Analysis

  • max time kernel
    200s
  • max time network
    221s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    22/10/2023, 17:23

General

  • Target

    NEAS.912070d824eec676f21e297ce14e44f0.exe

  • Size

    544KB

  • MD5

    912070d824eec676f21e297ce14e44f0

  • SHA1

    5d9b2adaf4018eb3f949c4afdf6b2e72cb9fa28e

  • SHA256

    2607b672da7e893eb94cf4a2ce039d6e553873fb76b6d8cde936521dbbaac612

  • SHA512

    92528ff061fe564391b32190868dca5448dbd15ddc37a026a0a81c6faa902c638abf260a92cf8fd23fa9918ca2ec7c6f4039cbae2ba54f2db959aeca3e969ffe

  • SSDEEP

    12288:AMrBy90WD5wl79hkevCD/L/IQOeknY9fbL05lAuyGSwVT:RyJD2l7fFvCD0QqYKeuyGRVT

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.912070d824eec676f21e297ce14e44f0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.912070d824eec676f21e297ce14e44f0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gD1os29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gD1os29.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mS8Ds04.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mS8Ds04.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Uw76QM7.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Uw76QM7.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2TO6508.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2TO6508.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:3020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Ma911iE.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Ma911iE.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Ma911iE.exe

    Filesize

    221KB

    MD5

    8905918bd7e4f4aeda3a804d81f9ee40

    SHA1

    3c488a81539116085a1c22df26085f798f7202c8

    SHA256

    0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde

    SHA512

    6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Ma911iE.exe

    Filesize

    221KB

    MD5

    8905918bd7e4f4aeda3a804d81f9ee40

    SHA1

    3c488a81539116085a1c22df26085f798f7202c8

    SHA256

    0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde

    SHA512

    6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gD1os29.exe

    Filesize

    371KB

    MD5

    ca839fc59474f0ca93ba13cfb41e82f8

    SHA1

    6f253efc04c9d197df5beb7780a5c3154f81aa43

    SHA256

    f8b87bbfa3a868cb940b915c6a0e75e09aa4addb5c34eeea762b776729b3f7de

    SHA512

    3b0106626e03f2c1a7b46e4efd5af932e0484a52b2c31e6b9bff38a25dd3903290ffe9fff9de241257b4ee804e3e8cd43ba8c808032a15b9b28c7b6afe283a54

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gD1os29.exe

    Filesize

    371KB

    MD5

    ca839fc59474f0ca93ba13cfb41e82f8

    SHA1

    6f253efc04c9d197df5beb7780a5c3154f81aa43

    SHA256

    f8b87bbfa3a868cb940b915c6a0e75e09aa4addb5c34eeea762b776729b3f7de

    SHA512

    3b0106626e03f2c1a7b46e4efd5af932e0484a52b2c31e6b9bff38a25dd3903290ffe9fff9de241257b4ee804e3e8cd43ba8c808032a15b9b28c7b6afe283a54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe

    Filesize

    30KB

    MD5

    35a15fad3767597b01a20d75c3c6889a

    SHA1

    eef19e2757667578f73c4b5720cf94c2ab6e60c8

    SHA256

    90ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc

    SHA512

    c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe

    Filesize

    30KB

    MD5

    35a15fad3767597b01a20d75c3c6889a

    SHA1

    eef19e2757667578f73c4b5720cf94c2ab6e60c8

    SHA256

    90ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc

    SHA512

    c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe

    Filesize

    30KB

    MD5

    35a15fad3767597b01a20d75c3c6889a

    SHA1

    eef19e2757667578f73c4b5720cf94c2ab6e60c8

    SHA256

    90ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc

    SHA512

    c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mS8Ds04.exe

    Filesize

    246KB

    MD5

    343fc11824d64cddd2da97ae2854eeec

    SHA1

    c253b4a12f5aca74d4adf6bf03b0257414b55cd8

    SHA256

    2d8f02b1ab74aea043df8f932cd9a99abea27646f5710bcb65f2e243b6e8b38e

    SHA512

    e099a2141bffdda500872dd6b3edb3f949648357a2a7bc41d093f2f65ac7be784e2c00e5b7d2d2c0340f343d38ac2fb6439b458fc30f96d28a02cd53956738e7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mS8Ds04.exe

    Filesize

    246KB

    MD5

    343fc11824d64cddd2da97ae2854eeec

    SHA1

    c253b4a12f5aca74d4adf6bf03b0257414b55cd8

    SHA256

    2d8f02b1ab74aea043df8f932cd9a99abea27646f5710bcb65f2e243b6e8b38e

    SHA512

    e099a2141bffdda500872dd6b3edb3f949648357a2a7bc41d093f2f65ac7be784e2c00e5b7d2d2c0340f343d38ac2fb6439b458fc30f96d28a02cd53956738e7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Uw76QM7.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Uw76QM7.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2TO6508.exe

    Filesize

    180KB

    MD5

    53e28e07671d832a65fbfe3aa38b6678

    SHA1

    6f9ea0ed8109030511c2c09c848f66bd0d16d1e1

    SHA256

    5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e

    SHA512

    053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2TO6508.exe

    Filesize

    180KB

    MD5

    53e28e07671d832a65fbfe3aa38b6678

    SHA1

    6f9ea0ed8109030511c2c09c848f66bd0d16d1e1

    SHA256

    5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e

    SHA512

    053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4Ma911iE.exe

    Filesize

    221KB

    MD5

    8905918bd7e4f4aeda3a804d81f9ee40

    SHA1

    3c488a81539116085a1c22df26085f798f7202c8

    SHA256

    0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde

    SHA512

    6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4Ma911iE.exe

    Filesize

    221KB

    MD5

    8905918bd7e4f4aeda3a804d81f9ee40

    SHA1

    3c488a81539116085a1c22df26085f798f7202c8

    SHA256

    0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde

    SHA512

    6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\gD1os29.exe

    Filesize

    371KB

    MD5

    ca839fc59474f0ca93ba13cfb41e82f8

    SHA1

    6f253efc04c9d197df5beb7780a5c3154f81aa43

    SHA256

    f8b87bbfa3a868cb940b915c6a0e75e09aa4addb5c34eeea762b776729b3f7de

    SHA512

    3b0106626e03f2c1a7b46e4efd5af932e0484a52b2c31e6b9bff38a25dd3903290ffe9fff9de241257b4ee804e3e8cd43ba8c808032a15b9b28c7b6afe283a54

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\gD1os29.exe

    Filesize

    371KB

    MD5

    ca839fc59474f0ca93ba13cfb41e82f8

    SHA1

    6f253efc04c9d197df5beb7780a5c3154f81aa43

    SHA256

    f8b87bbfa3a868cb940b915c6a0e75e09aa4addb5c34eeea762b776729b3f7de

    SHA512

    3b0106626e03f2c1a7b46e4efd5af932e0484a52b2c31e6b9bff38a25dd3903290ffe9fff9de241257b4ee804e3e8cd43ba8c808032a15b9b28c7b6afe283a54

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe

    Filesize

    30KB

    MD5

    35a15fad3767597b01a20d75c3c6889a

    SHA1

    eef19e2757667578f73c4b5720cf94c2ab6e60c8

    SHA256

    90ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc

    SHA512

    c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe

    Filesize

    30KB

    MD5

    35a15fad3767597b01a20d75c3c6889a

    SHA1

    eef19e2757667578f73c4b5720cf94c2ab6e60c8

    SHA256

    90ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc

    SHA512

    c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\3zE80yl.exe

    Filesize

    30KB

    MD5

    35a15fad3767597b01a20d75c3c6889a

    SHA1

    eef19e2757667578f73c4b5720cf94c2ab6e60c8

    SHA256

    90ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc

    SHA512

    c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mS8Ds04.exe

    Filesize

    246KB

    MD5

    343fc11824d64cddd2da97ae2854eeec

    SHA1

    c253b4a12f5aca74d4adf6bf03b0257414b55cd8

    SHA256

    2d8f02b1ab74aea043df8f932cd9a99abea27646f5710bcb65f2e243b6e8b38e

    SHA512

    e099a2141bffdda500872dd6b3edb3f949648357a2a7bc41d093f2f65ac7be784e2c00e5b7d2d2c0340f343d38ac2fb6439b458fc30f96d28a02cd53956738e7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mS8Ds04.exe

    Filesize

    246KB

    MD5

    343fc11824d64cddd2da97ae2854eeec

    SHA1

    c253b4a12f5aca74d4adf6bf03b0257414b55cd8

    SHA256

    2d8f02b1ab74aea043df8f932cd9a99abea27646f5710bcb65f2e243b6e8b38e

    SHA512

    e099a2141bffdda500872dd6b3edb3f949648357a2a7bc41d093f2f65ac7be784e2c00e5b7d2d2c0340f343d38ac2fb6439b458fc30f96d28a02cd53956738e7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1Uw76QM7.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1Uw76QM7.exe

    Filesize

    11KB

    MD5

    22b50c95b39cbbdb00d5a4cd3d4886bd

    SHA1

    db8326c4fad0064ce3020226e8556e7cce8ce04e

    SHA256

    160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1

    SHA512

    d53e872e03aac73cea2399170a0de74611496c0364ece1d81b8e7591aecc470edc57db63586ceda4bc82589e3b8f39668c49464d962e750dc86099736599f9ac

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\2TO6508.exe

    Filesize

    180KB

    MD5

    53e28e07671d832a65fbfe3aa38b6678

    SHA1

    6f9ea0ed8109030511c2c09c848f66bd0d16d1e1

    SHA256

    5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e

    SHA512

    053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\2TO6508.exe

    Filesize

    180KB

    MD5

    53e28e07671d832a65fbfe3aa38b6678

    SHA1

    6f9ea0ed8109030511c2c09c848f66bd0d16d1e1

    SHA256

    5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e

    SHA512

    053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

  • memory/1260-50-0x00000000029C0000-0x00000000029D6000-memory.dmp

    Filesize

    88KB

  • memory/2012-60-0x0000000001360000-0x000000000139E000-memory.dmp

    Filesize

    248KB

  • memory/2616-30-0x00000000002E0000-0x00000000002EA000-memory.dmp

    Filesize

    40KB

  • memory/2848-40-0x00000000000B0000-0x00000000000B9000-memory.dmp

    Filesize

    36KB

  • memory/2848-45-0x00000000000B0000-0x00000000000B9000-memory.dmp

    Filesize

    36KB

  • memory/3020-49-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3020-51-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB