Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe
Resource
win10v2004-20240226-en
General
-
Target
cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe
-
Size
860KB
-
MD5
10546d4f84b9966d5f72ed3bdf530c4c
-
SHA1
f0179725a1691177a47341327ebaa2e0d2864edb
-
SHA256
cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714
-
SHA512
bdc714a77f447a130c10511b4a066b13180fd723c79efc59e4ead98e11b4fec73bf083431d19deec7036c5ee7a460f2e8f29c2651325f334e66e7eb53f130a05
-
SSDEEP
24576:pyzao0HuuMlmyvo5SO93mlKkgpvkryQwJiQHehoZM:cHuMl503Dkgkyiu
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000002321b-41.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1GK86gA3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1GK86gA3.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023214-51.dat family_redline behavioral1/memory/3648-53-0x0000000000100000-0x000000000013E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 8 IoCs
pid Process 3716 Fu7FA98.exe 4540 wm8Uu21.exe 2996 Yl3FA41.exe 2584 ug2Bz93.exe 4276 1GK86gA3.exe 1084 2SA8995.exe 4092 3xy63bs.exe 3648 4Ae589gL.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1GK86gA3.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Fu7FA98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" wm8Uu21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Yl3FA41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ug2Bz93.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2684 sc.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xy63bs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xy63bs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xy63bs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4276 1GK86gA3.exe 4276 1GK86gA3.exe 4092 3xy63bs.exe 4092 3xy63bs.exe 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4092 3xy63bs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4276 1GK86gA3.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3496 Process not Found -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3716 3176 cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe 85 PID 3176 wrote to memory of 3716 3176 cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe 85 PID 3176 wrote to memory of 3716 3176 cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe 85 PID 3716 wrote to memory of 4540 3716 Fu7FA98.exe 86 PID 3716 wrote to memory of 4540 3716 Fu7FA98.exe 86 PID 3716 wrote to memory of 4540 3716 Fu7FA98.exe 86 PID 4540 wrote to memory of 2996 4540 wm8Uu21.exe 87 PID 4540 wrote to memory of 2996 4540 wm8Uu21.exe 87 PID 4540 wrote to memory of 2996 4540 wm8Uu21.exe 87 PID 2996 wrote to memory of 2584 2996 Yl3FA41.exe 89 PID 2996 wrote to memory of 2584 2996 Yl3FA41.exe 89 PID 2996 wrote to memory of 2584 2996 Yl3FA41.exe 89 PID 2584 wrote to memory of 4276 2584 ug2Bz93.exe 90 PID 2584 wrote to memory of 4276 2584 ug2Bz93.exe 90 PID 2584 wrote to memory of 4276 2584 ug2Bz93.exe 90 PID 2584 wrote to memory of 1084 2584 ug2Bz93.exe 98 PID 2584 wrote to memory of 1084 2584 ug2Bz93.exe 98 PID 2584 wrote to memory of 1084 2584 ug2Bz93.exe 98 PID 2996 wrote to memory of 4092 2996 Yl3FA41.exe 99 PID 2996 wrote to memory of 4092 2996 Yl3FA41.exe 99 PID 2996 wrote to memory of 4092 2996 Yl3FA41.exe 99 PID 4540 wrote to memory of 3648 4540 wm8Uu21.exe 100 PID 4540 wrote to memory of 3648 4540 wm8Uu21.exe 100 PID 4540 wrote to memory of 3648 4540 wm8Uu21.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe"C:\Users\Admin\AppData\Local\Temp\cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fu7FA98.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fu7FA98.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wm8Uu21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wm8Uu21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yl3FA41.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yl3FA41.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ug2Bz93.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ug2Bz93.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1GK86gA3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1GK86gA3.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2SA8995.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2SA8995.exe6⤵
- Executes dropped EXE
PID:1084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3xy63bs.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3xy63bs.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Ae589gL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Ae589gL.exe4⤵
- Executes dropped EXE
PID:3648
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5389aa6a4960b6de773a0f491b14329b3
SHA1ef4cbb9d574d6475d1bac511fcd103bf68f4707f
SHA256d0c7b1ffa44a3d35577285c697a226cc905426c10d5e35031b3f60e101a92473
SHA51203f72727719e74c09b49cb9df7b8e40ec463e2fb5a102041f863eb8aef8c726335a17a273c228f3adbc5293ce267ec77c1aa174b7e3a82dd3e426d24ec0dab5c
-
Filesize
545KB
MD50e2d0c5ad0cfaf7f1956990498a44f41
SHA148d6ef07b7caae17a3a7e02917c439a8355bb7da
SHA25668e39a0f2038392bdb0296890eb2fd78f43af72b971973e10d6d5adfc120095f
SHA512d1dfb90431430c92cce106744e5f1e0199ff9c3ba05f6cb776ce40d733c1e6b1d1475d36b7b7ebc9929d32d33f652c7597b07f4213d0f835147f850b7d64d318
-
Filesize
221KB
MD58905918bd7e4f4aeda3a804d81f9ee40
SHA13c488a81539116085a1c22df26085f798f7202c8
SHA2560978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA5126530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56
-
Filesize
371KB
MD5c4d9a0c04f74a3a9c679637fc27bf8f1
SHA1b7c196d2c60d18e3595c67ba560cf5565b200a81
SHA25625b6ea13a8cd76a2e30144d9bc8b27254413777b2f4d2c32898802a0b71f06d9
SHA512835d8dc48adb9eb91cda1d737ae599f31b727282eeef0d93b7a2f35a2972588a407c37ba0b3173287f82ddd5ac7f07e0d0cd2aa76246c27c5c2dfc144e362a6b
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
246KB
MD54061eb8eeee971de67ce22a2a288873b
SHA14209d6c394897c1cfff9505da020bb6a9d81521b
SHA256b57d8bfdeb36184296fdfc848a3b8fb3de6fc146b28abad342584e4ef00ba3fb
SHA512a543add378d7e3a34455e9034d027dc93a7c806dace273dafed7f2f0c2e44917acb7200f5bd9e858b6e69595386035bdcaf4eb0e22d967b716a4bbff8d0c45da
-
Filesize
11KB
MD5d2ed05fd71460e6d4c505ce87495b859
SHA1a970dfe775c4e3f157b5b2e26b1f77da7ae6d884
SHA2563a119008fd025a394f6fb93a0c941e1dc0fa1f9c7606a674388f21d99dfe116f
SHA512a15efc7c5ddd82ea612444b5df530d11da43bbaaf7f7ae4801c8063c8cffe4538cd47e27639e380b9d1c7e342575169e06af4b298a8faf635865dc4f9dc11b8e
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9