Analysis

  • max time kernel
    231s
  • max time network
    247s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 10:17

General

  • Target

    file.exe

  • Size

    1.5MB

  • MD5

    c275e48f6db5cbfcf44f9c045dc08cef

  • SHA1

    7913888d57fdb0e3861c8eb972a0a0999b241c83

  • SHA256

    d517f83af8533e39c70585b291a695f50abd4dd4324c8f6cbb5a626f41b47220

  • SHA512

    ae22e36290b2c0862192a311c0045761bcfccf5396bc568cbdd12bae590e829e2d613a434d03f12b39a461478a2ecad269dca43ac026b1bf1487c88d16af452b

  • SSDEEP

    49152:jJ9sOYRmpjtzTMrZgFhaC0aUoiNx1H4rwgcV9B:sfRizTeZC0a0NjHXgcVD

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 21 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TV8MN40.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TV8MN40.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sm1OF47.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sm1OF47.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rn3Zs74.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rn3Zs74.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4052
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1WD54Cw9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1WD54Cw9.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1820
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2px1104.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2px1104.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1408
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1332
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 540
                  7⤵
                  • Program crash
                  PID:1712
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3So41MS.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3So41MS.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4940
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:600
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4kv274Bv.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4kv274Bv.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3808
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:4972
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5zS4DV8.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5zS4DV8.exe
          2⤵
          • Executes dropped EXE
          PID:2156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1332 -ip 1332
        1⤵
          PID:3028

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5zS4DV8.exe

          Filesize

          99KB

          MD5

          84762422d67e13637f1261230738aefe

          SHA1

          50bb4579fc64a605f15fa4cfca1189848583f115

          SHA256

          10143505cdb497596eadba73f2b1cbff64b2406d3f667031cce900f221a6625f

          SHA512

          68f34f678a76ab61ebb4ab2588ea3528b2ac39c6f5aeb64c5565ca0a7cb45e3e214756b17a9e38d242b349df82d728225b3649f2a7299af795c09df15ecbf7fc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5zS4DV8.exe

          Filesize

          99KB

          MD5

          84762422d67e13637f1261230738aefe

          SHA1

          50bb4579fc64a605f15fa4cfca1189848583f115

          SHA256

          10143505cdb497596eadba73f2b1cbff64b2406d3f667031cce900f221a6625f

          SHA512

          68f34f678a76ab61ebb4ab2588ea3528b2ac39c6f5aeb64c5565ca0a7cb45e3e214756b17a9e38d242b349df82d728225b3649f2a7299af795c09df15ecbf7fc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TV8MN40.exe

          Filesize

          1.4MB

          MD5

          754a88f698d42cb15dd52874c4f4c035

          SHA1

          e2e7abde96dc34c1f200d7db563a70dcd15468f8

          SHA256

          588c62b075b52ba9c4df9add905ed5086b7f6d0c74e3d2c109c828472e8a97cd

          SHA512

          85bc1abdd6c6ba8a2f8c175477c25a1bb5766225b89322b6b0b26fd2bfc71a64447a86ce275145f4fbf79cb37b3d8412f5fe87c2918946bc0dc1ddb0487b123a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TV8MN40.exe

          Filesize

          1.4MB

          MD5

          754a88f698d42cb15dd52874c4f4c035

          SHA1

          e2e7abde96dc34c1f200d7db563a70dcd15468f8

          SHA256

          588c62b075b52ba9c4df9add905ed5086b7f6d0c74e3d2c109c828472e8a97cd

          SHA512

          85bc1abdd6c6ba8a2f8c175477c25a1bb5766225b89322b6b0b26fd2bfc71a64447a86ce275145f4fbf79cb37b3d8412f5fe87c2918946bc0dc1ddb0487b123a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4kv274Bv.exe

          Filesize

          1.2MB

          MD5

          267ef1a960bfb0bb33928ec219dc1cea

          SHA1

          fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf

          SHA256

          b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e

          SHA512

          ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4kv274Bv.exe

          Filesize

          1.2MB

          MD5

          267ef1a960bfb0bb33928ec219dc1cea

          SHA1

          fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf

          SHA256

          b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e

          SHA512

          ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sm1OF47.exe

          Filesize

          1005KB

          MD5

          8be29beec5f04dd09996b0c770e0c5dc

          SHA1

          94efcbae3bda957cef8480eb5a7b9ae2e0da7186

          SHA256

          bddb8f64f5ce52c7716e5a30797a9227c451e131f99e2adc810ffccb8e0b94c6

          SHA512

          493da5bd858d38c118fab04a7cccdae083f693611dbb7bb3609344e4d09800f82e579c20f830fa0445a1d2e151746cbf9c87f69ce7813819e7725d09cb866b50

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sm1OF47.exe

          Filesize

          1005KB

          MD5

          8be29beec5f04dd09996b0c770e0c5dc

          SHA1

          94efcbae3bda957cef8480eb5a7b9ae2e0da7186

          SHA256

          bddb8f64f5ce52c7716e5a30797a9227c451e131f99e2adc810ffccb8e0b94c6

          SHA512

          493da5bd858d38c118fab04a7cccdae083f693611dbb7bb3609344e4d09800f82e579c20f830fa0445a1d2e151746cbf9c87f69ce7813819e7725d09cb866b50

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3So41MS.exe

          Filesize

          973KB

          MD5

          5dc4be46727c1853e63ebdd240ec9bd9

          SHA1

          6265b41bbecbb96cf666d2b4cbd6f209f44d7a2d

          SHA256

          1df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446

          SHA512

          59828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3So41MS.exe

          Filesize

          973KB

          MD5

          5dc4be46727c1853e63ebdd240ec9bd9

          SHA1

          6265b41bbecbb96cf666d2b4cbd6f209f44d7a2d

          SHA256

          1df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446

          SHA512

          59828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rn3Zs74.exe

          Filesize

          621KB

          MD5

          7c69e905b5d8234e1309604ea6cd31ec

          SHA1

          8eb0162fbbd0f7b25332f7aad71ae67a3a29d577

          SHA256

          9895fc29e8ad56f0c1b83b839d3d87f23639b653d80f56de1f87389d231c3d9b

          SHA512

          a2aea6b1052d2305e458e2f802fe61ed45f2ae987f38d2cc8146dc139bcac1c26068cf40f10e908fdc1e559e9d34dac2995d312ac3348b186cab3221d0689523

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rn3Zs74.exe

          Filesize

          621KB

          MD5

          7c69e905b5d8234e1309604ea6cd31ec

          SHA1

          8eb0162fbbd0f7b25332f7aad71ae67a3a29d577

          SHA256

          9895fc29e8ad56f0c1b83b839d3d87f23639b653d80f56de1f87389d231c3d9b

          SHA512

          a2aea6b1052d2305e458e2f802fe61ed45f2ae987f38d2cc8146dc139bcac1c26068cf40f10e908fdc1e559e9d34dac2995d312ac3348b186cab3221d0689523

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1WD54Cw9.exe

          Filesize

          195KB

          MD5

          7f726f7dac36a27880ea545866534dda

          SHA1

          a644a86f8ffe8497101eb2c8ef69b859fb51119d

          SHA256

          7d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a

          SHA512

          8d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1WD54Cw9.exe

          Filesize

          195KB

          MD5

          7f726f7dac36a27880ea545866534dda

          SHA1

          a644a86f8ffe8497101eb2c8ef69b859fb51119d

          SHA256

          7d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a

          SHA512

          8d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2px1104.exe

          Filesize

          1.1MB

          MD5

          6ef68ec5b2d91cbc9c66fa0553e527ec

          SHA1

          8d8ab02a5f2433cf12ba62336e4d774f2bbf21d2

          SHA256

          8ffa8c6bcf0b38b229ac57e8a8eacfad2d27bd2b6ec971af827609bfb919495f

          SHA512

          1a02ccdf3d1be279169bc25eb2a4452be337389b78050811ea4367ca624d5d169c7c7e157a73fe3be13378412e8d94606f41c157b5892cc76c4344ee85d204a6

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2px1104.exe

          Filesize

          1.1MB

          MD5

          6ef68ec5b2d91cbc9c66fa0553e527ec

          SHA1

          8d8ab02a5f2433cf12ba62336e4d774f2bbf21d2

          SHA256

          8ffa8c6bcf0b38b229ac57e8a8eacfad2d27bd2b6ec971af827609bfb919495f

          SHA512

          1a02ccdf3d1be279169bc25eb2a4452be337389b78050811ea4367ca624d5d169c7c7e157a73fe3be13378412e8d94606f41c157b5892cc76c4344ee85d204a6

        • memory/600-95-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/600-85-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/600-84-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/1332-80-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/1332-78-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/1332-77-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/1332-76-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/1820-34-0x0000000002600000-0x000000000261E000-memory.dmp

          Filesize

          120KB

        • memory/1820-44-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-54-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-56-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-58-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-60-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-64-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-66-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-62-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-67-0x0000000073BF0000-0x00000000743A0000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-68-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/1820-69-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/1820-70-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/1820-72-0x0000000073BF0000-0x00000000743A0000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-52-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-48-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-46-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-50-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-42-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-40-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-38-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-36-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-35-0x0000000002600000-0x0000000002618000-memory.dmp

          Filesize

          96KB

        • memory/1820-33-0x0000000004B10000-0x00000000050B4000-memory.dmp

          Filesize

          5.6MB

        • memory/1820-32-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/1820-31-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/1820-28-0x0000000073BF0000-0x00000000743A0000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-30-0x0000000002370000-0x0000000002390000-memory.dmp

          Filesize

          128KB

        • memory/1820-29-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/3172-93-0x0000000002D80000-0x0000000002D96000-memory.dmp

          Filesize

          88KB

        • memory/4972-89-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4972-97-0x00000000737A0000-0x0000000073F50000-memory.dmp

          Filesize

          7.7MB

        • memory/4972-99-0x0000000007A40000-0x0000000007AD2000-memory.dmp

          Filesize

          584KB

        • memory/4972-100-0x0000000007C50000-0x0000000007C60000-memory.dmp

          Filesize

          64KB

        • memory/4972-101-0x0000000007BE0000-0x0000000007BEA000-memory.dmp

          Filesize

          40KB

        • memory/4972-102-0x00000000737A0000-0x0000000073F50000-memory.dmp

          Filesize

          7.7MB