Analysis
-
max time kernel
44s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 00:14
Behavioral task
behavioral1
Sample
11ba26c3e43e06c31802a613807bc0aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11ba26c3e43e06c31802a613807bc0aa.exe
Resource
win10v2004-20231127-en
General
-
Target
11ba26c3e43e06c31802a613807bc0aa.exe
-
Size
37KB
-
MD5
11ba26c3e43e06c31802a613807bc0aa
-
SHA1
7f4b52473575f1b58a158fdb2c4adc5cdb40a338
-
SHA256
8fa6f659cc7a07a1769348ce2cea171dd5d9877f26167bae676a951a9275c87a
-
SHA512
f1ff3be21973b5cee9012ebe4b95118edb1c7e601450730dc83f513aa85bddc9ede7a2a2aadb5fb678b7336366b5308a9fb272b7752af36c41dd152da943cc7f
-
SSDEEP
768:d8n3N4JRqwg8UTB+8zx70f0PSuopLwlFFWO7:dmN4JRrg8ypxSKFFX
Malware Config
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
LiveTraffic
77.105.132.87:6731
Extracted
eternity
47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q
-
payload_urls
https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe
Extracted
redline
@oleh_ps
176.123.7.190:32927
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/3532-12-0x0000000002910000-0x000000000294C000-memory.dmp family_redline behavioral2/files/0x0007000000023322-42.dat family_redline behavioral2/memory/1300-47-0x0000000000C40000-0x0000000000C7C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 3196 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 3532 DBC9.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 11ba26c3e43e06c31802a613807bc0aa.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 11ba26c3e43e06c31802a613807bc0aa.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 11ba26c3e43e06c31802a613807bc0aa.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5640 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 11ba26c3e43e06c31802a613807bc0aa.exe 3000 11ba26c3e43e06c31802a613807bc0aa.exe 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found 3196 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3000 11ba26c3e43e06c31802a613807bc0aa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 3532 3196 Process not Found 100 PID 3196 wrote to memory of 3532 3196 Process not Found 100 PID 3196 wrote to memory of 3532 3196 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ba26c3e43e06c31802a613807bc0aa.exe"C:\Users\Admin\AppData\Local\Temp\11ba26c3e43e06c31802a613807bc0aa.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3000
-
C:\Users\Admin\AppData\Local\Temp\DBC9.exeC:\Users\Admin\AppData\Local\Temp\DBC9.exe1⤵
- Executes dropped EXE
PID:3532
-
C:\Users\Admin\AppData\Local\Temp\36EB.exeC:\Users\Admin\AppData\Local\Temp\36EB.exe1⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"2⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe3⤵PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\tuc3.exe"C:\Users\Admin\AppData\Local\Temp\tuc3.exe"2⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\is-V51R3.tmp\tuc3.tmp"C:\Users\Admin\AppData\Local\Temp\is-V51R3.tmp\tuc3.tmp" /SL5="$50230,8423542,54272,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"3⤵PID:4244
-
C:\Program Files (x86)\xrecode3\xrecode3.exe"C:\Program Files (x86)\xrecode3\xrecode3.exe" -i4⤵PID:5328
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query4⤵PID:5316
-
-
C:\Program Files (x86)\xrecode3\xrecode3.exe"C:\Program Files (x86)\xrecode3\xrecode3.exe" -s4⤵PID:5428
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 14⤵PID:5420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 15⤵PID:5532
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\399B.exeC:\Users\Admin\AppData\Local\Temp\399B.exe1⤵PID:900
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "AppLaunch" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\AppLaunch.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\AppLaunch.exe"3⤵PID:3420
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1980
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:5640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3A96.exeC:\Users\Admin\AppData\Local\Temp\3A96.exe1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\51D8.exeC:\Users\Admin\AppData\Local\Temp\51D8.exe1⤵PID:5564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD54e1cb1bb1926ad0c65a639978e5ae1f6
SHA14cea7a02611ba3fa0bd6ff5a4a548df5c06203f1
SHA2566afd8c272266728de687f1cc80266a8ce412909e2bd2ec94f4d736e2955b71d0
SHA512441a4c2f3cd864ac1fa67d6188b731d636a34ed5523c63abe18ccbfde063868c332d940e305076e46eaf9e6f692da2221c967eee20123ce2b03479e71dc46953
-
Filesize
155KB
MD58237bf85ffb00032385878d54d0c05cb
SHA139e60af99b5a5f3120af56cdb25ebb369dd77a7e
SHA25621c25c2cec01f03f47d927777aafdb36a4596ae8ca6de4b2b5cd08f0eb370e36
SHA512662ffaaa2c9c5260d8b628c3c9e09140210e4b1cab0fcd3abcaf777be74747ca0c13cc4a4b4170ffb90f519478a14901782bf35e9fb54983e37eb229f373da45
-
Filesize
30KB
MD5a181a00f0506047b33705cf578312563
SHA1324a80c8bee67bdb389c3b19e00f0e3bc9e609ed
SHA256e947539749d2cb6c7f46ef242bec5207c86599a3d41271747d330c79a446ac2b
SHA512be9a75db9450771ebf4b7086444c54b8f3d3e68b57c6d6160a912d9baf4b2d2fecd722ee0ee11dc3d9eb153c0900986cf9fb8f87160622b8a5fc166a24aa449e
-
Filesize
979KB
MD565b3208f849a90c933458f390528edb9
SHA101b634294970c7f0d59a27de827f7d6f36d2f7d0
SHA256fd3e7abc1a12f0b9267e75b10d01e8797ddc6424c0d5fc02394e63543a576b3f
SHA51295e6d65eb2c17a11892eccdc3bdbd6149d29e2d21d25f30d784cda23db22109d715ed3f09538c6c03f46090fac09d88fee9e5612cdd274c767cb04ce3fe21514
-
Filesize
641KB
MD55b2d256287689aaeef784ad545f77ea3
SHA15038f7fcc1a47f1a8a1903c2c01751101f5231a6
SHA256aecfabe47f01079a052dbca6abed1808dbea3c891bb3d6c5c0c4487e6b0697be
SHA51278077be857ab205c049c8479585cd9ccb9cbfeba1319aedfe03cae07c73d371f794cc3a68a17490f003fdc4cdc08b2edf3e9469a5257e8f24684906c90e0f862
-
Filesize
606KB
MD5f1977aeed242998aa42e79d304963f19
SHA193f1ff79954cd38606ee052ba62daf5f7dc74171
SHA256f4ab8530cb3a3600532aaed7f68beb828fad76c11650fdad13db9ff9e9bce381
SHA512e62ff8ece55e136b4ae2d1b5eb10663867f041215a567a4845ea7b97c20d872a60169b9942ca3935f4f294009e4c1246729ce094de38cfeea86aabb11898a35f
-
Filesize
2.9MB
MD544a199411e424cfd2eead1ce2f6a7a19
SHA1c548e0f347764544985d07e1f549a0def0844546
SHA2567276bd27830eeea90485d672c0ea4db5c2eb2762b38b14df76e903bede77301b
SHA512bde3bf16e9302654365aa2b41de909cae7b17e6a9efd57757767537afa205b9fbbd05174e9787aba0bf75c76e780631b373bbf83318b718ec55ef3f3d37395b5
-
Filesize
2.6MB
MD58e7e7f4933e0d14d601bd24d19ba48d1
SHA1e1025bc21450f4ed5590504540f6945a1233e416
SHA256de4a39a380286fc76602cf7ec7a99b9b34c39e4dce660c945a63a3642b13047e
SHA5124f7a4cabbfb623bd75caa2956bba4d1b740b9aceea25b7b2cfaf339e198681d9c205933294c343e6d230c2200a4036c9a2b7ab4ea74ec8e873536782ff6d2adc
-
Filesize
279KB
MD50de1d0372e15bbfeded7fb418e8c00ae
SHA16d0dc8617e5bcdd48dd5b45d8f40b97e4bbce0a1
SHA25698df5d41ea0e8ba3846de781c30543be8777d1bd11241bc76bc903a4be81c502
SHA5127b3f2d2cc3fce6707be938053fd94a8a5edb48f7dad787847bd362329b6f07657fd7f66ab1f5c5d78db12aa7a41717ea3c7cbe8a1706d2456d1c42e9b1fb4e67
-
Filesize
219KB
MD591d23595c11c7ee4424b6267aabf3600
SHA1ef161bb8e90cebdf81f4e53dfccb50c1f90a9a02
SHA256d58937d468f6ca92b12ee903a16a4908de340f64f894cf7f1c594cd15c0c7e47
SHA512cb9ed75c14e7b093cabab66c22d412371c639ace31fbe976c71ffec6007bf85b3d7d3e591fe5612e2a035298398d32e1aa7dc0d753f93328ebc2ce8e44fb8d2b
-
Filesize
192KB
MD5b6c5fc3b04efe3591d4bd898e42b1356
SHA1d8ccf0d9871d75742d0f06b0f0574052dc7a29e7
SHA25646dbc93605612c4b8b2b9df50cb540ea5de9fb0c0173f87757d10cdb7f1b52c5
SHA512c46dcd485ce4f6415780a66660336ed152c703012b17e15bb548f25fd9c3a0705dabd8a90f2176feb5661374fb98d3176962adac0db018c6e8d95856fd83823d
-
Filesize
126KB
MD54c69763382eb45c8cbbc4998fa749853
SHA1352e2f3c7e242712663551fd86f6ddc0da6d9b19
SHA2564e84961c3e1c2ddf05dc5c59a253698a71ba412dd256336a62c501bb1e80f1ff
SHA51296bfffcb1c448f9b79f6c1983e9ecffb63d65eb039809040aab8cd7ee3b0cc401f59aed60567d708ce62e1520e9889511b636bbf5e62d10784d8bf9e42479ddd
-
Filesize
217KB
MD548bac3fb46bb481e34e2004a17e59df7
SHA187c9ce796940d16ce716ec5d97d13aede65152bf
SHA256e17004e3244f0ff8f5e062aedd62be180aa3f9ea11978bb0b4c62c7e513719db
SHA512ddcb80a2f6c0bbcf2fdaed8f10987da5d268f690bf79f49e332e42ecbbfb3e1c47d0b288e34f736ab0b00402a6e78e0f9caf7fe6d3d1b6c483ec78107c6d02f5
-
Filesize
401KB
MD5f88edad62a7789c2c5d8047133da5fa7
SHA141b1f056cdda764a1c7c402c6fa4f8ab2f3ce5f9
SHA256eb2b1ce5574096b91eb9e0482117d2518ab188c0747a209dc77e88d30bb970dc
SHA512e2d5b0ace5dfd3bd2321b2a42b7e7725071ca440389dc5ef12720a34727ae84c2907cd7befeae5d53568d9deaee8443f4cbda44b598cfc9b6316d9389be09a60
-
Filesize
831KB
MD56829881f720a6b55ffb72b20efcaa295
SHA13398fd06debdeedef021159e448cc4d743e766f9
SHA2561afdbc808a0b25a3be19937aebae9b3dfdd96e458fecad505a829b8c59c8889d
SHA512bc17a5c60854c14f046080563657218581b4e92c636a019d1a1b041d2722617a3ccf9cbbd36f1811d6dd058620e0fd516e8d3e88ebaacc7c41d6422d44c28843
-
Filesize
366KB
MD5c9f3e654acee93319eebc737bbb88fad
SHA1d22fd996f01322b18e1e3338f33c357f4cf01150
SHA256752593b93f53e1bcde6aa6f1fb490856e6ac8a6e99df594daa62a296e40b1f60
SHA512dae8e85d9cfd887e75fd6f5abbbe52543a1a33f2112062a8157ab8bcd5010838b84a0a5edd2cb84bb1a946a26ee75d08480f688b4146409ca6d9ce0434025b25
-
Filesize
432KB
MD5a121395b933a80650a1d095d8c92aa3a
SHA14b961c356ff7f1925c9ec45ccc41c107964606ba
SHA25633ba1e1f46f9d93e8e89cb4abbbcb204be111db63b1c4d6193a49c747fc05300
SHA512a8fde8ae9b1faf5ca93f7448da83dc3af6931392a6aab9e3bfc7ea61b48a57aab92943d8c079cd55ae6f6a6310814fb386bc7082721eee6b7f2c857134a99d88
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
128KB
MD554bb0d4e8255b55f339cb4e20b537b0b
SHA19b8957c8631a57142545c9bd1229cdae402bafea
SHA25682eecf84a880e8cbf0a4a5dfaffed6b65afcec9f6b0289bccf9f06f58c7550e8
SHA512da5461afc80fabb5920d3dffbcf870ffe4b8432b0d61a1b2ef4a549b54d25e2f299bbfc5c7961c43131f1556e4ff5ab244e7a3598193dd06654bf1f3362ef889
-
Filesize
64KB
MD5537c9e674ba1471c5fa394debf334127
SHA124d05a6a47929788df539ff631b2ff4da361d721
SHA256e89c94b807bf9fac572d06588d64d9d22664c47c07a6a3abfac453cce3aaecb5
SHA5123a0390a865018cefbe92df7ab3266fadb8c398ca1f068c78c640e2acb55784a390090936f986efadbb056e95c1958f9e6c3bc5dc411871c5cf2348437c37cd17
-
Filesize
64KB
MD5e77422fac1e9d2d11cf7f1c1d57071a4
SHA153e63414263dc20ea044c6cbb4fb4fc2c2be6140
SHA2569d0cfbb7bb8da895a7f43758556217bf4c00b5c335c56b1f765c14069993e320
SHA512d2b84dd99814d55c541f02452eac9c9344bfd838d1f8b73a07bcc3193b9122176ffee19a182712b0ea646fb9e4b306732940efb0f38f0903d98788ecf2495f53
-
Filesize
123KB
MD5509407d87a5ec50d6848213ee0e7bbbd
SHA12ec2b2076c5b8332e5f357d999c7ec815718571b
SHA256a32006681d24fb90e9e0f0f4d32e36819ad18d8069c395947afd47fe384ee4b3
SHA512c7f2fc2296c66c8969f022c2e5481175d47a19e37f7db608e735d1405d644ea147a36141105f5a31b09e0b10def9df03d6ba2a3d694ca7f0c36d2b9d531d9e66
-
Filesize
291KB
MD5cde750f39f58f1ec80ef41ce2f4f1db9
SHA1942ea40349b0e5af7583fd34f4d913398a9c3b96
SHA2560a434be25f55f27ce0adbdfb08efeac1da01125b3e9194a94669bc7e9c6fe094
SHA512c181faacbef70f8a91606943470af50cfd443958c48601051371ff5d9bf66bb9ec794571b05a347a7f5776f06484dc007f535591d2f5e1c57e3c0ee04f3e9580
-
Filesize
86KB
MD5c66ed7542537f42b7e23bb28dc35115d
SHA1b9bd13b7dfcae5c0509c16a4201bc66360a68211
SHA2567957e540432f0b2b2c9e2abfda1f51245e8e6a80f90805b2bcd65034669ed7ce
SHA5128a50636b6ada0c545167b2a14c3a4238c4c158ebe6a7106d09f545a5c2bfc0a275ad466fc0405b320090fd2cafc98676253f780f3e50a2599c0ae1c43ff68b22
-
Filesize
172KB
MD5f582612bba7708053944c27c47b82968
SHA1b398c303c2c92fe23e9463893f5eecb9b122953b
SHA2562d19ae52743ed0d19bde04c7b70809dd6df276eb9f9c81f75956d8f949f7936f
SHA512fe353f4f68e33ef4618570668c0d6c2394585417c155abd3eb6d1f20d9aa74ebd2fc539a268244ab6d2a43358ac200aed3cc645d428998ee63dab0f1d4046494
-
Filesize
498KB
MD5bedffa107e4dd4270dff078a581e42cb
SHA1880d43d2b70d11d7a9db656e383b2ad96bea4638
SHA25691d265fed18738c97d9de3fdabee87ea6f22ddfd577cf73ab24afaf0fa180593
SHA512f7c3aece28ace72cf4c8b80a91dbe3012405f4e2876078f865222aa98be0c57c93c397d4d04271a04d4d58ad614d8e177de085a450955ea872b174dc49e775b6
-
Filesize
215KB
MD5cadcf513033681315f8d095a0ee4b9b0
SHA1ac2fb0adbd32b0b1b8a9b76950973c4208166922
SHA256dfbfd30a01b3fb59db71a5659c3aed5dc5cad75a201bc714965c2a85c40e88b4
SHA5124dbf70fc25a7b6f9b6cceabf0d107bcf4e38432ee331ac4736658f6d93b0f3e91e1ca6b11a0f947046ce43e2bda76956e1de9380a66ccae507422c2f6663645a
-
Filesize
320KB
MD556ecb2ab61b396586fb0e6dc0844990f
SHA11040ba497f46107a5c95824f3359f40ec66429e4
SHA256f03de4b928808c3e43c2905a68a2e9a707d5f537553707b0a2a57f7e00c4cfc3
SHA51257ffa0c6b717267607e5a7f6274594bcde4f0c32030b75b3c2b7649f52169a95baa42b4153a35f8e55266fb74e97b97c441d50ab0fafd1313a307b1389aa9ff0