Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
10/12/2023, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
06718ccfd979264c292c63d5803b57a1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
06718ccfd979264c292c63d5803b57a1.exe
Resource
win10v2004-20231127-en
General
-
Target
06718ccfd979264c292c63d5803b57a1.exe
-
Size
260KB
-
MD5
06718ccfd979264c292c63d5803b57a1
-
SHA1
7a80a437a3adbd657183613900716f273a6e045d
-
SHA256
3c974b9f0a714df2773f11095f9d1c348c3db7676671346baf6e328d7b42bd1a
-
SHA512
df855b796a569f96c334b1a0b9e4479cfa13779545853fd121777917fc23c029ebfde35639042d12bb96fec0ef383b04ca866d83bbbcf950c74cb62b15cb6a47
-
SSDEEP
3072:NWnpVFrrYIEX6Py1BikhWdwk8tXhMGLcFyeG9ColCw4to6uAg0FujVhOUwApdux+:NUVZI+6iUnJCGLcU8olNAOO+pl
Malware Config
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
LiveTraffic
77.105.132.87:6731
Extracted
redline
@oleh_ps
176.123.7.190:32927
Extracted
smokeloader
up3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2380-18-0x00000000000F0000-0x000000000012C000-memory.dmp family_redline behavioral1/memory/2612-43-0x0000000000D30000-0x0000000000D6C000-memory.dmp family_redline behavioral1/files/0x0008000000015c00-42.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2380 9BC3.exe 2924 D9DC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2520 2380 WerFault.exe 29 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1536 AppLaunch.exe 1536 AppLaunch.exe 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1536 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1260 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1260 Process not Found 1260 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1260 Process not Found 1260 Process not Found -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1456 wrote to memory of 1536 1456 06718ccfd979264c292c63d5803b57a1.exe 28 PID 1260 wrote to memory of 2380 1260 Process not Found 29 PID 1260 wrote to memory of 2380 1260 Process not Found 29 PID 1260 wrote to memory of 2380 1260 Process not Found 29 PID 1260 wrote to memory of 2380 1260 Process not Found 29 PID 2380 wrote to memory of 2520 2380 9BC3.exe 30 PID 2380 wrote to memory of 2520 2380 9BC3.exe 30 PID 2380 wrote to memory of 2520 2380 9BC3.exe 30 PID 2380 wrote to memory of 2520 2380 9BC3.exe 30 PID 1260 wrote to memory of 2924 1260 Process not Found 31 PID 1260 wrote to memory of 2924 1260 Process not Found 31 PID 1260 wrote to memory of 2924 1260 Process not Found 31 PID 1260 wrote to memory of 2924 1260 Process not Found 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\06718ccfd979264c292c63d5803b57a1.exe"C:\Users\Admin\AppData\Local\Temp\06718ccfd979264c292c63d5803b57a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\9BC3.exeC:\Users\Admin\AppData\Local\Temp\9BC3.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 5362⤵
- Program crash
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\D9DC.exeC:\Users\Admin\AppData\Local\Temp\D9DC.exe1⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵PID:1308
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵PID:948
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\tuc3.exe"C:\Users\Admin\AppData\Local\Temp\tuc3.exe"2⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\is-VT7RL.tmp\tuc3.tmp"C:\Users\Admin\AppData\Local\Temp\is-VT7RL.tmp\tuc3.tmp" /SL5="$4018A,8423542,54272,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"3⤵PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\DDC4.exeC:\Users\Admin\AppData\Local\Temp\DDC4.exe1⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\DF0C.exeC:\Users\Admin\AppData\Local\Temp\DF0C.exe1⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\F8E4.exeC:\Users\Admin\AppData\Local\Temp\F8E4.exe1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
401KB
MD5f88edad62a7789c2c5d8047133da5fa7
SHA141b1f056cdda764a1c7c402c6fa4f8ab2f3ce5f9
SHA256eb2b1ce5574096b91eb9e0482117d2518ab188c0747a209dc77e88d30bb970dc
SHA512e2d5b0ace5dfd3bd2321b2a42b7e7725071ca440389dc5ef12720a34727ae84c2907cd7befeae5d53568d9deaee8443f4cbda44b598cfc9b6316d9389be09a60
-
Filesize
11.6MB
MD50c4d3d1da31c2d832c50563d8936c3e7
SHA1efa3177300f280e38791ed99407f0b82065ab50c
SHA2566be8002ebb0418766f5f551a64353769936440d6364064643b1f6ebce816f238
SHA5127a4c82432f4761a5ae34560f42a9e8ac7069c89797deac7929fbabab2fa1e686b3401f370d47ac6235b90a6bb2cbbc4c573a1f142a46d4c3d9c5ca224cdb6a21
-
Filesize
11.4MB
MD5e180ad01b421e4a423ed730bb60ff8ba
SHA13916c40c0e2e8ed44798593b58ed14c2a46c8eeb
SHA25624c8d5dbba6707538375874775a3842b27a25befeb90d86a443b5b5b574850a8
SHA512821c4708bbde1133b0a1e5c8b76fff50c1c6d5bf72d15368210cebb529aaab0ab80956523e423c1098c0fd1eab860690f4e93ca11423aa9435754dcf0bea219f
-
Filesize
279KB
MD50de1d0372e15bbfeded7fb418e8c00ae
SHA16d0dc8617e5bcdd48dd5b45d8f40b97e4bbce0a1
SHA25698df5d41ea0e8ba3846de781c30543be8777d1bd11241bc76bc903a4be81c502
SHA5127b3f2d2cc3fce6707be938053fd94a8a5edb48f7dad787847bd362329b6f07657fd7f66ab1f5c5d78db12aa7a41717ea3c7cbe8a1706d2456d1c42e9b1fb4e67
-
Filesize
219KB
MD591d23595c11c7ee4424b6267aabf3600
SHA1ef161bb8e90cebdf81f4e53dfccb50c1f90a9a02
SHA256d58937d468f6ca92b12ee903a16a4908de340f64f894cf7f1c594cd15c0c7e47
SHA512cb9ed75c14e7b093cabab66c22d412371c639ace31fbe976c71ffec6007bf85b3d7d3e591fe5612e2a035298398d32e1aa7dc0d753f93328ebc2ce8e44fb8d2b
-
Filesize
1.2MB
MD5d9272f48339d2fff46bdf9ca231866fb
SHA1bf2ae059f6e8403100bed30d4f524670e01f3bf7
SHA256d9dab8e325c4e4a5b45d00a631d0cdbbbee06d805eb9a43a69b403771ec890f7
SHA5123738adfc0f6f430031b24c17bde97afa3c50a3502a3924c69122d8384b68c7321b71b590dd413aa8c597d1893a8902802ab43efbc0cfdaffb7222ec5e4f0b932
-
Filesize
1024KB
MD5e27d09606853bd7cc337c2d338854824
SHA18a91c95ff2e6b5983c936c5a0ee11586d1dfeb70
SHA25617acc7dd07b27037a73924112cc45711d2c6659d5101c0e8606957f2f36303d7
SHA5125ed4e4510731c31cf34cf14628b7ac997b4d445bda754084f79e24df2e2d2118ff49ad3de1125f2fd8011b2a7161e3c14a3b658dc15f03a9eb572996c80631b2
-
Filesize
2.4MB
MD5fc69847915372b77e60adcb5d1721336
SHA1a14a57db0ab8dfb1237e82725165f63d6b90cb28
SHA256c1eec4739266ad69518983741481a310d7b628619bcb4db0a9977324ca4a30ee
SHA5124b70917501840500d9a0b6a662bd3994e7700f5deba5e8e90a540937aaf4aef452a52d66c8bef8a76a12467f5cfd8bea3b3a9aa3bea3f98af89af519eafa8af0
-
Filesize
2.9MB
MD50ce7da695f35046ac93c18f89b081dca
SHA10514f270e509fe598896447cdf98c2ef5af66b2a
SHA256578f46e3f86f142acd859c4719591c5970f5ffb16c97a2075116e5874b4598a0
SHA512b83075edf5dffd8648a8ca8eaea7568f3583b85cd22f96dd702cb56633dd09871f7ad11b4ccfe755fafabb6e5b38736830a01ad89419cb61b441bbb6e22c797c
-
Filesize
3.0MB
MD59f2a067488dfc56c0a1e5c82f88a668f
SHA1cb586c02a5ebe3ad5e241dee058b7764ce7d3652
SHA25696bde18e28c5e5accfc0df85fec29ea7f918153163564252c1c6ea5109e00212
SHA512deba72578a299fbe8daa6ef94425647d6c56d6e11226be487e6b8387b0936ff8624c07e7508f269d943cbd3411fa8567d6f9053a23034b61aea37383fe4e78b8
-
Filesize
4.2MB
MD5f81be07058935d224ab3843bff94fec0
SHA11a7360901f8cb5017f7a41ca1a6984227b712b16
SHA2568d4df79cf6bf1cb8285b7358a7c6d92c7f665065999934b24c1175311d99fb6c
SHA512342b2c767af972819c57091e9d9d65578522fa48549b6c40aad6791b0c65e186b377e3f095458e8b5d873ffdadd73897252a13bead652bd74a09540d2c27c96e
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
2.3MB
MD577471d919a5e2151fb49f37c315af514
SHA10687047ed80aa348bdc1657731f21181995b654c
SHA25652666594a3e8bd7ac277411e215e1f65a7771f7c1d5b00a9e6ec95fade64f1f1
SHA5126ffb45e79b03bac2820c98503793cd11c13803f49522eea9334c4c6cd05384dda3a60b0a8a8f363abc439ad444f1a8da290f0350fa69b75b6c3c9701177f8844
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
694KB
MD55525670a9e72d77b368a9aa4b8c814c1
SHA13fdad952ea00175f3a6e549b5dca4f568e394612
SHA2561180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978
SHA512757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a
-
Filesize
2.5MB
MD5e583d0f03f59a147248a8a23abcee680
SHA158063371edde185f7b2dbddf5b9341b9e41b9983
SHA256516702971882c964508818fee14aa594fc05611801e1d5e07a9618ce92410c3b
SHA5127240565e99cc2a1469b9aa920522fba7badec5fb47864be369085615b05586b036c96994d46d476f476e0b4b7ad882f12e2bad1a501f9b8f47329ad41f245ed4
-
Filesize
291KB
MD5cde750f39f58f1ec80ef41ce2f4f1db9
SHA1942ea40349b0e5af7583fd34f4d913398a9c3b96
SHA2560a434be25f55f27ce0adbdfb08efeac1da01125b3e9194a94669bc7e9c6fe094
SHA512c181faacbef70f8a91606943470af50cfd443958c48601051371ff5d9bf66bb9ec794571b05a347a7f5776f06484dc007f535591d2f5e1c57e3c0ee04f3e9580
-
Filesize
3.2MB
MD5c0d1a58f59df0f23c6185bce7472ee37
SHA150478a8678720e7fd6f8c6bf55ff511597e34f6b
SHA256201cfd17b35e6dd95d6db7a919f66409af3f5a22fa2aa8ff0ec73d2648d8179a
SHA5120d9d4c225c7dd9486c24abd67eee5f5570cdbf0919e11b21a901f4bf546061a091ca90824dd315864733393b5ccc872293c8f0cd8df4f7acf4d9f93a36687766