Analysis

  • max time kernel
    171s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2023 08:18

General

  • Target

    NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe

  • Size

    1.0MB

  • MD5

    a62c55b2953d1f6da46b9db369d3ca70

  • SHA1

    8ff595e13a5918d8535574547305dc7c79595bc8

  • SHA256

    93f885ae3dfb2fd41956200e4870d013d058d5e7676db722eb3c8f065ff2cb38

  • SHA512

    70c650c70fef4d42449bc974dfddaf0fc1e0eadeb055cc262ba27c3b583d39fe2e725c784b56ec41e3511cf57decbf2009e30ed50a1db55a219a5a42fa00cdf8

  • SSDEEP

    24576:Syu61F0Y6TvT9raWiL3NYLXqiNOKiKYPDn001W:5XDP6T79raz3aL3NqPL001

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lo1Bg70.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lo1Bg70.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mV8KN89.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mV8KN89.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Qi01yC3.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Qi01yC3.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2268
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2kq4355.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2kq4355.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2496
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:4696
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 540
                6⤵
                • Program crash
                PID:1976
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Qi60Dr.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Qi60Dr.exe
          3⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2688
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ay000Vf.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ay000Vf.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:2216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4696 -ip 4696
        1⤵
          PID:4624

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ay000Vf.exe

          Filesize

          1.1MB

          MD5

          c92617989146a67c2ef10a06d8110703

          SHA1

          a281a2f36c67e04dd83914947487c01d337b30ef

          SHA256

          fbf0aebc8eaadd19b2984172aac92051c510ebcc4912a8f46b70413667a640ee

          SHA512

          d31c620a68591cfdd321ca6598530c3fda850df8655c84d4b734f9724378c03c2bb8cefd3d525f81321ef92cc7b01778eac17a23c3768020507d176ffeae43a9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ay000Vf.exe

          Filesize

          1.1MB

          MD5

          c92617989146a67c2ef10a06d8110703

          SHA1

          a281a2f36c67e04dd83914947487c01d337b30ef

          SHA256

          fbf0aebc8eaadd19b2984172aac92051c510ebcc4912a8f46b70413667a640ee

          SHA512

          d31c620a68591cfdd321ca6598530c3fda850df8655c84d4b734f9724378c03c2bb8cefd3d525f81321ef92cc7b01778eac17a23c3768020507d176ffeae43a9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lo1Bg70.exe

          Filesize

          650KB

          MD5

          d7b01f08918df8ff4bec8b4bf810d7fb

          SHA1

          c9b60f2bc71cc7ef861740719a6a4f01788d4b9a

          SHA256

          257f0a0f9f251553a0390600c8bfca19554b3ec9461f988acc40933a4b8c9de7

          SHA512

          27fce39aa01dc4ab129c83f7339ea1a19dab78d46ad160a3c4aaf7915feaa42e6af9861760f7603fc5835b5cc704a16e878714da4dabaa500723b6a9e337c128

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lo1Bg70.exe

          Filesize

          650KB

          MD5

          d7b01f08918df8ff4bec8b4bf810d7fb

          SHA1

          c9b60f2bc71cc7ef861740719a6a4f01788d4b9a

          SHA256

          257f0a0f9f251553a0390600c8bfca19554b3ec9461f988acc40933a4b8c9de7

          SHA512

          27fce39aa01dc4ab129c83f7339ea1a19dab78d46ad160a3c4aaf7915feaa42e6af9861760f7603fc5835b5cc704a16e878714da4dabaa500723b6a9e337c128

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Qi60Dr.exe

          Filesize

          31KB

          MD5

          841a2530fe041df86c16d0821b9ed463

          SHA1

          0c4e6779d5f8774fa39a2cf2ac41cecc6bd226ec

          SHA256

          936f0b1edb5e48889b32cdb2196b484ac6f9d677bfbcec5da32f36d480eaedcf

          SHA512

          41b9ddef3ceeb2522c6c4a930dc5ba45af81ad24b5044757e5671557d5554c245f77f7887c24a97e366c803f256dfd9d8389b25d5ed2a93270e6d6d940fcf157

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Qi60Dr.exe

          Filesize

          31KB

          MD5

          841a2530fe041df86c16d0821b9ed463

          SHA1

          0c4e6779d5f8774fa39a2cf2ac41cecc6bd226ec

          SHA256

          936f0b1edb5e48889b32cdb2196b484ac6f9d677bfbcec5da32f36d480eaedcf

          SHA512

          41b9ddef3ceeb2522c6c4a930dc5ba45af81ad24b5044757e5671557d5554c245f77f7887c24a97e366c803f256dfd9d8389b25d5ed2a93270e6d6d940fcf157

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mV8KN89.exe

          Filesize

          526KB

          MD5

          53f2136f84329ef6c3745e21256f170a

          SHA1

          909083c97247ff39e03fbfd3ca0d9e76c1eb2e1e

          SHA256

          bd26bf56870c8ed95f101b89a479906e598c8580a76eea1f0506c75befb33fe4

          SHA512

          1beb5e7d990f0b10814f65a63821cb81560c9db2d9327a04fde0c965843253cd6961da067e7a154b974dcd75473c0c61448d4c97f3363fd588b5afa7bcf1c0e8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mV8KN89.exe

          Filesize

          526KB

          MD5

          53f2136f84329ef6c3745e21256f170a

          SHA1

          909083c97247ff39e03fbfd3ca0d9e76c1eb2e1e

          SHA256

          bd26bf56870c8ed95f101b89a479906e598c8580a76eea1f0506c75befb33fe4

          SHA512

          1beb5e7d990f0b10814f65a63821cb81560c9db2d9327a04fde0c965843253cd6961da067e7a154b974dcd75473c0c61448d4c97f3363fd588b5afa7bcf1c0e8

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Qi01yC3.exe

          Filesize

          869KB

          MD5

          a3a095a4a5ffa31b4bec4422bc0646c2

          SHA1

          2d27ec4353cd7be3c9d22535e12c9d573a2bd483

          SHA256

          75da9f4d1fec2e33f13261f6834f8c5d4315d154eea02d8b5372ccf9e809768f

          SHA512

          c129bf14c69fd3a79cf0a2c8f07d1ac0ebe7d8b61b281626daad0240dcb460a5b7d6e4ca7a2121bcd2ab91701ecb5912529893e7902833f855fff20121fbbe18

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Qi01yC3.exe

          Filesize

          869KB

          MD5

          a3a095a4a5ffa31b4bec4422bc0646c2

          SHA1

          2d27ec4353cd7be3c9d22535e12c9d573a2bd483

          SHA256

          75da9f4d1fec2e33f13261f6834f8c5d4315d154eea02d8b5372ccf9e809768f

          SHA512

          c129bf14c69fd3a79cf0a2c8f07d1ac0ebe7d8b61b281626daad0240dcb460a5b7d6e4ca7a2121bcd2ab91701ecb5912529893e7902833f855fff20121fbbe18

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2kq4355.exe

          Filesize

          1.0MB

          MD5

          fbf44bc02fff781789fb17ca88aa1a32

          SHA1

          babcf51cf2351b7a1f9bc00a9edac1af9ffc53f0

          SHA256

          954916aeade073bd0dbf6c8af4176ba195bf5ce7c65a9ba4a496d74999a706a6

          SHA512

          b50448033695ecaf34eee1fbe0ad088949c7abcef5cb5cdbc0669378bdc172b365fbe7822a2d0084f6be393b556b371c45b68a7082f5d8450fcdc6abe48d7dec

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2kq4355.exe

          Filesize

          1.0MB

          MD5

          fbf44bc02fff781789fb17ca88aa1a32

          SHA1

          babcf51cf2351b7a1f9bc00a9edac1af9ffc53f0

          SHA256

          954916aeade073bd0dbf6c8af4176ba195bf5ce7c65a9ba4a496d74999a706a6

          SHA512

          b50448033695ecaf34eee1fbe0ad088949c7abcef5cb5cdbc0669378bdc172b365fbe7822a2d0084f6be393b556b371c45b68a7082f5d8450fcdc6abe48d7dec

        • memory/1560-25-0x0000000074210000-0x00000000749C0000-memory.dmp

          Filesize

          7.7MB

        • memory/1560-55-0x0000000074210000-0x00000000749C0000-memory.dmp

          Filesize

          7.7MB

        • memory/1560-51-0x0000000074210000-0x00000000749C0000-memory.dmp

          Filesize

          7.7MB

        • memory/1560-21-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2216-48-0x00000000089E0000-0x0000000008FF8000-memory.dmp

          Filesize

          6.1MB

        • memory/2216-46-0x0000000007A70000-0x0000000007A80000-memory.dmp

          Filesize

          64KB

        • memory/2216-57-0x0000000007A70000-0x0000000007A80000-memory.dmp

          Filesize

          64KB

        • memory/2216-56-0x0000000074210000-0x00000000749C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2216-53-0x0000000007CF0000-0x0000000007D3C000-memory.dmp

          Filesize

          304KB

        • memory/2216-42-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2216-43-0x0000000074210000-0x00000000749C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2216-44-0x0000000007E10000-0x00000000083B4000-memory.dmp

          Filesize

          5.6MB

        • memory/2216-45-0x0000000007900000-0x0000000007992000-memory.dmp

          Filesize

          584KB

        • memory/2216-52-0x0000000007CB0000-0x0000000007CEC000-memory.dmp

          Filesize

          240KB

        • memory/2216-47-0x0000000007890000-0x000000000789A000-memory.dmp

          Filesize

          40KB

        • memory/2216-50-0x0000000007A50000-0x0000000007A62000-memory.dmp

          Filesize

          72KB

        • memory/2216-49-0x00000000083C0000-0x00000000084CA000-memory.dmp

          Filesize

          1.0MB

        • memory/2688-34-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2688-36-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3376-35-0x0000000003460000-0x0000000003476000-memory.dmp

          Filesize

          88KB

        • memory/4696-28-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4696-27-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4696-30-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4696-26-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB