Analysis

  • max time kernel
    206s
  • max time network
    246s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 10:01

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    4a8c24ac955635a139201c1d84d278b5

  • SHA1

    c13a1926b55d1446bb46b736776df84424a7dff5

  • SHA256

    95b032534407f098cd6afaf8388a08348f7c3ce991059cd65eb66885451018cf

  • SHA512

    bef6aa1879f27538a33cb210275420f9ffbf2021e2a764d501bd941812d54ef0879d497dbc4f077e56ccce93c74a1f0a4ddc4f68adae58dc7ba54cd523e83f34

  • SSDEEP

    24576:WyAoAMct0ajNNo7uRQAk7jZfi+/PADc99oLNPeN+TDeeu01xJ8rcSb1sz5:lBAMctXNY3jV9/PkI90NY+TqU1kXsz

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WQ7HX48.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WQ7HX48.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\LY7SV69.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\LY7SV69.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1544
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\le2Tz50.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\le2Tz50.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:900
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1er22hK0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1er22hK0.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1656
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4128
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1540
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 568
                6⤵
                • Program crash
                PID:3688
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2bt3535.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2bt3535.exe
              5⤵
              • Executes dropped EXE
              PID:5104
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3fT23rI.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3fT23rI.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1140
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:1704
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4VD762yN.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4VD762yN.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2316
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:4432
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
                PID:1168
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                  PID:1608
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5xF0Jr3.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5xF0Jr3.exe
              2⤵
              • Executes dropped EXE
              PID:3252
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EA52.tmp\EA53.tmp\EA54.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5xF0Jr3.exe"
                3⤵
                  PID:4148
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1656 -ip 1656
              1⤵
                PID:1296
              • C:\Users\Admin\AppData\Local\Temp\F7DE.exe
                C:\Users\Admin\AppData\Local\Temp\F7DE.exe
                1⤵
                  PID:1296

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                  Filesize

                  226B

                  MD5

                  916851e072fbabc4796d8916c5131092

                  SHA1

                  d48a602229a690c512d5fdaf4c8d77547a88e7a2

                  SHA256

                  7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                  SHA512

                  07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                • C:\Users\Admin\AppData\Local\Temp\F7DE.exe

                  Filesize

                  1.2MB

                  MD5

                  4d3c24b7d27be63f4758f7260abc2706

                  SHA1

                  316e3760f3973b78bbd1c23aece719cc364a6ddf

                  SHA256

                  056c5ab3c05140c67d349473778d07b059ec490bff16786956a21617b3081f95

                  SHA512

                  b1892f2ae0c2f911c21bdb21602d24d9dfaf12cbe1763409b6c6dc01546392fc311c611d5f404155b04397e24f0d8b16c2f194e35e505b1219076693ce742acc

                • C:\Users\Admin\AppData\Local\Temp\F7DE.exe

                  Filesize

                  1.2MB

                  MD5

                  4d3c24b7d27be63f4758f7260abc2706

                  SHA1

                  316e3760f3973b78bbd1c23aece719cc364a6ddf

                  SHA256

                  056c5ab3c05140c67d349473778d07b059ec490bff16786956a21617b3081f95

                  SHA512

                  b1892f2ae0c2f911c21bdb21602d24d9dfaf12cbe1763409b6c6dc01546392fc311c611d5f404155b04397e24f0d8b16c2f194e35e505b1219076693ce742acc

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5xF0Jr3.exe

                  Filesize

                  98KB

                  MD5

                  e09dc8c02a3c18cba9b1f84c855b5db6

                  SHA1

                  356ae83d66baecf6e72c7ffb709c32f3b6c5b5ed

                  SHA256

                  271efe7ada044340f03cfc7f3f4955bf6215805eaadc29eb49260133c0692117

                  SHA512

                  d73c9b13ee6c3e44b1ff9e11988762057ab97015d10fa8da4b6b2dd8aa1a356ffd3aecf2eaa5b27c3e8b2015c196b6a1f8b46c98415a703b30d64759181d8463

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5xF0Jr3.exe

                  Filesize

                  98KB

                  MD5

                  e09dc8c02a3c18cba9b1f84c855b5db6

                  SHA1

                  356ae83d66baecf6e72c7ffb709c32f3b6c5b5ed

                  SHA256

                  271efe7ada044340f03cfc7f3f4955bf6215805eaadc29eb49260133c0692117

                  SHA512

                  d73c9b13ee6c3e44b1ff9e11988762057ab97015d10fa8da4b6b2dd8aa1a356ffd3aecf2eaa5b27c3e8b2015c196b6a1f8b46c98415a703b30d64759181d8463

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WQ7HX48.exe

                  Filesize

                  1.1MB

                  MD5

                  47f28327b54e30203387d94411ce14aa

                  SHA1

                  4f300271a4cf7b7d23eb079aed0fa3410b0b7c81

                  SHA256

                  1694b80a0120341d9842ceb53179973db213311e26d796ac8a3d67004409a1d0

                  SHA512

                  c0f8350d9e990a6261381b47b5e6374af6e17aaa5d80e3d610ee208d3e5798aeca2856087c0498606fcc5942d48859dffeca37d650504b9b6b909b27e4e72948

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WQ7HX48.exe

                  Filesize

                  1.1MB

                  MD5

                  47f28327b54e30203387d94411ce14aa

                  SHA1

                  4f300271a4cf7b7d23eb079aed0fa3410b0b7c81

                  SHA256

                  1694b80a0120341d9842ceb53179973db213311e26d796ac8a3d67004409a1d0

                  SHA512

                  c0f8350d9e990a6261381b47b5e6374af6e17aaa5d80e3d610ee208d3e5798aeca2856087c0498606fcc5942d48859dffeca37d650504b9b6b909b27e4e72948

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4VD762yN.exe

                  Filesize

                  1.2MB

                  MD5

                  c7e934f407ac2df2d175798b7bf10479

                  SHA1

                  ea0dd1f0253a697aa5fcd21ffca658cff4d5b533

                  SHA256

                  eb37b948c22a10c325ee2b09a22ecaf10fe29a120eb0daff6db894a3b8ee2cc4

                  SHA512

                  3cde25e5a5e75ee607629b3a308789153626272462852c82edea3d1fa4fcbba562cdc202b66beb5a3ef85d5ba9298fe1b6915e61cf667128a16f4fa1cf5271e5

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4VD762yN.exe

                  Filesize

                  1.2MB

                  MD5

                  c7e934f407ac2df2d175798b7bf10479

                  SHA1

                  ea0dd1f0253a697aa5fcd21ffca658cff4d5b533

                  SHA256

                  eb37b948c22a10c325ee2b09a22ecaf10fe29a120eb0daff6db894a3b8ee2cc4

                  SHA512

                  3cde25e5a5e75ee607629b3a308789153626272462852c82edea3d1fa4fcbba562cdc202b66beb5a3ef85d5ba9298fe1b6915e61cf667128a16f4fa1cf5271e5

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\LY7SV69.exe

                  Filesize

                  708KB

                  MD5

                  5779552cc759e8e26cc13d5bbefa0fba

                  SHA1

                  8a74c56a9f86c482c56b8eb6211e47fee5640937

                  SHA256

                  037762e16cc11708445aa02839820a33e465178e74d26f2c0c76d5c4dd856b40

                  SHA512

                  34c4505ae703a7bc7e99b728640b864f8bacfda36a4166d4e7601a6ef2f554e17edfad7e0311da67af4441d8679069b01ae2be833156174d41ac1566a8a2acdd

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\LY7SV69.exe

                  Filesize

                  708KB

                  MD5

                  5779552cc759e8e26cc13d5bbefa0fba

                  SHA1

                  8a74c56a9f86c482c56b8eb6211e47fee5640937

                  SHA256

                  037762e16cc11708445aa02839820a33e465178e74d26f2c0c76d5c4dd856b40

                  SHA512

                  34c4505ae703a7bc7e99b728640b864f8bacfda36a4166d4e7601a6ef2f554e17edfad7e0311da67af4441d8679069b01ae2be833156174d41ac1566a8a2acdd

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3fT23rI.exe

                  Filesize

                  966KB

                  MD5

                  28ecf44eb598ac3d66b23bd37446af94

                  SHA1

                  fa5ad2c8e5a60d37ea70bb5c437cee973faee61a

                  SHA256

                  4ae4214b5ae3d1cb9637cc1a29e3d7c56fe4d5807cf16eaab9d3c4cbc45bc1fe

                  SHA512

                  2b3decdbd70f903b65f15d4083d6dc794127dd03df0740799257af1c60213f3f925f436b25df32a8e096b811fddb28bf8dfa1cfc08d49fbf245ce75739e33eaf

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3fT23rI.exe

                  Filesize

                  966KB

                  MD5

                  28ecf44eb598ac3d66b23bd37446af94

                  SHA1

                  fa5ad2c8e5a60d37ea70bb5c437cee973faee61a

                  SHA256

                  4ae4214b5ae3d1cb9637cc1a29e3d7c56fe4d5807cf16eaab9d3c4cbc45bc1fe

                  SHA512

                  2b3decdbd70f903b65f15d4083d6dc794127dd03df0740799257af1c60213f3f925f436b25df32a8e096b811fddb28bf8dfa1cfc08d49fbf245ce75739e33eaf

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\le2Tz50.exe

                  Filesize

                  330KB

                  MD5

                  213b2be572a95324ac8090d03aca5761

                  SHA1

                  092495ec377476bae19d6426ec64bba7f36a9d59

                  SHA256

                  5df0942f840ef9f1ff04b87160525d529766b9adaf98409bf254ec61f705f6bf

                  SHA512

                  c231e793be680cb15b54c5aad0a95c2446d073f8026eca18ebc67b68bd608f8be27046a968049f15c0779b9ce051caee6487879a197d3a1237fdcdcd25f3f601

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\le2Tz50.exe

                  Filesize

                  330KB

                  MD5

                  213b2be572a95324ac8090d03aca5761

                  SHA1

                  092495ec377476bae19d6426ec64bba7f36a9d59

                  SHA256

                  5df0942f840ef9f1ff04b87160525d529766b9adaf98409bf254ec61f705f6bf

                  SHA512

                  c231e793be680cb15b54c5aad0a95c2446d073f8026eca18ebc67b68bd608f8be27046a968049f15c0779b9ce051caee6487879a197d3a1237fdcdcd25f3f601

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1er22hK0.exe

                  Filesize

                  232KB

                  MD5

                  3ff825411b1fe07e712a5dcae34f80eb

                  SHA1

                  e3e4358cabfa74d6e36e26754b01ed78434a6877

                  SHA256

                  69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

                  SHA512

                  325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1er22hK0.exe

                  Filesize

                  232KB

                  MD5

                  3ff825411b1fe07e712a5dcae34f80eb

                  SHA1

                  e3e4358cabfa74d6e36e26754b01ed78434a6877

                  SHA256

                  69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

                  SHA512

                  325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2bt3535.exe

                  Filesize

                  180KB

                  MD5

                  3f305144feb3040cf41b216841537ec2

                  SHA1

                  ae9066cc3b40be6250e7e6a90bcc2de160067b84

                  SHA256

                  89fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1

                  SHA512

                  ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2bt3535.exe

                  Filesize

                  180KB

                  MD5

                  3f305144feb3040cf41b216841537ec2

                  SHA1

                  ae9066cc3b40be6250e7e6a90bcc2de160067b84

                  SHA256

                  89fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1

                  SHA512

                  ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e

                • memory/1540-29-0x0000000073A50000-0x0000000074200000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1540-32-0x0000000073A50000-0x0000000074200000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1540-28-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB

                • memory/1540-30-0x0000000073A50000-0x0000000074200000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1608-59-0x0000000008210000-0x00000000087B4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1608-50-0x0000000073E80000-0x0000000074630000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1608-54-0x0000000073E80000-0x0000000074630000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1608-60-0x0000000007C60000-0x0000000007CF2000-memory.dmp

                  Filesize

                  584KB

                • memory/1608-61-0x0000000007DE0000-0x0000000007DF0000-memory.dmp

                  Filesize

                  64KB

                • memory/1608-62-0x0000000007D60000-0x0000000007D6A000-memory.dmp

                  Filesize

                  40KB

                • memory/1608-63-0x0000000008DE0000-0x00000000093F8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/1608-48-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1608-68-0x0000000008010000-0x000000000811A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1704-39-0x0000000000400000-0x0000000000409000-memory.dmp

                  Filesize

                  36KB

                • memory/1704-40-0x0000000000400000-0x0000000000409000-memory.dmp

                  Filesize

                  36KB

                • memory/1704-47-0x0000000000400000-0x0000000000409000-memory.dmp

                  Filesize

                  36KB

                • memory/3188-44-0x00000000032D0000-0x00000000032E6000-memory.dmp

                  Filesize

                  88KB