Analysis
-
max time kernel
171s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 08:18
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe
-
Size
1.0MB
-
MD5
a62c55b2953d1f6da46b9db369d3ca70
-
SHA1
8ff595e13a5918d8535574547305dc7c79595bc8
-
SHA256
93f885ae3dfb2fd41956200e4870d013d058d5e7676db722eb3c8f065ff2cb38
-
SHA512
70c650c70fef4d42449bc974dfddaf0fc1e0eadeb055cc262ba27c3b583d39fe2e725c784b56ec41e3511cf57decbf2009e30ed50a1db55a219a5a42fa00cdf8
-
SSDEEP
24576:Syu61F0Y6TvT9raWiL3NYLXqiNOKiKYPDn001W:5XDP6T79raz3aL3NqPL001
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Signatures
-
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2216-42-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
Lo1Bg70.exemV8KN89.exe1Qi01yC3.exe2kq4355.exe3Qi60Dr.exe4ay000Vf.exepid process 3620 Lo1Bg70.exe 2916 mV8KN89.exe 2268 1Qi01yC3.exe 2496 2kq4355.exe 2688 3Qi60Dr.exe 1580 4ay000Vf.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
NEAS.a62c55b2953d1f6da46b9db369d3ca70.exeLo1Bg70.exemV8KN89.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Lo1Bg70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" mV8KN89.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
1Qi01yC3.exe2kq4355.exe4ay000Vf.exedescription pid process target process PID 2268 set thread context of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2496 set thread context of 4696 2496 2kq4355.exe AppLaunch.exe PID 1580 set thread context of 2216 1580 4ay000Vf.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1976 4696 WerFault.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3Qi60Dr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Qi60Dr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Qi60Dr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Qi60Dr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3Qi60Dr.exeAppLaunch.exepid process 2688 3Qi60Dr.exe 2688 3Qi60Dr.exe 1560 AppLaunch.exe 1560 AppLaunch.exe 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 3376 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3376 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
3Qi60Dr.exepid process 2688 3Qi60Dr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1560 AppLaunch.exe Token: SeShutdownPrivilege 3376 Token: SeCreatePagefilePrivilege 3376 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3376 -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
NEAS.a62c55b2953d1f6da46b9db369d3ca70.exeLo1Bg70.exemV8KN89.exe1Qi01yC3.exe2kq4355.exe4ay000Vf.exedescription pid process target process PID 4652 wrote to memory of 3620 4652 NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe Lo1Bg70.exe PID 4652 wrote to memory of 3620 4652 NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe Lo1Bg70.exe PID 4652 wrote to memory of 3620 4652 NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe Lo1Bg70.exe PID 3620 wrote to memory of 2916 3620 Lo1Bg70.exe mV8KN89.exe PID 3620 wrote to memory of 2916 3620 Lo1Bg70.exe mV8KN89.exe PID 3620 wrote to memory of 2916 3620 Lo1Bg70.exe mV8KN89.exe PID 2916 wrote to memory of 2268 2916 mV8KN89.exe 1Qi01yC3.exe PID 2916 wrote to memory of 2268 2916 mV8KN89.exe 1Qi01yC3.exe PID 2916 wrote to memory of 2268 2916 mV8KN89.exe 1Qi01yC3.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2268 wrote to memory of 1560 2268 1Qi01yC3.exe AppLaunch.exe PID 2916 wrote to memory of 2496 2916 mV8KN89.exe 2kq4355.exe PID 2916 wrote to memory of 2496 2916 mV8KN89.exe 2kq4355.exe PID 2916 wrote to memory of 2496 2916 mV8KN89.exe 2kq4355.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 2496 wrote to memory of 4696 2496 2kq4355.exe AppLaunch.exe PID 3620 wrote to memory of 2688 3620 Lo1Bg70.exe 3Qi60Dr.exe PID 3620 wrote to memory of 2688 3620 Lo1Bg70.exe 3Qi60Dr.exe PID 3620 wrote to memory of 2688 3620 Lo1Bg70.exe 3Qi60Dr.exe PID 4652 wrote to memory of 1580 4652 NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe 4ay000Vf.exe PID 4652 wrote to memory of 1580 4652 NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe 4ay000Vf.exe PID 4652 wrote to memory of 1580 4652 NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe 4ay000Vf.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe PID 1580 wrote to memory of 2216 1580 4ay000Vf.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a62c55b2953d1f6da46b9db369d3ca70.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lo1Bg70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lo1Bg70.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mV8KN89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mV8KN89.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Qi01yC3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Qi01yC3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2kq4355.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2kq4355.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 5406⤵
- Program crash
PID:1976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Qi60Dr.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Qi60Dr.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ay000Vf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ay000Vf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4696 -ip 46961⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c92617989146a67c2ef10a06d8110703
SHA1a281a2f36c67e04dd83914947487c01d337b30ef
SHA256fbf0aebc8eaadd19b2984172aac92051c510ebcc4912a8f46b70413667a640ee
SHA512d31c620a68591cfdd321ca6598530c3fda850df8655c84d4b734f9724378c03c2bb8cefd3d525f81321ef92cc7b01778eac17a23c3768020507d176ffeae43a9
-
Filesize
1.1MB
MD5c92617989146a67c2ef10a06d8110703
SHA1a281a2f36c67e04dd83914947487c01d337b30ef
SHA256fbf0aebc8eaadd19b2984172aac92051c510ebcc4912a8f46b70413667a640ee
SHA512d31c620a68591cfdd321ca6598530c3fda850df8655c84d4b734f9724378c03c2bb8cefd3d525f81321ef92cc7b01778eac17a23c3768020507d176ffeae43a9
-
Filesize
650KB
MD5d7b01f08918df8ff4bec8b4bf810d7fb
SHA1c9b60f2bc71cc7ef861740719a6a4f01788d4b9a
SHA256257f0a0f9f251553a0390600c8bfca19554b3ec9461f988acc40933a4b8c9de7
SHA51227fce39aa01dc4ab129c83f7339ea1a19dab78d46ad160a3c4aaf7915feaa42e6af9861760f7603fc5835b5cc704a16e878714da4dabaa500723b6a9e337c128
-
Filesize
650KB
MD5d7b01f08918df8ff4bec8b4bf810d7fb
SHA1c9b60f2bc71cc7ef861740719a6a4f01788d4b9a
SHA256257f0a0f9f251553a0390600c8bfca19554b3ec9461f988acc40933a4b8c9de7
SHA51227fce39aa01dc4ab129c83f7339ea1a19dab78d46ad160a3c4aaf7915feaa42e6af9861760f7603fc5835b5cc704a16e878714da4dabaa500723b6a9e337c128
-
Filesize
31KB
MD5841a2530fe041df86c16d0821b9ed463
SHA10c4e6779d5f8774fa39a2cf2ac41cecc6bd226ec
SHA256936f0b1edb5e48889b32cdb2196b484ac6f9d677bfbcec5da32f36d480eaedcf
SHA51241b9ddef3ceeb2522c6c4a930dc5ba45af81ad24b5044757e5671557d5554c245f77f7887c24a97e366c803f256dfd9d8389b25d5ed2a93270e6d6d940fcf157
-
Filesize
31KB
MD5841a2530fe041df86c16d0821b9ed463
SHA10c4e6779d5f8774fa39a2cf2ac41cecc6bd226ec
SHA256936f0b1edb5e48889b32cdb2196b484ac6f9d677bfbcec5da32f36d480eaedcf
SHA51241b9ddef3ceeb2522c6c4a930dc5ba45af81ad24b5044757e5671557d5554c245f77f7887c24a97e366c803f256dfd9d8389b25d5ed2a93270e6d6d940fcf157
-
Filesize
526KB
MD553f2136f84329ef6c3745e21256f170a
SHA1909083c97247ff39e03fbfd3ca0d9e76c1eb2e1e
SHA256bd26bf56870c8ed95f101b89a479906e598c8580a76eea1f0506c75befb33fe4
SHA5121beb5e7d990f0b10814f65a63821cb81560c9db2d9327a04fde0c965843253cd6961da067e7a154b974dcd75473c0c61448d4c97f3363fd588b5afa7bcf1c0e8
-
Filesize
526KB
MD553f2136f84329ef6c3745e21256f170a
SHA1909083c97247ff39e03fbfd3ca0d9e76c1eb2e1e
SHA256bd26bf56870c8ed95f101b89a479906e598c8580a76eea1f0506c75befb33fe4
SHA5121beb5e7d990f0b10814f65a63821cb81560c9db2d9327a04fde0c965843253cd6961da067e7a154b974dcd75473c0c61448d4c97f3363fd588b5afa7bcf1c0e8
-
Filesize
869KB
MD5a3a095a4a5ffa31b4bec4422bc0646c2
SHA12d27ec4353cd7be3c9d22535e12c9d573a2bd483
SHA25675da9f4d1fec2e33f13261f6834f8c5d4315d154eea02d8b5372ccf9e809768f
SHA512c129bf14c69fd3a79cf0a2c8f07d1ac0ebe7d8b61b281626daad0240dcb460a5b7d6e4ca7a2121bcd2ab91701ecb5912529893e7902833f855fff20121fbbe18
-
Filesize
869KB
MD5a3a095a4a5ffa31b4bec4422bc0646c2
SHA12d27ec4353cd7be3c9d22535e12c9d573a2bd483
SHA25675da9f4d1fec2e33f13261f6834f8c5d4315d154eea02d8b5372ccf9e809768f
SHA512c129bf14c69fd3a79cf0a2c8f07d1ac0ebe7d8b61b281626daad0240dcb460a5b7d6e4ca7a2121bcd2ab91701ecb5912529893e7902833f855fff20121fbbe18
-
Filesize
1.0MB
MD5fbf44bc02fff781789fb17ca88aa1a32
SHA1babcf51cf2351b7a1f9bc00a9edac1af9ffc53f0
SHA256954916aeade073bd0dbf6c8af4176ba195bf5ce7c65a9ba4a496d74999a706a6
SHA512b50448033695ecaf34eee1fbe0ad088949c7abcef5cb5cdbc0669378bdc172b365fbe7822a2d0084f6be393b556b371c45b68a7082f5d8450fcdc6abe48d7dec
-
Filesize
1.0MB
MD5fbf44bc02fff781789fb17ca88aa1a32
SHA1babcf51cf2351b7a1f9bc00a9edac1af9ffc53f0
SHA256954916aeade073bd0dbf6c8af4176ba195bf5ce7c65a9ba4a496d74999a706a6
SHA512b50448033695ecaf34eee1fbe0ad088949c7abcef5cb5cdbc0669378bdc172b365fbe7822a2d0084f6be393b556b371c45b68a7082f5d8450fcdc6abe48d7dec