Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2023 05:26

General

  • Target

    NEAS.544060943faaf373e7894dd72843f280.exe

  • Size

    1.3MB

  • MD5

    544060943faaf373e7894dd72843f280

  • SHA1

    03aba58152f553d40b90e3c4a1734722a75a9618

  • SHA256

    30ffa2db0c7f6b5958f3684db399e46bce0a1c49a87efa70098270f7a3a07a16

  • SHA512

    d2ce63d41f3731de77a935191f48534d0a2cc30917597e27b1bd5e3e479b9ebda573973358da32ddfcb825603754652ac2b9027f6dc2340141071297e11caeb7

  • SSDEEP

    24576:AyMl2Bi/2IANkwnlgqCuBHAO7jGrMCZmD486/Elh0U6Asl2W:Ho2eONkAlbCuBF7dExSk

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.544060943faaf373e7894dd72843f280.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.544060943faaf373e7894dd72843f280.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bb3PF26.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bb3PF26.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iR8cu52.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iR8cu52.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4288
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bq8tA69.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bq8tA69.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4860
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hr25lU1.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hr25lU1.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4008
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:220
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 560
              6⤵
              • Program crash
              PID:1868
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Ii1385.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Ii1385.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4484
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1072
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 540
                  7⤵
                  • Program crash
                  PID:956
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 572
                6⤵
                • Program crash
                PID:4628
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3aw65Wt.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3aw65Wt.exe
            4⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:1724
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4mf535Cb.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4mf535Cb.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:4044
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 580
              4⤵
              • Program crash
              PID:4316
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5nz1Jw0.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5nz1Jw0.exe
          2⤵
          • Executes dropped EXE
          PID:4856
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4008 -ip 4008
        1⤵
          PID:3880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4484 -ip 4484
          1⤵
            PID:4472
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1072 -ip 1072
            1⤵
              PID:3884
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2608 -ip 2608
              1⤵
                PID:2080

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Modify Registry

              2
              T1112

              Impair Defenses

              1
              T1562

              Disable or Modify Tools

              1
              T1562.001

              Discovery

              Query Registry

              1
              T1012

              Peripheral Device Discovery

              1
              T1120

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5nz1Jw0.exe
                Filesize

                184KB

                MD5

                157abab4920c6573877e83d2f5ff5017

                SHA1

                4c959062f666c6dce208745a598f866f094d92ae

                SHA256

                5bd24e6f20afc003b79823e8fdf9f914c06a3ae007b7a77d99a8073c1e5fba68

                SHA512

                5a46279619d5bcc8bfc6f31c85633c521f29d754c265e86a3c378219cfcd29f43cba6ffe302158053c22cbc55678af3c507d5d8ef047f31dab32a01244e4856a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5nz1Jw0.exe
                Filesize

                184KB

                MD5

                157abab4920c6573877e83d2f5ff5017

                SHA1

                4c959062f666c6dce208745a598f866f094d92ae

                SHA256

                5bd24e6f20afc003b79823e8fdf9f914c06a3ae007b7a77d99a8073c1e5fba68

                SHA512

                5a46279619d5bcc8bfc6f31c85633c521f29d754c265e86a3c378219cfcd29f43cba6ffe302158053c22cbc55678af3c507d5d8ef047f31dab32a01244e4856a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bb3PF26.exe
                Filesize

                1.1MB

                MD5

                0f0905c58b90c57e603abf3fc6341677

                SHA1

                66985ce631e942bcecccd92478c4a0c1ad9eeb70

                SHA256

                03b39533a73358b556f74b5285a6a28cb4aca7cdb968b4bcfa5fdad8ef3c0c8b

                SHA512

                43c1a7ae93198740b73314f55b10135bbcb65cb6425faaa77514b06bfffbe629a71983db1d46698cfa74acd1336135970b4925cf68183978decceb7a0d1dcc74

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bb3PF26.exe
                Filesize

                1.1MB

                MD5

                0f0905c58b90c57e603abf3fc6341677

                SHA1

                66985ce631e942bcecccd92478c4a0c1ad9eeb70

                SHA256

                03b39533a73358b556f74b5285a6a28cb4aca7cdb968b4bcfa5fdad8ef3c0c8b

                SHA512

                43c1a7ae93198740b73314f55b10135bbcb65cb6425faaa77514b06bfffbe629a71983db1d46698cfa74acd1336135970b4925cf68183978decceb7a0d1dcc74

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4mf535Cb.exe
                Filesize

                1.2MB

                MD5

                bec85e3154519c20b6c83d25c79087e3

                SHA1

                b9892f0e73535c5e13b01d310b0e90b92ccc4dcd

                SHA256

                279741fe6d8850b2c438453f4e20e0d66746f4a75e4f08e71e3c09c176bc7584

                SHA512

                51be28b8f4fe3f6f2f60fc421e62842c9c79c972529d8ab137520c5ec5fd750652f0af45ec718ce05fdf19fe48fb88a276306561903c03be3d7bdcb078e17ee4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4mf535Cb.exe
                Filesize

                1.2MB

                MD5

                bec85e3154519c20b6c83d25c79087e3

                SHA1

                b9892f0e73535c5e13b01d310b0e90b92ccc4dcd

                SHA256

                279741fe6d8850b2c438453f4e20e0d66746f4a75e4f08e71e3c09c176bc7584

                SHA512

                51be28b8f4fe3f6f2f60fc421e62842c9c79c972529d8ab137520c5ec5fd750652f0af45ec718ce05fdf19fe48fb88a276306561903c03be3d7bdcb078e17ee4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iR8cu52.exe
                Filesize

                659KB

                MD5

                5bdc2a96983bd632d638b0ae3f5029d3

                SHA1

                2997d1b9e9a7bf41b933a3ae405fe78dab8fdcfe

                SHA256

                93a3eb2390544c601664f7cc14ce299489019f426f663de7fe60fd746141c154

                SHA512

                a5914e7e5d8d328c25c4a5235096cffaae558e1313579edfed7fea21d65cf805a0f0ce62304bc7261ed7fb7dcdf1da2f4b9c9afd73d40484c8bf7b4afca9cc6a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iR8cu52.exe
                Filesize

                659KB

                MD5

                5bdc2a96983bd632d638b0ae3f5029d3

                SHA1

                2997d1b9e9a7bf41b933a3ae405fe78dab8fdcfe

                SHA256

                93a3eb2390544c601664f7cc14ce299489019f426f663de7fe60fd746141c154

                SHA512

                a5914e7e5d8d328c25c4a5235096cffaae558e1313579edfed7fea21d65cf805a0f0ce62304bc7261ed7fb7dcdf1da2f4b9c9afd73d40484c8bf7b4afca9cc6a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3aw65Wt.exe
                Filesize

                31KB

                MD5

                965d26a6869319b33b7a99a3d19ebf7b

                SHA1

                b37742db390180fe5f447435aef7db8285e66355

                SHA256

                92eef8baace3203461db5bf621e3dc54f62e43d47294e9f71137aad300853779

                SHA512

                c53d4d9a8e164f7f8d7e574159b52a5280eec2fd656a7dd76d5bc75603c576c3d8f876a8b73d04d6f17c687674c741ab5023272219ded9ef9b31f7657d98c8e4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3aw65Wt.exe
                Filesize

                31KB

                MD5

                965d26a6869319b33b7a99a3d19ebf7b

                SHA1

                b37742db390180fe5f447435aef7db8285e66355

                SHA256

                92eef8baace3203461db5bf621e3dc54f62e43d47294e9f71137aad300853779

                SHA512

                c53d4d9a8e164f7f8d7e574159b52a5280eec2fd656a7dd76d5bc75603c576c3d8f876a8b73d04d6f17c687674c741ab5023272219ded9ef9b31f7657d98c8e4

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bq8tA69.exe
                Filesize

                535KB

                MD5

                c678783c15d1ce8b12dc2ad8fc4bbfa0

                SHA1

                10cbb66b2b09604fe1242f1568bec7ea12f9722c

                SHA256

                8f66058ef142d27e82e80dc78a05b1806d1fb174ab206a05c729593f7e30b867

                SHA512

                05cbcfe5222fa91e872e908bde2646d574e004de63802ebf1d44833231e39a899a1653c1ce7f9b194cf561677d9a03f9a1165dda22abd2504614d92e00752a18

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bq8tA69.exe
                Filesize

                535KB

                MD5

                c678783c15d1ce8b12dc2ad8fc4bbfa0

                SHA1

                10cbb66b2b09604fe1242f1568bec7ea12f9722c

                SHA256

                8f66058ef142d27e82e80dc78a05b1806d1fb174ab206a05c729593f7e30b867

                SHA512

                05cbcfe5222fa91e872e908bde2646d574e004de63802ebf1d44833231e39a899a1653c1ce7f9b194cf561677d9a03f9a1165dda22abd2504614d92e00752a18

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hr25lU1.exe
                Filesize

                935KB

                MD5

                907d962c4df719c4f9369d8e6d3ddbfc

                SHA1

                138870ed4ab258ef782bac5ddb64513e378469fb

                SHA256

                35303d24db444149ad826faf3b35e94c51cfd8e4f1402b2f0300909a749ec8a7

                SHA512

                b969f630945da8988f1dfc7ba154b4cb1a9d6bc63a7bd8f420ea9f3b55972811a742e047c9586c802b9e6bcb5f545c318d77cfccfa388456f8a6ff58aeafa6a2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Hr25lU1.exe
                Filesize

                935KB

                MD5

                907d962c4df719c4f9369d8e6d3ddbfc

                SHA1

                138870ed4ab258ef782bac5ddb64513e378469fb

                SHA256

                35303d24db444149ad826faf3b35e94c51cfd8e4f1402b2f0300909a749ec8a7

                SHA512

                b969f630945da8988f1dfc7ba154b4cb1a9d6bc63a7bd8f420ea9f3b55972811a742e047c9586c802b9e6bcb5f545c318d77cfccfa388456f8a6ff58aeafa6a2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Ii1385.exe
                Filesize

                1.1MB

                MD5

                70bbb91915f0b17b333c9567aeb18527

                SHA1

                5306d620d74fec80875015566f24d2666f26b4d2

                SHA256

                ffa8efbd07dd1df7bac18ebdbf2451de5ccb6f6efd32b4f70835d735d99a6243

                SHA512

                1805225a3a13867e6b6510a3303a87b8f551a3cd2a067a07d066593c9bb6bab9ca91a7989030cf2cc1ec6ae82e96b4cf276291b2a48c4a9bec2aa315fe88a3b5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Ii1385.exe
                Filesize

                1.1MB

                MD5

                70bbb91915f0b17b333c9567aeb18527

                SHA1

                5306d620d74fec80875015566f24d2666f26b4d2

                SHA256

                ffa8efbd07dd1df7bac18ebdbf2451de5ccb6f6efd32b4f70835d735d99a6243

                SHA512

                1805225a3a13867e6b6510a3303a87b8f551a3cd2a067a07d066593c9bb6bab9ca91a7989030cf2cc1ec6ae82e96b4cf276291b2a48c4a9bec2aa315fe88a3b5

              • memory/220-44-0x0000000073DA0000-0x0000000074550000-memory.dmp
                Filesize

                7.7MB

              • memory/220-29-0x0000000073DA0000-0x0000000074550000-memory.dmp
                Filesize

                7.7MB

              • memory/220-42-0x0000000073DA0000-0x0000000074550000-memory.dmp
                Filesize

                7.7MB

              • memory/220-28-0x0000000000400000-0x000000000040A000-memory.dmp
                Filesize

                40KB

              • memory/1072-35-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1072-34-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1072-37-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1072-33-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/1724-47-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/1724-41-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/3288-45-0x0000000002E10000-0x0000000002E26000-memory.dmp
                Filesize

                88KB

              • memory/4044-57-0x0000000007400000-0x0000000007410000-memory.dmp
                Filesize

                64KB

              • memory/4044-56-0x00000000072C0000-0x0000000007352000-memory.dmp
                Filesize

                584KB

              • memory/4044-55-0x0000000007790000-0x0000000007D34000-memory.dmp
                Filesize

                5.6MB

              • memory/4044-58-0x0000000007380000-0x000000000738A000-memory.dmp
                Filesize

                40KB

              • memory/4044-54-0x0000000073DA0000-0x0000000074550000-memory.dmp
                Filesize

                7.7MB

              • memory/4044-52-0x0000000000400000-0x000000000043E000-memory.dmp
                Filesize

                248KB

              • memory/4044-62-0x0000000008360000-0x0000000008978000-memory.dmp
                Filesize

                6.1MB

              • memory/4044-63-0x0000000007620000-0x000000000772A000-memory.dmp
                Filesize

                1.0MB

              • memory/4044-64-0x0000000007550000-0x0000000007562000-memory.dmp
                Filesize

                72KB

              • memory/4044-65-0x00000000075B0000-0x00000000075EC000-memory.dmp
                Filesize

                240KB

              • memory/4044-66-0x0000000007730000-0x000000000777C000-memory.dmp
                Filesize

                304KB

              • memory/4044-67-0x0000000073DA0000-0x0000000074550000-memory.dmp
                Filesize

                7.7MB

              • memory/4044-68-0x0000000007400000-0x0000000007410000-memory.dmp
                Filesize

                64KB