Analysis
-
max time kernel
301s -
max time network
288s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-09-2023 04:51
Static task
static1
Behavioral task
behavioral1
Sample
75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe
Resource
win10-20230831-en
General
-
Target
75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe
-
Size
207KB
-
MD5
29f9c469d2695d3d90204fd2f7226efd
-
SHA1
4ec4b5892bbeac6e37e8c609b54648bf40a123bb
-
SHA256
75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4
-
SHA512
b29421b982a1801ecb957c2868c9987c187979258f16e3493f2456e8ffaa0cee78da4129aba2b2e726351ba807ec813eaa5a375b36c24f2035a6eb0cd503f7cc
-
SSDEEP
3072:rDVjvYR+L4xC/yx9J2pJgZwl36OkjfWVEEcoTyYR:fCR+L4CMqBN6Ok6VeM9
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Extracted
redline
installs
162.55.189.218:26952
-
auth_value
4bdfa4191a2826ff2af143a4691bab78
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
Processes:
pid process 1268 -
Executes dropped EXE 2 IoCs
Processes:
D461.exe1C99.exepid process 1984 D461.exe 1612 1C99.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
D461.exe1C99.exedescription pid process target process PID 1984 set thread context of 2808 1984 D461.exe AppLaunch.exe PID 1612 set thread context of 1856 1612 1C99.exe vbc.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exepid process 2408 75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe 2408 75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1268 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exepid process 2408 75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vbc.exedescription pid process Token: SeShutdownPrivilege 1268 Token: SeShutdownPrivilege 1268 Token: SeDebugPrivilege 1856 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
D461.exe1C99.exedescription pid process target process PID 1268 wrote to memory of 1984 1268 D461.exe PID 1268 wrote to memory of 1984 1268 D461.exe PID 1268 wrote to memory of 1984 1268 D461.exe PID 1268 wrote to memory of 1984 1268 D461.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1984 wrote to memory of 2808 1984 D461.exe AppLaunch.exe PID 1268 wrote to memory of 1612 1268 1C99.exe PID 1268 wrote to memory of 1612 1268 1C99.exe PID 1268 wrote to memory of 1612 1268 1C99.exe PID 1268 wrote to memory of 1612 1268 1C99.exe PID 1612 wrote to memory of 1856 1612 1C99.exe vbc.exe PID 1612 wrote to memory of 1856 1612 1C99.exe vbc.exe PID 1612 wrote to memory of 1856 1612 1C99.exe vbc.exe PID 1612 wrote to memory of 1856 1612 1C99.exe vbc.exe PID 1612 wrote to memory of 1856 1612 1C99.exe vbc.exe PID 1612 wrote to memory of 1856 1612 1C99.exe vbc.exe PID 1268 wrote to memory of 1696 1268 explorer.exe PID 1268 wrote to memory of 1696 1268 explorer.exe PID 1268 wrote to memory of 1696 1268 explorer.exe PID 1268 wrote to memory of 1696 1268 explorer.exe PID 1268 wrote to memory of 1696 1268 explorer.exe PID 1268 wrote to memory of 2508 1268 explorer.exe PID 1268 wrote to memory of 2508 1268 explorer.exe PID 1268 wrote to memory of 2508 1268 explorer.exe PID 1268 wrote to memory of 2508 1268 explorer.exe PID 1268 wrote to memory of 2216 1268 explorer.exe PID 1268 wrote to memory of 2216 1268 explorer.exe PID 1268 wrote to memory of 2216 1268 explorer.exe PID 1268 wrote to memory of 2216 1268 explorer.exe PID 1268 wrote to memory of 2216 1268 explorer.exe PID 1268 wrote to memory of 2028 1268 explorer.exe PID 1268 wrote to memory of 2028 1268 explorer.exe PID 1268 wrote to memory of 2028 1268 explorer.exe PID 1268 wrote to memory of 2028 1268 explorer.exe PID 1268 wrote to memory of 2052 1268 explorer.exe PID 1268 wrote to memory of 2052 1268 explorer.exe PID 1268 wrote to memory of 2052 1268 explorer.exe PID 1268 wrote to memory of 2052 1268 explorer.exe PID 1268 wrote to memory of 2052 1268 explorer.exe PID 1268 wrote to memory of 1092 1268 explorer.exe PID 1268 wrote to memory of 1092 1268 explorer.exe PID 1268 wrote to memory of 1092 1268 explorer.exe PID 1268 wrote to memory of 1092 1268 explorer.exe PID 1268 wrote to memory of 1092 1268 explorer.exe PID 1268 wrote to memory of 1188 1268 explorer.exe PID 1268 wrote to memory of 1188 1268 explorer.exe PID 1268 wrote to memory of 1188 1268 explorer.exe PID 1268 wrote to memory of 1188 1268 explorer.exe PID 1268 wrote to memory of 1188 1268 explorer.exe PID 1268 wrote to memory of 1796 1268 explorer.exe PID 1268 wrote to memory of 1796 1268 explorer.exe PID 1268 wrote to memory of 1796 1268 explorer.exe PID 1268 wrote to memory of 1796 1268 explorer.exe PID 1268 wrote to memory of 1776 1268 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe"C:\Users\Admin\AppData\Local\Temp\75f1b83365dc9f8867aae86d9b8234f544d0b193743bfb012d31a258652d2bc4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D461.exeC:\Users\Admin\AppData\Local\Temp\D461.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1C99.exeC:\Users\Admin\AppData\Local\Temp\1C99.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD532beebd6870d315a2fa10784a7e5746f
SHA1fcdfc9874da83e1b98b087a622e77ff0e52497a0
SHA256f7c696aa1b1cd8f4cfa713cc8c0d6fe0ab02788ca6fcd115fc20133a29e3fbd4
SHA512e62aac89e1cda744da33d010bc77bafa4586a018bfaa2fe77ac72d3bc7898b730d3d60336b504abe46d43808b8c27d99808ef8a393919274ddc7690fa7594c72
-
C:\Users\Admin\AppData\Local\Temp\1C99.exeFilesize
1.6MB
MD5d57accb7d374c8489a3cde9533043084
SHA1d627a1b90e3a1440838a0a7703c25328ad2db210
SHA256e54b359e1dd5757218f6ab704f705f99e52363f755df843b680850b7e513b0ca
SHA5127433d210ace1929e79cf4e3873246aef729b172bfeb74ee744813965533b1cf24ff288c6e6d2c75195365861d0ca149b5bccb9d48cb395b9eafe4d3d53557d46
-
C:\Users\Admin\AppData\Local\Temp\CabC3BE.tmpFilesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\Local\Temp\D461.exeFilesize
380KB
MD580c339b9cfb70abfcb04639c45ed43cd
SHA18528245af0095d13719df2d074783e7e3e3b7b9c
SHA25675dd991971cab83f49b214ca6e3dca575395db63514e334f8b0065478af6f077
SHA5124a54f03886aed7af2ff71e7f36e9193194c11ebf1d924922bdb8d5a0b70a73d001db3c263dbb193c188c6fe52070435da2771a6ecdba8310b40f7a5ef7f80c4e
-
C:\Users\Admin\AppData\Local\Temp\D461.exeFilesize
380KB
MD580c339b9cfb70abfcb04639c45ed43cd
SHA18528245af0095d13719df2d074783e7e3e3b7b9c
SHA25675dd991971cab83f49b214ca6e3dca575395db63514e334f8b0065478af6f077
SHA5124a54f03886aed7af2ff71e7f36e9193194c11ebf1d924922bdb8d5a0b70a73d001db3c263dbb193c188c6fe52070435da2771a6ecdba8310b40f7a5ef7f80c4e
-
C:\Users\Admin\AppData\Local\Temp\TarC557.tmpFilesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
memory/1092-152-0x0000000000090000-0x0000000000095000-memory.dmpFilesize
20KB
-
memory/1092-166-0x0000000000090000-0x0000000000095000-memory.dmpFilesize
20KB
-
memory/1092-153-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/1092-151-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/1188-157-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1188-155-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1188-156-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB
-
memory/1188-167-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB
-
memory/1268-4-0x0000000002B60000-0x0000000002B76000-memory.dmpFilesize
88KB
-
memory/1612-128-0x0000000000EC0000-0x000000000105B000-memory.dmpFilesize
1.6MB
-
memory/1612-119-0x0000000000EC0000-0x000000000105B000-memory.dmpFilesize
1.6MB
-
memory/1696-150-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1696-134-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/1696-135-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1696-146-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/1696-136-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1776-169-0x0000000000090000-0x0000000000098000-memory.dmpFilesize
32KB
-
memory/1776-163-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1776-162-0x0000000000090000-0x0000000000098000-memory.dmpFilesize
32KB
-
memory/1776-161-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/1796-168-0x0000000000060000-0x000000000006D000-memory.dmpFilesize
52KB
-
memory/1796-159-0x0000000000060000-0x000000000006D000-memory.dmpFilesize
52KB
-
memory/1796-160-0x0000000000070000-0x0000000000077000-memory.dmpFilesize
28KB
-
memory/1856-121-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1856-127-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1856-130-0x0000000074A70000-0x000000007515E000-memory.dmpFilesize
6.9MB
-
memory/1856-131-0x00000000071F0000-0x0000000007230000-memory.dmpFilesize
256KB
-
memory/1856-132-0x0000000074A70000-0x000000007515E000-memory.dmpFilesize
6.9MB
-
memory/1856-129-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1856-125-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1856-120-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2028-145-0x00000000000E0000-0x00000000000EC000-memory.dmpFilesize
48KB
-
memory/2028-143-0x00000000000F0000-0x00000000000F6000-memory.dmpFilesize
24KB
-
memory/2028-164-0x00000000000E0000-0x00000000000EC000-memory.dmpFilesize
48KB
-
memory/2052-165-0x00000000000B0000-0x00000000000D2000-memory.dmpFilesize
136KB
-
memory/2052-149-0x0000000000080000-0x00000000000A7000-memory.dmpFilesize
156KB
-
memory/2052-148-0x00000000000B0000-0x00000000000D2000-memory.dmpFilesize
136KB
-
memory/2052-147-0x0000000000080000-0x00000000000A7000-memory.dmpFilesize
156KB
-
memory/2216-158-0x0000000000090000-0x0000000000095000-memory.dmpFilesize
20KB
-
memory/2216-140-0x0000000000090000-0x0000000000095000-memory.dmpFilesize
20KB
-
memory/2216-141-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/2216-142-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/2408-1-0x00000000002F0000-0x00000000003F0000-memory.dmpFilesize
1024KB
-
memory/2408-5-0x0000000000400000-0x0000000001399000-memory.dmpFilesize
15.6MB
-
memory/2408-2-0x0000000000400000-0x0000000001399000-memory.dmpFilesize
15.6MB
-
memory/2408-3-0x00000000001B0000-0x00000000001B9000-memory.dmpFilesize
36KB
-
memory/2508-154-0x0000000000060000-0x000000000006F000-memory.dmpFilesize
60KB
-
memory/2508-139-0x0000000000060000-0x000000000006F000-memory.dmpFilesize
60KB
-
memory/2508-137-0x0000000000070000-0x0000000000079000-memory.dmpFilesize
36KB
-
memory/2808-105-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2808-104-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2808-103-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2808-107-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2808-109-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2808-114-0x0000000002640000-0x0000000002680000-memory.dmpFilesize
256KB
-
memory/2808-113-0x0000000074A70000-0x000000007515E000-memory.dmpFilesize
6.9MB
-
memory/2808-99-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2808-110-0x0000000074A70000-0x000000007515E000-memory.dmpFilesize
6.9MB
-
memory/2808-100-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2808-101-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2808-112-0x0000000002640000-0x0000000002680000-memory.dmpFilesize
256KB
-
memory/2808-111-0x0000000000210000-0x0000000000216000-memory.dmpFilesize
24KB