Analysis

  • max time kernel
    153s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2023 14:10

General

  • Target

    NEAS.6495d2ca3dd6a4b99c2eea97263d8d90.exe

  • Size

    1.0MB

  • MD5

    6495d2ca3dd6a4b99c2eea97263d8d90

  • SHA1

    392229589db4bd1c21cca7f2f6ff55804cd4b00e

  • SHA256

    708ed8e6c65b5c9069f630b7e7f78c01a6ae97ef961f045fce91480f2d4f6c2f

  • SHA512

    e5dbcb771c7aa536f960c571a8a10c3cb4ad19c56d34449faa6ad7c3763658fe6c8569333cb24ab9e3e906ec96099267de982d7847959fdd045dd24f1c1d109a

  • SSDEEP

    24576:Jy+GZhQfo8aJ7DQbOdrvxXbBYl3rdDF6pxstjxxJz+BLe4pe:8+GvQPbODLqlJWoz+BiK

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.6495d2ca3dd6a4b99c2eea97263d8d90.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.6495d2ca3dd6a4b99c2eea97263d8d90.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ln6qN59.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ln6qN59.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PJ1zl85.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PJ1zl85.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Rf27oT4.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Rf27oT4.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:388
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2272
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 584
            5⤵
            • Program crash
            PID:1124
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sA5108.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sA5108.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3872
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:4864
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 540
                6⤵
                • Program crash
                PID:3972
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 576
              5⤵
              • Program crash
              PID:868
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Hb86hv.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Hb86hv.exe
          3⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:1184
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4in290zB.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4in290zB.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:548
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:624
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 188
              3⤵
              • Program crash
              PID:532
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 388 -ip 388
          1⤵
            PID:4680
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3872 -ip 3872
            1⤵
              PID:2264
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4864 -ip 4864
              1⤵
                PID:3320
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4092 -ip 4092
                1⤵
                  PID:2044

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Persistence

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Privilege Escalation

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Defense Evasion

                Modify Registry

                2
                T1112

                Impair Defenses

                1
                T1562

                Disable or Modify Tools

                1
                T1562.001

                Discovery

                Query Registry

                1
                T1012

                Peripheral Device Discovery

                1
                T1120

                System Information Discovery

                1
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4in290zB.exe
                  Filesize

                  1.1MB

                  MD5

                  dfa9e951c06740a60e559a0e10606060

                  SHA1

                  bafb6217120091409c0e150740f435e2caa1051a

                  SHA256

                  b287dced5d97f2f8cf9b3fe6f5885addc12b485aafe5553d403cfa1aa1b6f88f

                  SHA512

                  42bf91eb9a252218cbad960495b9e7f4904b64f864c8bb6001da36061a3299960dac11caa2952b78190b381625af5d0f99c39f299f86c75fdab9b69a0fb79e56

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4in290zB.exe
                  Filesize

                  1.1MB

                  MD5

                  dfa9e951c06740a60e559a0e10606060

                  SHA1

                  bafb6217120091409c0e150740f435e2caa1051a

                  SHA256

                  b287dced5d97f2f8cf9b3fe6f5885addc12b485aafe5553d403cfa1aa1b6f88f

                  SHA512

                  42bf91eb9a252218cbad960495b9e7f4904b64f864c8bb6001da36061a3299960dac11caa2952b78190b381625af5d0f99c39f299f86c75fdab9b69a0fb79e56

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ln6qN59.exe
                  Filesize

                  651KB

                  MD5

                  6c4bc27494056e2ac4ca83786d39203a

                  SHA1

                  c89205b63ff60dacd24ae81cd5bff589d98ef8fe

                  SHA256

                  37d24a4a667f291db2cbb0e245e4537e1fbd8b43fddba62277f1102cd25e2d46

                  SHA512

                  488779a7f5b635dfdb5cf1060f9b808c093271540a6473ed9ce0455a8bc5fe1228c471301da2653d1e3ba6e44d8d3dff3c7abecffd5c7502ac9ef66b814d3ce7

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ln6qN59.exe
                  Filesize

                  651KB

                  MD5

                  6c4bc27494056e2ac4ca83786d39203a

                  SHA1

                  c89205b63ff60dacd24ae81cd5bff589d98ef8fe

                  SHA256

                  37d24a4a667f291db2cbb0e245e4537e1fbd8b43fddba62277f1102cd25e2d46

                  SHA512

                  488779a7f5b635dfdb5cf1060f9b808c093271540a6473ed9ce0455a8bc5fe1228c471301da2653d1e3ba6e44d8d3dff3c7abecffd5c7502ac9ef66b814d3ce7

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Hb86hv.exe
                  Filesize

                  30KB

                  MD5

                  b6257189df7ce7aebadc6f9657692223

                  SHA1

                  a26d1eb14d93d5e3c75d3689449028a53b0cb9b2

                  SHA256

                  61de299d1322d7553edf53a4413b68cf91d7098093b7a47453be4dfb9b33a15b

                  SHA512

                  672cf5df37e60eede6da861ea4b5028bf0889d38ce31dc18414907291ce3474a01009398f46d8cd39fc4bc5aee711e049aebe86e476bb9e3a7cf3a35b178d6ff

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Hb86hv.exe
                  Filesize

                  30KB

                  MD5

                  b6257189df7ce7aebadc6f9657692223

                  SHA1

                  a26d1eb14d93d5e3c75d3689449028a53b0cb9b2

                  SHA256

                  61de299d1322d7553edf53a4413b68cf91d7098093b7a47453be4dfb9b33a15b

                  SHA512

                  672cf5df37e60eede6da861ea4b5028bf0889d38ce31dc18414907291ce3474a01009398f46d8cd39fc4bc5aee711e049aebe86e476bb9e3a7cf3a35b178d6ff

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PJ1zl85.exe
                  Filesize

                  527KB

                  MD5

                  df473a99abfc95b8cf11b0b980877837

                  SHA1

                  dabf0a56dc26d488ca8ec729aaa27df150b20bfe

                  SHA256

                  5450f333f3b256c0abb4732c5ef2f79bd12fe1710f180418fb7a9becd61cdb95

                  SHA512

                  451bde8efe72998ee69de9498200b70ec3de68d6cceb2170ff9cdcd3e73f650d38d9199a3d77ea525ff7f8c9f163b256eb36c50f7869097efcdbfd55c8e68401

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PJ1zl85.exe
                  Filesize

                  527KB

                  MD5

                  df473a99abfc95b8cf11b0b980877837

                  SHA1

                  dabf0a56dc26d488ca8ec729aaa27df150b20bfe

                  SHA256

                  5450f333f3b256c0abb4732c5ef2f79bd12fe1710f180418fb7a9becd61cdb95

                  SHA512

                  451bde8efe72998ee69de9498200b70ec3de68d6cceb2170ff9cdcd3e73f650d38d9199a3d77ea525ff7f8c9f163b256eb36c50f7869097efcdbfd55c8e68401

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Rf27oT4.exe
                  Filesize

                  890KB

                  MD5

                  45f457d53d9bf053d442f263c5c9b7e4

                  SHA1

                  24104051bc81466c1ec05b152d995bf4ce43281b

                  SHA256

                  71e29b5ae4f5beaf774028a8df0d8c86b7574507cc80960b6e3c18e09d3c5b98

                  SHA512

                  26e94b032ba4b9c90eaa9a61827d120528a72306c99f6d9bedb33fcdf934725dfaa53209d0955eb43163a7889482cae4c5fe7fe782ade411a5dada85a10ebf6a

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Rf27oT4.exe
                  Filesize

                  890KB

                  MD5

                  45f457d53d9bf053d442f263c5c9b7e4

                  SHA1

                  24104051bc81466c1ec05b152d995bf4ce43281b

                  SHA256

                  71e29b5ae4f5beaf774028a8df0d8c86b7574507cc80960b6e3c18e09d3c5b98

                  SHA512

                  26e94b032ba4b9c90eaa9a61827d120528a72306c99f6d9bedb33fcdf934725dfaa53209d0955eb43163a7889482cae4c5fe7fe782ade411a5dada85a10ebf6a

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sA5108.exe
                  Filesize

                  1.1MB

                  MD5

                  6ab3c1a031542e8860903d0c6c23594f

                  SHA1

                  fa0829b2c5793e3566d45f22795f9cfba1eec86f

                  SHA256

                  07668deb6dc55ce5149f0ec65efb1c4c45860ade3859347dabb3f27d7a53cdbf

                  SHA512

                  25f01d51544938ea3efdad5c51396b65cb6872c55b3d8312513e809dffa997a0377771b04d706d59e5169f141c4b99fcd9897faa03f0dbf7f4ca1d4078fea76d

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sA5108.exe
                  Filesize

                  1.1MB

                  MD5

                  6ab3c1a031542e8860903d0c6c23594f

                  SHA1

                  fa0829b2c5793e3566d45f22795f9cfba1eec86f

                  SHA256

                  07668deb6dc55ce5149f0ec65efb1c4c45860ade3859347dabb3f27d7a53cdbf

                  SHA512

                  25f01d51544938ea3efdad5c51396b65cb6872c55b3d8312513e809dffa997a0377771b04d706d59e5169f141c4b99fcd9897faa03f0dbf7f4ca1d4078fea76d

                • memory/624-48-0x0000000007910000-0x000000000791A000-memory.dmp
                  Filesize

                  40KB

                • memory/624-51-0x0000000008A10000-0x0000000009028000-memory.dmp
                  Filesize

                  6.1MB

                • memory/624-57-0x00000000078E0000-0x00000000078F0000-memory.dmp
                  Filesize

                  64KB

                • memory/624-56-0x0000000074BD0000-0x0000000075380000-memory.dmp
                  Filesize

                  7.7MB

                • memory/624-55-0x0000000007D60000-0x0000000007DAC000-memory.dmp
                  Filesize

                  304KB

                • memory/624-54-0x0000000007D20000-0x0000000007D5C000-memory.dmp
                  Filesize

                  240KB

                • memory/624-53-0x0000000007CC0000-0x0000000007CD2000-memory.dmp
                  Filesize

                  72KB

                • memory/624-52-0x00000000083F0000-0x00000000084FA000-memory.dmp
                  Filesize

                  1.0MB

                • memory/624-47-0x00000000078E0000-0x00000000078F0000-memory.dmp
                  Filesize

                  64KB

                • memory/624-42-0x0000000000400000-0x000000000043E000-memory.dmp
                  Filesize

                  248KB

                • memory/624-46-0x0000000007930000-0x00000000079C2000-memory.dmp
                  Filesize

                  584KB

                • memory/624-45-0x0000000074BD0000-0x0000000075380000-memory.dmp
                  Filesize

                  7.7MB

                • memory/624-44-0x0000000007E40000-0x00000000083E4000-memory.dmp
                  Filesize

                  5.6MB

                • memory/1184-36-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/1184-33-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/2272-43-0x0000000074BD0000-0x0000000075380000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2272-22-0x0000000074BD0000-0x0000000075380000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2272-21-0x0000000000400000-0x000000000040A000-memory.dmp
                  Filesize

                  40KB

                • memory/2272-50-0x0000000074BD0000-0x0000000075380000-memory.dmp
                  Filesize

                  7.7MB

                • memory/3436-35-0x00000000022D0000-0x00000000022E6000-memory.dmp
                  Filesize

                  88KB

                • memory/4864-30-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/4864-26-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/4864-27-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/4864-28-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB