Analysis

  • max time kernel
    47s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2023, 23:11

General

  • Target

    06718ccfd979264c292c63d5803b57a1.exe

  • Size

    260KB

  • MD5

    06718ccfd979264c292c63d5803b57a1

  • SHA1

    7a80a437a3adbd657183613900716f273a6e045d

  • SHA256

    3c974b9f0a714df2773f11095f9d1c348c3db7676671346baf6e328d7b42bd1a

  • SHA512

    df855b796a569f96c334b1a0b9e4479cfa13779545853fd121777917fc23c029ebfde35639042d12bb96fec0ef383b04ca866d83bbbcf950c74cb62b15cb6a47

  • SSDEEP

    3072:NWnpVFrrYIEX6Py1BikhWdwk8tXhMGLcFyeG9ColCw4to6uAg0FujVhOUwApdux+:NUVZI+6iUnJCGLcU8olNAOO+pl

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://81.19.131.34/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LiveTraffic

C2

77.105.132.87:6731

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Extracted

Family

smokeloader

Botnet

up3

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06718ccfd979264c292c63d5803b57a1.exe
    "C:\Users\Admin\AppData\Local\Temp\06718ccfd979264c292c63d5803b57a1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1536
  • C:\Users\Admin\AppData\Local\Temp\9BC3.exe
    C:\Users\Admin\AppData\Local\Temp\9BC3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 536
      2⤵
      • Program crash
      PID:2520
  • C:\Users\Admin\AppData\Local\Temp\D9DC.exe
    C:\Users\Admin\AppData\Local\Temp\D9DC.exe
    1⤵
    • Executes dropped EXE
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"
      2⤵
        PID:2140
        • C:\Users\Admin\AppData\Local\Temp\Broom.exe
          C:\Users\Admin\AppData\Local\Temp\Broom.exe
          3⤵
            PID:1308
        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
          2⤵
            PID:768
            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
              "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
              3⤵
                PID:948
            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
              "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
              2⤵
                PID:1448
              • C:\Users\Admin\AppData\Local\Temp\tuc3.exe
                "C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
                2⤵
                  PID:436
                  • C:\Users\Admin\AppData\Local\Temp\is-VT7RL.tmp\tuc3.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-VT7RL.tmp\tuc3.tmp" /SL5="$4018A,8423542,54272,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
                    3⤵
                      PID:2404
                  • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                    "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                    2⤵
                      PID:2272
                  • C:\Users\Admin\AppData\Local\Temp\DDC4.exe
                    C:\Users\Admin\AppData\Local\Temp\DDC4.exe
                    1⤵
                      PID:2424
                    • C:\Users\Admin\AppData\Local\Temp\DF0C.exe
                      C:\Users\Admin\AppData\Local\Temp\DF0C.exe
                      1⤵
                        PID:2612
                      • C:\Users\Admin\AppData\Local\Temp\F8E4.exe
                        C:\Users\Admin\AppData\Local\Temp\F8E4.exe
                        1⤵
                          PID:1892

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\9BC3.exe

                          Filesize

                          401KB

                          MD5

                          f88edad62a7789c2c5d8047133da5fa7

                          SHA1

                          41b1f056cdda764a1c7c402c6fa4f8ab2f3ce5f9

                          SHA256

                          eb2b1ce5574096b91eb9e0482117d2518ab188c0747a209dc77e88d30bb970dc

                          SHA512

                          e2d5b0ace5dfd3bd2321b2a42b7e7725071ca440389dc5ef12720a34727ae84c2907cd7befeae5d53568d9deaee8443f4cbda44b598cfc9b6316d9389be09a60

                        • C:\Users\Admin\AppData\Local\Temp\D9DC.exe

                          Filesize

                          11.6MB

                          MD5

                          0c4d3d1da31c2d832c50563d8936c3e7

                          SHA1

                          efa3177300f280e38791ed99407f0b82065ab50c

                          SHA256

                          6be8002ebb0418766f5f551a64353769936440d6364064643b1f6ebce816f238

                          SHA512

                          7a4c82432f4761a5ae34560f42a9e8ac7069c89797deac7929fbabab2fa1e686b3401f370d47ac6235b90a6bb2cbbc4c573a1f142a46d4c3d9c5ca224cdb6a21

                        • C:\Users\Admin\AppData\Local\Temp\D9DC.exe

                          Filesize

                          11.4MB

                          MD5

                          e180ad01b421e4a423ed730bb60ff8ba

                          SHA1

                          3916c40c0e2e8ed44798593b58ed14c2a46c8eeb

                          SHA256

                          24c8d5dbba6707538375874775a3842b27a25befeb90d86a443b5b5b574850a8

                          SHA512

                          821c4708bbde1133b0a1e5c8b76fff50c1c6d5bf72d15368210cebb529aaab0ab80956523e423c1098c0fd1eab860690f4e93ca11423aa9435754dcf0bea219f

                        • C:\Users\Admin\AppData\Local\Temp\DDC4.exe

                          Filesize

                          279KB

                          MD5

                          0de1d0372e15bbfeded7fb418e8c00ae

                          SHA1

                          6d0dc8617e5bcdd48dd5b45d8f40b97e4bbce0a1

                          SHA256

                          98df5d41ea0e8ba3846de781c30543be8777d1bd11241bc76bc903a4be81c502

                          SHA512

                          7b3f2d2cc3fce6707be938053fd94a8a5edb48f7dad787847bd362329b6f07657fd7f66ab1f5c5d78db12aa7a41717ea3c7cbe8a1706d2456d1c42e9b1fb4e67

                        • C:\Users\Admin\AppData\Local\Temp\DF0C.exe

                          Filesize

                          219KB

                          MD5

                          91d23595c11c7ee4424b6267aabf3600

                          SHA1

                          ef161bb8e90cebdf81f4e53dfccb50c1f90a9a02

                          SHA256

                          d58937d468f6ca92b12ee903a16a4908de340f64f894cf7f1c594cd15c0c7e47

                          SHA512

                          cb9ed75c14e7b093cabab66c22d412371c639ace31fbe976c71ffec6007bf85b3d7d3e591fe5612e2a035298398d32e1aa7dc0d753f93328ebc2ce8e44fb8d2b

                        • C:\Users\Admin\AppData\Local\Temp\F8E4.exe

                          Filesize

                          1.2MB

                          MD5

                          d9272f48339d2fff46bdf9ca231866fb

                          SHA1

                          bf2ae059f6e8403100bed30d4f524670e01f3bf7

                          SHA256

                          d9dab8e325c4e4a5b45d00a631d0cdbbbee06d805eb9a43a69b403771ec890f7

                          SHA512

                          3738adfc0f6f430031b24c17bde97afa3c50a3502a3924c69122d8384b68c7321b71b590dd413aa8c597d1893a8902802ab43efbc0cfdaffb7222ec5e4f0b932

                        • C:\Users\Admin\AppData\Local\Temp\F8E4.exe

                          Filesize

                          1024KB

                          MD5

                          e27d09606853bd7cc337c2d338854824

                          SHA1

                          8a91c95ff2e6b5983c936c5a0ee11586d1dfeb70

                          SHA256

                          17acc7dd07b27037a73924112cc45711d2c6659d5101c0e8606957f2f36303d7

                          SHA512

                          5ed4e4510731c31cf34cf14628b7ac997b4d445bda754084f79e24df2e2d2118ff49ad3de1125f2fd8011b2a7161e3c14a3b658dc15f03a9eb572996c80631b2

                        • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                          Filesize

                          2.4MB

                          MD5

                          fc69847915372b77e60adcb5d1721336

                          SHA1

                          a14a57db0ab8dfb1237e82725165f63d6b90cb28

                          SHA256

                          c1eec4739266ad69518983741481a310d7b628619bcb4db0a9977324ca4a30ee

                          SHA512

                          4b70917501840500d9a0b6a662bd3994e7700f5deba5e8e90a540937aaf4aef452a52d66c8bef8a76a12467f5cfd8bea3b3a9aa3bea3f98af89af519eafa8af0

                        • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                          Filesize

                          2.9MB

                          MD5

                          0ce7da695f35046ac93c18f89b081dca

                          SHA1

                          0514f270e509fe598896447cdf98c2ef5af66b2a

                          SHA256

                          578f46e3f86f142acd859c4719591c5970f5ffb16c97a2075116e5874b4598a0

                          SHA512

                          b83075edf5dffd8648a8ca8eaea7568f3583b85cd22f96dd702cb56633dd09871f7ad11b4ccfe755fafabb6e5b38736830a01ad89419cb61b441bbb6e22c797c

                        • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                          Filesize

                          3.0MB

                          MD5

                          9f2a067488dfc56c0a1e5c82f88a668f

                          SHA1

                          cb586c02a5ebe3ad5e241dee058b7764ce7d3652

                          SHA256

                          96bde18e28c5e5accfc0df85fec29ea7f918153163564252c1c6ea5109e00212

                          SHA512

                          deba72578a299fbe8daa6ef94425647d6c56d6e11226be487e6b8387b0936ff8624c07e7508f269d943cbd3411fa8567d6f9053a23034b61aea37383fe4e78b8

                        • \Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                          Filesize

                          4.2MB

                          MD5

                          f81be07058935d224ab3843bff94fec0

                          SHA1

                          1a7360901f8cb5017f7a41ca1a6984227b712b16

                          SHA256

                          8d4df79cf6bf1cb8285b7358a7c6d92c7f665065999934b24c1175311d99fb6c

                          SHA512

                          342b2c767af972819c57091e9d9d65578522fa48549b6c40aad6791b0c65e186b377e3f095458e8b5d873ffdadd73897252a13bead652bd74a09540d2c27c96e

                        • \Users\Admin\AppData\Local\Temp\Broom.exe

                          Filesize

                          5.3MB

                          MD5

                          00e93456aa5bcf9f60f84b0c0760a212

                          SHA1

                          6096890893116e75bd46fea0b8c3921ceb33f57d

                          SHA256

                          ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                          SHA512

                          abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                        • \Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                          Filesize

                          2.3MB

                          MD5

                          77471d919a5e2151fb49f37c315af514

                          SHA1

                          0687047ed80aa348bdc1657731f21181995b654c

                          SHA256

                          52666594a3e8bd7ac277411e215e1f65a7771f7c1d5b00a9e6ec95fade64f1f1

                          SHA512

                          6ffb45e79b03bac2820c98503793cd11c13803f49522eea9334c4c6cd05384dda3a60b0a8a8f363abc439ad444f1a8da290f0350fa69b75b6c3c9701177f8844

                        • \Users\Admin\AppData\Local\Temp\is-GQ1O5.tmp\_isetup\_iscrypt.dll

                          Filesize

                          2KB

                          MD5

                          a69559718ab506675e907fe49deb71e9

                          SHA1

                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                          SHA256

                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                          SHA512

                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                        • \Users\Admin\AppData\Local\Temp\is-GQ1O5.tmp\_isetup\_isdecmp.dll

                          Filesize

                          13KB

                          MD5

                          a813d18268affd4763dde940246dc7e5

                          SHA1

                          c7366e1fd925c17cc6068001bd38eaef5b42852f

                          SHA256

                          e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                          SHA512

                          b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                        • \Users\Admin\AppData\Local\Temp\is-GQ1O5.tmp\_isetup\_shfoldr.dll

                          Filesize

                          22KB

                          MD5

                          92dc6ef532fbb4a5c3201469a5b5eb63

                          SHA1

                          3e89ff837147c16b4e41c30d6c796374e0b8e62c

                          SHA256

                          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                          SHA512

                          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                        • \Users\Admin\AppData\Local\Temp\is-VT7RL.tmp\tuc3.tmp

                          Filesize

                          694KB

                          MD5

                          5525670a9e72d77b368a9aa4b8c814c1

                          SHA1

                          3fdad952ea00175f3a6e549b5dca4f568e394612

                          SHA256

                          1180706added2a7899f08f25a9f88ecff5d003ba8964f918d00779565e4a6978

                          SHA512

                          757249f7e67f82522a8e3079a22c5cf92111626446a32ad3ef876f23885f62d1bb5bf3238d564e23531d062fe18742568dfc00e33b049bb8eef05eb953ef981a

                        • \Users\Admin\AppData\Local\Temp\latestX.exe

                          Filesize

                          2.5MB

                          MD5

                          e583d0f03f59a147248a8a23abcee680

                          SHA1

                          58063371edde185f7b2dbddf5b9341b9e41b9983

                          SHA256

                          516702971882c964508818fee14aa594fc05611801e1d5e07a9618ce92410c3b

                          SHA512

                          7240565e99cc2a1469b9aa920522fba7badec5fb47864be369085615b05586b036c96994d46d476f476e0b4b7ad882f12e2bad1a501f9b8f47329ad41f245ed4

                        • \Users\Admin\AppData\Local\Temp\toolspub2.exe

                          Filesize

                          291KB

                          MD5

                          cde750f39f58f1ec80ef41ce2f4f1db9

                          SHA1

                          942ea40349b0e5af7583fd34f4d913398a9c3b96

                          SHA256

                          0a434be25f55f27ce0adbdfb08efeac1da01125b3e9194a94669bc7e9c6fe094

                          SHA512

                          c181faacbef70f8a91606943470af50cfd443958c48601051371ff5d9bf66bb9ec794571b05a347a7f5776f06484dc007f535591d2f5e1c57e3c0ee04f3e9580

                        • \Users\Admin\AppData\Local\Temp\tuc3.exe

                          Filesize

                          3.2MB

                          MD5

                          c0d1a58f59df0f23c6185bce7472ee37

                          SHA1

                          50478a8678720e7fd6f8c6bf55ff511597e34f6b

                          SHA256

                          201cfd17b35e6dd95d6db7a919f66409af3f5a22fa2aa8ff0ec73d2648d8179a

                          SHA512

                          0d9d4c225c7dd9486c24abd67eee5f5570cdbf0919e11b21a901f4bf546061a091ca90824dd315864733393b5ccc872293c8f0cd8df4f7acf4d9f93a36687766

                        • memory/436-85-0x0000000000400000-0x0000000000414000-memory.dmp

                          Filesize

                          80KB

                        • memory/768-93-0x0000000000220000-0x0000000000229000-memory.dmp

                          Filesize

                          36KB

                        • memory/768-92-0x00000000008D0000-0x00000000009D0000-memory.dmp

                          Filesize

                          1024KB

                        • memory/948-94-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/948-102-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/948-97-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/1260-7-0x0000000002990000-0x00000000029A6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1308-77-0x0000000000230000-0x0000000000231000-memory.dmp

                          Filesize

                          4KB

                        • memory/1448-109-0x00000000029D0000-0x00000000032BB000-memory.dmp

                          Filesize

                          8.9MB

                        • memory/1448-107-0x00000000025D0000-0x00000000029C8000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/1448-110-0x0000000000400000-0x0000000000D1C000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/1448-79-0x00000000025D0000-0x00000000029C8000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/1536-4-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/1536-2-0x0000000000400000-0x000000000040B000-memory.dmp

                          Filesize

                          44KB

                        • memory/1536-5-0x0000000000400000-0x000000000040B000-memory.dmp

                          Filesize

                          44KB

                        • memory/1536-6-0x0000000000400000-0x000000000040B000-memory.dmp

                          Filesize

                          44KB

                        • memory/1536-8-0x0000000000400000-0x000000000040B000-memory.dmp

                          Filesize

                          44KB

                        • memory/1536-0-0x0000000000400000-0x000000000040B000-memory.dmp

                          Filesize

                          44KB

                        • memory/1892-141-0x0000000000E50000-0x0000000001402000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/1892-145-0x0000000000C70000-0x0000000000CB0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1892-143-0x0000000074020000-0x000000007470E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/2380-18-0x00000000000F0000-0x000000000012C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2380-23-0x0000000074020000-0x000000007470E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/2404-115-0x00000000001D0000-0x00000000001D1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2612-44-0x0000000074020000-0x000000007470E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/2612-43-0x0000000000D30000-0x0000000000D6C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2612-142-0x0000000074020000-0x000000007470E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/2612-72-0x00000000072C0000-0x0000000007300000-memory.dmp

                          Filesize

                          256KB

                        • memory/2612-144-0x00000000072C0000-0x0000000007300000-memory.dmp

                          Filesize

                          256KB

                        • memory/2924-30-0x0000000000A30000-0x0000000001EE6000-memory.dmp

                          Filesize

                          20.7MB

                        • memory/2924-29-0x0000000074020000-0x000000007470E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/2924-103-0x0000000074020000-0x000000007470E000-memory.dmp

                          Filesize

                          6.9MB