Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe
Resource
win10v2004-20240226-en
General
-
Target
f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe
-
Size
1.2MB
-
MD5
07955226491bc30f939c7d1da1dbe64e
-
SHA1
03881d43e06e1b02e5d0058b195203a1391852f4
-
SHA256
f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8
-
SHA512
416ed817511c5ef2246b5e9da127a1c3a617673e926c88ea463172bfac186bb2e6ea736528ae0adc093b000e76b98b75ce783dbda0f3ff4ae8155f7a4e1d67d6
-
SSDEEP
24576:ryyzUvBsZjf1NDCZroGqez2RDOS7J4Nx63+DuWFjURrZO7/7iiipdRS2NK5cm:e4rO4DJ7y63+PFIE/7mRSkK5
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023210-23.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/544-37-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule behavioral1/memory/1376-21-0x0000000000400000-0x000000000040A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 1 IoCs
resource yara_rule behavioral1/memory/544-37-0x0000000000400000-0x000000000043E000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 6 IoCs
pid Process 2272 gg0rK76.exe 4028 ou0TN33.exe 1756 1VC42qC8.exe 2040 2Fr3134.exe 3020 3eS92ew.exe 2004 4eO517vE.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ou0TN33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gg0rK76.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1756 set thread context of 1376 1756 1VC42qC8.exe 95 PID 2004 set thread context of 544 2004 4eO517vE.exe 102 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3eS92ew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3eS92ew.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3eS92ew.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 3eS92ew.exe 3020 3eS92ew.exe 1376 AppLaunch.exe 1376 AppLaunch.exe 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found 3500 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3020 3eS92ew.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1376 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3500 Process not Found -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2272 4412 f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe 89 PID 4412 wrote to memory of 2272 4412 f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe 89 PID 4412 wrote to memory of 2272 4412 f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe 89 PID 2272 wrote to memory of 4028 2272 gg0rK76.exe 90 PID 2272 wrote to memory of 4028 2272 gg0rK76.exe 90 PID 2272 wrote to memory of 4028 2272 gg0rK76.exe 90 PID 4028 wrote to memory of 1756 4028 ou0TN33.exe 92 PID 4028 wrote to memory of 1756 4028 ou0TN33.exe 92 PID 4028 wrote to memory of 1756 4028 ou0TN33.exe 92 PID 1756 wrote to memory of 2356 1756 1VC42qC8.exe 93 PID 1756 wrote to memory of 2356 1756 1VC42qC8.exe 93 PID 1756 wrote to memory of 2356 1756 1VC42qC8.exe 93 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 1756 wrote to memory of 1376 1756 1VC42qC8.exe 95 PID 4028 wrote to memory of 2040 4028 ou0TN33.exe 96 PID 4028 wrote to memory of 2040 4028 ou0TN33.exe 96 PID 4028 wrote to memory of 2040 4028 ou0TN33.exe 96 PID 2272 wrote to memory of 3020 2272 gg0rK76.exe 97 PID 2272 wrote to memory of 3020 2272 gg0rK76.exe 97 PID 2272 wrote to memory of 3020 2272 gg0rK76.exe 97 PID 4412 wrote to memory of 2004 4412 f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe 101 PID 4412 wrote to memory of 2004 4412 f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe 101 PID 4412 wrote to memory of 2004 4412 f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe 101 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102 PID 2004 wrote to memory of 544 2004 4eO517vE.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe"C:\Users\Admin\AppData\Local\Temp\f4555b54180c53e34ad814d42e0a845aa07e98bf0bd305194be7e832c63657d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gg0rK76.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gg0rK76.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ou0TN33.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ou0TN33.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VC42qC8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VC42qC8.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Fr3134.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Fr3134.exe4⤵
- Executes dropped EXE
PID:2040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3eS92ew.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3eS92ew.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4eO517vE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4eO517vE.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:544
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f6a960e73b56f4fa26437ac5e12d7773
SHA196b2c9aa721bdd672501e5b07d12f61b6db86886
SHA25668285c53ce6f94bd947ead934a14efca01ae117452fe559954e943748713f93c
SHA512f8f13dbc76b5a2c3736a350ed2a973e7ba47ec20e2de6bd509ac8f67916e44b34fe06aee7973b2387e190277c8d4a479dabf833618eeecdd290ff4db46b6d3a9
-
Filesize
698KB
MD5cf37c362b1315fcd7d5c5a6949afb490
SHA15fedb3d26f5310d18b7d23ae630102e34928f442
SHA256b7232f1e4a6b35f836d1e0477df5c5bcfd2442963c5d0d970c7a3a686e957017
SHA512feb61d923a7a0ea5a1088266111002b8f30f6b1edcd563f6af3b9edb80c33dc36c4679323316b52fa433750c3a185623a0be53db18851329e86f74d565cdd238
-
Filesize
30KB
MD50a5301eaebbc0d911518a522131d77bc
SHA1d7927e68859bad44b27ae61a7502197e42b7c80a
SHA256f163e6834ab8ee4a4b0b479e045432cf3412144bb9b515177d330723f84d9cda
SHA51239fd6434abc8f90bafeb6a93bcdd92c8279ab499c1802e735fcaa7d49224d16183866cc6802cd0abb06001dac4dcebebf298ee2f4c921f0e8b04f2a30c709aae
-
Filesize
574KB
MD5699e625390f2f89ad226573c6be60623
SHA1d758ba568cf0ad83477c1b0c9a9a6fde42e45df6
SHA256f6e0056da425ffc4eba2b5bb5869f9dd5ea3beacad99b4b2c23421b1d0757f3b
SHA51232d9ddae1595208bc5eca7056615bddb268002ca7475e409f1da290b1dfce7cb381a09a3bfd5e062f6406698f27964367d3ff4dafee8e237b0f03e1aa70a1252
-
Filesize
1.6MB
MD529e9546e7fe835b413a5d65599213b53
SHA164d6d2eca4e197a390702a08b074c5ef6da2fa32
SHA256d65b10dc2c1598935786fd0d562aaee9c9fc6b7d6f950da6de13db6686cab814
SHA512e556877abd79052f3d3bc6175971001531f363745d396aa96302218cf11b4fc94980f946aae758ff14d8cc8af4d9dcb26503142e2d1cded2d21ab37ddc009658
-
Filesize
180KB
MD54190e7bd24169eb843c7217ebcadb360
SHA1d2158f874a257fe0d9cb3eb1d2949135c53da037
SHA2561fd396b1b0b6c40399fddd4e43d20ac01f9d6fa9fd204c990fa8e59825ac7bdc
SHA51240ac888cb2b270d275784d31771eaa130891e0fd3f43e20c1c0b0670797af2351c7c1efa4503420c7ad11ee6049c46fb3fd171d256491591652719be978b99f7