer.exe PID 3156 wrote to memory of 1816 3156 explorer.exe PID 3156 wrote to memory of 1772 3156 explorer.exe PID 3156 wrote to memory of 1772 3156 explorer.exe PID 3156 wrote to memory of 1772 3156 explorer.exe PID 3156 wrote to memory of 3688 3156 explorer.exe PID 3156 wrote to memory of 3688 3156 explorer.exe PID 3156 wrote to memory of 3688 3156 explorer.exe PID 3156 wrote to memory of 3688 3156 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe"C:\Users\Admin\AppData\Local\Temp\95a2872b960a5ac372c19be5bb2d1f8cb50c75e043841b8862f8e0b0bcb8204a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3384
-
C:\Users\Admin\AppData\Local\Temp\F721.exeC:\Users\Admin\AppData\Local\Temp\F721.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 17562⤵
- Program crash
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\FDE9.exeC:\Users\Admin\AppData\Local\Temp\FDE9.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 4162⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2636 -ip 26361⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\404.exeC:\Users\Admin\AppData\Local\Temp\404.exe1⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 34802⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2484
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4868
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4968
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1676
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1236
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:916
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1816
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1772
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1408 -ip 14081⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3204 -ip 32041⤵PID:4608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5ab9327fce682d578e28456820e0d9baa
SHA148696ea54a5960a3f9bbbf96819a150ad93c33c1
SHA2561915d244bae2707f6531ea7ffc0fb7708f7cafcf2aa354223ea8112064b18eaf
SHA512dcfd05aeb32c42dd9b25c11e214fa7b9aac96c1bdb747ee71487bdce9f58cb6c691bb3266cd3f752b2abd83f9b17d297a767751bf14123dfc14820fb2cb6eaab
-
Filesize
381KB
MD5ab9327fce682d578e28456820e0d9baa
SHA148696ea54a5960a3f9bbbf96819a150ad93c33c1
SHA2561915d244bae2707f6531ea7ffc0fb7708f7cafcf2aa354223ea8112064b18eaf
SHA512dcfd05aeb32c42dd9b25c11e214fa7b9aac96c1bdb747ee71487bdce9f58cb6c691bb3266cd3f752b2abd83f9b17d297a767751bf14123dfc14820fb2cb6eaab
-
Filesize
312KB
MD5eabf49a55264bcc12f51bd2710718d3d
SHA1f0e82807f27f2a96f925530bf7aabac46a4e7136
SHA256ef23ae66bc212bf8e435bf806ff120db2470364f3b7362fe05f48b09df225eed
SHA5126a232ec02136cafc35bfcc7168c4df591dd712c8f89f8f133154796c0754362f4911dc3220089757eef43247116fa1b115a15f0f1ba6f312e96df5e8f3bb89b3
-
Filesize
312KB
MD5eabf49a55264bcc12f51bd2710718d3d
SHA1f0e82807f27f2a96f925530bf7aabac46a4e7136
SHA256ef23ae66bc212bf8e435bf806ff120db2470364f3b7362fe05f48b09df225eed
SHA5126a232ec02136cafc35bfcc7168c4df591dd712c8f89f8f133154796c0754362f4911dc3220089757eef43247116fa1b115a15f0f1ba6f312e96df5e8f3bb89b3
-
Filesize
2.0MB
MD571ef5fd46955ea0abd7800e7c99cc8b3
SHA1a9efdd480409e6b0a626ea6fd9efaf280b20bb75
SHA256fe20091e32e612a1b5b7043895ddf7d0131a544a6f86d177218645241070f32d
SHA512a5fb7bdb0df383295d35c7e7e73956e8f5061e9ec00e783fa36c8577234be3333bd8d26fd110de08b9809495587fb3f9b79742bd3fb178cf892c88c36a75e650
-
Filesize
2.0MB
MD571ef5fd46955ea0abd7800e7c99cc8b3
SHA1a9efdd480409e6b0a626ea6fd9efaf280b20bb75
SHA256fe20091e32e612a1b5b7043895ddf7d0131a544a6f86d177218645241070f32d
SHA512a5fb7bdb0df383295d35c7e7e73956e8f5061e9ec00e783fa36c8577234be3333bd8d26fd110de08b9809495587fb3f9b79742bd3fb178cf892c88c36a75e650