Analysis
-
max time kernel
34s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20231201-en -
resource tags
arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2023 23:11
Behavioral task
behavioral1
Sample
0x0006000000015c69-1466.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0x0006000000015c69-1466.exe
Resource
win10v2004-20231201-en
General
-
Target
0x0006000000015c69-1466.exe
-
Size
37KB
-
MD5
70fe458368724ec513a918b628dc80a9
-
SHA1
ddb1cb2f62175134a941c9e80da4a883ba7e0bf2
-
SHA256
edbb77cc353bf39c1f0658e2711be30347245ab286e067d62578afa8135f9d2c
-
SHA512
b7c4522902d6aa6f5ee2740905ddfba5ed7842ad00a407d16a0936fbc3992029f7f7e0ab2d18fbe6c63f06bdd6f3a847a3b4ca058f1039c3c86d4744db28fcab
-
SSDEEP
768:d8n3N4JRqwg8UTB+8zx70f0PSuopLwlFFWO7:dmN4JRrg8ypxSKFFX
Malware Config
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
eternity
47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q
-
payload_urls
https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe
Extracted
redline
@oleh_ps
176.123.7.190:32927
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000233ad-53.dat family_redline behavioral2/memory/1032-61-0x00000000002A0000-0x00000000002DC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 3504 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 4008 A3D1.exe 3800 D60E.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x0006000000015c69-1466.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x0006000000015c69-1466.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x0006000000015c69-1466.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2252 0x0006000000015c69-1466.exe 2252 0x0006000000015c69-1466.exe 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2252 0x0006000000015c69-1466.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3504 wrote to memory of 4008 3504 Process not Found 101 PID 3504 wrote to memory of 4008 3504 Process not Found 101 PID 3504 wrote to memory of 4008 3504 Process not Found 101 PID 3504 wrote to memory of 3800 3504 Process not Found 104 PID 3504 wrote to memory of 3800 3504 Process not Found 104 PID 3504 wrote to memory of 3800 3504 Process not Found 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0006000000015c69-1466.exe"C:\Users\Admin\AppData\Local\Temp\0x0006000000015c69-1466.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2252
-
C:\Users\Admin\AppData\Local\Temp\A3D1.exeC:\Users\Admin\AppData\Local\Temp\A3D1.exe1⤵
- Executes dropped EXE
PID:4008
-
C:\Users\Admin\AppData\Local\Temp\D60E.exeC:\Users\Admin\AppData\Local\Temp\D60E.exe1⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵PID:1084
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\tuc3.exe"C:\Users\Admin\AppData\Local\Temp\tuc3.exe"2⤵PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\D8DD.exeC:\Users\Admin\AppData\Local\Temp\D8DD.exe1⤵PID:4520
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1320
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "AppLaunch" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\AppLaunch.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\AppLaunch.exe"3⤵PID:2024
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DAF2.exeC:\Users\Admin\AppData\Local\Temp\DAF2.exe1⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\is-5V9AG.tmp\tuc3.tmp"C:\Users\Admin\AppData\Local\Temp\is-5V9AG.tmp\tuc3.tmp" /SL5="$40186,8423542,54272,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"1⤵PID:3068
-
C:\Program Files (x86)\xrecode3\xrecode3.exe"C:\Program Files (x86)\xrecode3\xrecode3.exe" -i2⤵PID:4840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query2⤵PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\E8BE.exeC:\Users\Admin\AppData\Local\Temp\E8BE.exe1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5073f1b4c1f7ec14db4a4c4a0dfe4af03
SHA165cef595cf8bf83cc306741604b14319bb55beac
SHA256966d93e51893b9577d52859b6b60941d845063690a97df53a36a4d45c8df6113
SHA512328a994cf98f8b2a33a803b21419a0997878ffd0547619d77a4dadf3fdb4302377fbc849646437aab0c2f3487317ccb2448e4fdf820bc929b08bb591b34ff557
-
Filesize
726KB
MD5198f0ec1a75b2817f82911d373b1a1dc
SHA1c7470ea0ae5463ec42538c72e38287d67986dafd
SHA2565746fa117ca5190a68fdc0612f9460b53dd089c99cf322e631e2cf9fb4275bb0
SHA512f7fe63098343600c5c3daa2a1754d06e4978e7115de009af97ad859df9c6d343797c71a5d3678c687fc2d6458e6fc339dabdb92acb0b1e04ebdb4edb58bf5791
-
Filesize
602KB
MD578a36f7ebd84811bb8568fa6fdbfa8f4
SHA1bd63b1ad7cfe3c3abca6a28556466a4027af5d97
SHA256e274d474021d03326e130502cd502e776938a28a27e7369135ed83d4662143b1
SHA512b9546ce6307acbbe9d74359376538db622c3f12496459059ffed7611a55f74467bbab9444560e066d42f7ed148541cd215a93b5c34268e8c36fefb80ca21982f
-
Filesize
401KB
MD5f88edad62a7789c2c5d8047133da5fa7
SHA141b1f056cdda764a1c7c402c6fa4f8ab2f3ce5f9
SHA256eb2b1ce5574096b91eb9e0482117d2518ab188c0747a209dc77e88d30bb970dc
SHA512e2d5b0ace5dfd3bd2321b2a42b7e7725071ca440389dc5ef12720a34727ae84c2907cd7befeae5d53568d9deaee8443f4cbda44b598cfc9b6316d9389be09a60
-
Filesize
709KB
MD58c338ec92947725b908aa5e49555b3d5
SHA1ccc802ab706914197e9fb4c44ec02ea77f20653a
SHA25666fe6f2c433f387da203bba1a0ef30119c71fe7195ab408de16cef0285571cbd
SHA512bf5c9bdf38d6ab40c49cb4c0fec935134ed9070df80320d5904e99f015192928f1958dee1be64266ae5e238ef9046a4e0d0fc0f6607f52a7865fe3cfbb41cf2a
-
Filesize
3.2MB
MD5a89017fd9c163826f221e634100dbbb4
SHA133c51b124c9385ff035161d11d14f1f666c391b2
SHA2564c0bcc0d9506278c1e6896565eeca1d0c559b1ddb71e4dbb64ff887a18e767ce
SHA5126929bb19e960cb2b7950674d161020f7605e3b4aeaa2928a1da87337ad105a56a6af20a0e12ce7ca18b865627348d7622af3602a788c2d76f4b40579c936532e
-
Filesize
3.2MB
MD5408264dc3d6e441d633e5e06a94130bc
SHA1abec1b5d4591e00233ebb6b9f96c9606b58cc0b2
SHA25687c6fee9c1d3deea7cc3546b894796d7bb2d59f79a25528836f51e3503d34fdd
SHA5125e0210493f96b45f5e8b44df05003eec4f8c42c667792783ba2908ab08701eaa4827919c090d257a44f6eb2be5ade667294d349bbd056a6dcdf4c11795c3a74d
-
Filesize
279KB
MD50de1d0372e15bbfeded7fb418e8c00ae
SHA16d0dc8617e5bcdd48dd5b45d8f40b97e4bbce0a1
SHA25698df5d41ea0e8ba3846de781c30543be8777d1bd11241bc76bc903a4be81c502
SHA5127b3f2d2cc3fce6707be938053fd94a8a5edb48f7dad787847bd362329b6f07657fd7f66ab1f5c5d78db12aa7a41717ea3c7cbe8a1706d2456d1c42e9b1fb4e67
-
Filesize
219KB
MD591d23595c11c7ee4424b6267aabf3600
SHA1ef161bb8e90cebdf81f4e53dfccb50c1f90a9a02
SHA256d58937d468f6ca92b12ee903a16a4908de340f64f894cf7f1c594cd15c0c7e47
SHA512cb9ed75c14e7b093cabab66c22d412371c639ace31fbe976c71ffec6007bf85b3d7d3e591fe5612e2a035298398d32e1aa7dc0d753f93328ebc2ce8e44fb8d2b
-
Filesize
122KB
MD56de47d1950ac7a0351b9b8995d6e9453
SHA168052b819f292883e286b00fb38e509db1b315b6
SHA256d535a8e4ce78f327c2cd2c933ab8d552a1f5492afb31e266323eb7493944df65
SHA512791495f59da3620a2117c40d8e15123cf5a449548037c29399b40a63bf2d62a20e798cee3df14ce85eed0e991a077325747c66031d04ffc053cd7f45d82b1e06
-
Filesize
55KB
MD5298319109f1a8c589f078676c3a54506
SHA1249e613f4931f3405aa2c710986ce2f3daf2d647
SHA256d5e87a475d564be199bf2c5c8e80a90be0e33fa13ba4ef985ca7cb2516c70dfa
SHA5126ed2d9b7b3b123a6798a8f61f9722a0f69a7b3ff2bedcc5c5deae1da41994f86ca6a38c6be86857bfeacd31b498303737ebe31631d7ffa828129f2b06b1c9ac0
-
Filesize
982KB
MD531023f8ce8a19c6531cb0bee34976e47
SHA132461c0ddfa442f40104453465bb6879fd7a822b
SHA256ce95b0d529c690a1c7c692ff7d475a40241622f121605227026d7412486525a0
SHA512452a6f0ae4b564da7fb373aa8332cd6f1b7de234a7771b1e9a0f2d5ba8ac7cc821c37e82c4e8c49eaedcde1b2e077e3771ce02e017fc5028d0ead0ab74b8513c
-
Filesize
855KB
MD5ba2bc498b5b954252be1aa3e2ca9a8d8
SHA14348e58c21f85d9ee40a3c2e0c5244098e8c8200
SHA2565901f03863a67455adb7382b5c0c0670f00bcb2234773a4c4e1d9cf5e2954859
SHA51286a58baf9dfc0904dffd54ef32bbcd7a40a29c4d9a8545c740c6be0cc75c26452eaa03e2370a84906f7582e26c0c25be7ef3ef5fb7d04afc21e415f6daf950fb
-
Filesize
724KB
MD50ee873e6bb55fb5dc48d3c4d6484c072
SHA1e6ebd7c492ab07fc8c40ad764d48952138f2d643
SHA25690b4e91452a0eeb5065f5e403d32f7c663abf4ff440ca9b0c530cd1402c17295
SHA5121c52fa77b83f618b769e3474f277e3a9858357e08414fe0e4cb2b18cccadbb4ed1b1ed6fe826227ce1154c8e6fe945f25e1a431824439aaed50f89b25ff673da
-
Filesize
236KB
MD5eeeaad21aa841044eda4ee14a018f100
SHA156cd542672fbdcfb7365ca5ebe3d1c89b451b45b
SHA25674e38b1448262127fe11bf17a6dc0360e757a5a8c46de56abe2bc1000a132635
SHA5120af104b908ae40a38f5b79749eef8c8ac50e157566ad5299f4930f722215508e4655a79076428cef641e8bf1699f74325b1b3a4c4974140e68bafc746791231d
-
Filesize
256KB
MD5b91419226dd6488aba91f7b927309319
SHA12e6377a64112d70c34dd6efe6e6a8eafcbf40141
SHA256677eed154aee64bccd01914de0683dd20b202148283d28dab76662750b6a0859
SHA512248849942b0a911980165f3fd2f30ad971577cee72d1dc21baf8492392868c3d1e1b5860a5f6e4e22040ea814cf25062b314a74c32cfc54bad6d0084370919ff
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
262KB
MD5a2d27a40affbba36c12a970af7f69388
SHA1287486f6a04a29f5dab2504eef01ba36b0ac10dc
SHA256112ac89e9898042f22c6e3606c97e19843c1f174c1613313a0b6f7b4be803ebf
SHA51252b411cd75e81ac015676502193277530f11c163fb29e0734d4b5077dd9050758e58edb3fe0af67948ad4e3dd6367e69cbe57e000a25f02a0dc615fe79be9181
-
Filesize
223KB
MD5a417efbffa0c5cb47636e39f6d6a1a5e
SHA1c7a30a323294d616b6ad6cdd453fd960793d5a9e
SHA2564bd097d926a9fa00fcf62988fd7536ba0ba6ce3d8ff33ed75d09fdb4e051fabb
SHA512ce4c95543f30a1428535c918f387b139b18038b4e42873437201c3e6bf06b96e2b23b166416f6e16252084706160407974474367fe9dfaea86f6e410d068c682
-
Filesize
291KB
MD5cde750f39f58f1ec80ef41ce2f4f1db9
SHA1942ea40349b0e5af7583fd34f4d913398a9c3b96
SHA2560a434be25f55f27ce0adbdfb08efeac1da01125b3e9194a94669bc7e9c6fe094
SHA512c181faacbef70f8a91606943470af50cfd443958c48601051371ff5d9bf66bb9ec794571b05a347a7f5776f06484dc007f535591d2f5e1c57e3c0ee04f3e9580
-
Filesize
563KB
MD573c6ba93e318e6714c48cffb658c4729
SHA1065ee308c5918374f55b881f6511260f9110400b
SHA256760f34dc30feddb66966d3c4aa390135e7faf4ea5d79a3e47f6ab244481825d1
SHA512f400973b1cbe85ad594e792b93cf0bff96dd97e691a7e68316222563ebb38d21ead913f29286589e758c7dfef6eadd91b1148acc13a0312eb6a4bf0049aa1c8c
-
Filesize
532KB
MD5a6bb76488906d80b0c972caac2e8cff1
SHA12a20b091af5e9cefb6d3dc27033460ad8a463a7c
SHA2568c04de31fd70170e6f849ac47bdac4131cee6dadaeddb257248cd99ef276e742
SHA5123cb69149f4b1da87276fb7dbade84c452ca0947c3f405ccfa181c3005aff0383004e07cf56494b3a95f2146dd1bd4de4a10760da8348b095499cd1d53908eecc
-
Filesize
468KB
MD508ff00148c79fd82a552d44f9c9ad15a
SHA1c92e741627f3e33e9793c1c49f34fdb4579c76b8
SHA25610f7d5c132e604f3fb2dd7db15ffb3caa420308c5851ff50e226b7d53c223e7d
SHA5125962e7c43a1f0726207b0a7562e514c27c5f6feecdf7a4460b75fb27f61a5879217799929b691c19ea8b470ddffbd11f1de292b3f4fc457e4636f52a685859c8