Analysis
-
max time kernel
303s -
max time network
311s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
Resource
win11-20240412-en
General
-
Target
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe
-
Size
1.2MB
-
MD5
7d57b9e5ff073b06d62cea316f77e6c8
-
SHA1
4c278f1c0ca982da691ad5cf0e0bdf35df43398e
-
SHA256
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788
-
SHA512
5d90ec0db399769d744fccba0120bc63d6b7e4e852e0b02df27def04d2e7a9a307a20d7c667de1daab6077c5c8c826f559508a60c11e5e8990da51c3f9d5e7c8
-
SSDEEP
24576:xyjZtJ0RMymoUv1LUyJXL3YXYDjduCDZZMwPs3:kjZz0ePoUvKoLSipDZZMwU
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
2022
http://5.42.92.190/fks/index.php
Signatures
-
Detect Lumma Stealer payload V4 4 IoCs
resource yara_rule behavioral2/memory/1524-94-0x0000000000400000-0x0000000000488000-memory.dmp family_lumma_v4 behavioral2/memory/1524-97-0x0000000000400000-0x0000000000488000-memory.dmp family_lumma_v4 behavioral2/memory/1524-105-0x0000000000400000-0x0000000000488000-memory.dmp family_lumma_v4 behavioral2/memory/1524-112-0x0000000000400000-0x0000000000488000-memory.dmp family_lumma_v4 -
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral2/memory/1704-70-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/1704-69-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/1704-71-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/1704-77-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/1704-73-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral2/memory/1704-84-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/2536-47-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral2/memory/2536-48-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral2/memory/2536-50-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral2/memory/2536-58-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral2/memory/2536-61-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/1636-125-0x0000000000370000-0x0000000000390000-memory.dmp net_reactor behavioral2/memory/1636-126-0x00000000004D0000-0x00000000004EE000-memory.dmp net_reactor -
Executes dropped EXE 8 IoCs
pid Process 1696 wJ0fd45.exe 1132 bL8eQ94.exe 2560 eJ0Un33.exe 2476 2xV7880.exe 2600 3gR32Ml.exe 2640 4nN703ND.exe 1788 5bm5qH5.exe 1636 6qJ9Tv5.exe -
Loads dropped DLL 20 IoCs
pid Process 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 1696 wJ0fd45.exe 1696 wJ0fd45.exe 1132 bL8eQ94.exe 1132 bL8eQ94.exe 2560 eJ0Un33.exe 2560 eJ0Un33.exe 2560 eJ0Un33.exe 2476 2xV7880.exe 2560 eJ0Un33.exe 2560 eJ0Un33.exe 2600 3gR32Ml.exe 1132 bL8eQ94.exe 1132 bL8eQ94.exe 2640 4nN703ND.exe 1696 wJ0fd45.exe 1696 wJ0fd45.exe 1788 5bm5qH5.exe 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 1636 6qJ9Tv5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wJ0fd45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" bL8eQ94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" eJ0Un33.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2476 set thread context of 2536 2476 2xV7880.exe 34 PID 2600 set thread context of 1704 2600 3gR32Ml.exe 41 PID 2640 set thread context of 1524 2640 4nN703ND.exe 44 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5bm5qH5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5bm5qH5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5bm5qH5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 5bm5qH5.exe 1788 5bm5qH5.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1788 5bm5qH5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1636 6qJ9Tv5.exe Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1696 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 28 PID 2872 wrote to memory of 1696 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 28 PID 2872 wrote to memory of 1696 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 28 PID 2872 wrote to memory of 1696 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 28 PID 2872 wrote to memory of 1696 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 28 PID 2872 wrote to memory of 1696 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 28 PID 2872 wrote to memory of 1696 2872 c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe 28 PID 1696 wrote to memory of 1132 1696 wJ0fd45.exe 29 PID 1696 wrote to memory of 1132 1696 wJ0fd45.exe 29 PID 1696 wrote to memory of 1132 1696 wJ0fd45.exe 29 PID 1696 wrote to memory of 1132 1696 wJ0fd45.exe 29 PID 1696 wrote to memory of 1132 1696 wJ0fd45.exe 29 PID 1696 wrote to memory of 1132 1696 wJ0fd45.exe 29 PID 1696 wrote to memory of 1132 1696 wJ0fd45.exe 29 PID 1132 wrote to memory of 2560 1132 bL8eQ94.exe 30 PID 1132 wrote to memory of 2560 1132 bL8eQ94.exe 30 PID 1132 wrote to memory of 2560 1132 bL8eQ94.exe 30 PID 1132 wrote to memory of 2560 1132 bL8eQ94.exe 30 PID 1132 wrote to memory of 2560 1132 bL8eQ94.exe 30 PID 1132 wrote to memory of 2560 1132 bL8eQ94.exe 30 PID 1132 wrote to memory of 2560 1132 bL8eQ94.exe 30 PID 2560 wrote to memory of 2476 2560 eJ0Un33.exe 31 PID 2560 wrote to memory of 2476 2560 eJ0Un33.exe 31 PID 2560 wrote to memory of 2476 2560 eJ0Un33.exe 31 PID 2560 wrote to memory of 2476 2560 eJ0Un33.exe 31 PID 2560 wrote to memory of 2476 2560 eJ0Un33.exe 31 PID 2560 wrote to memory of 2476 2560 eJ0Un33.exe 31 PID 2560 wrote to memory of 2476 2560 eJ0Un33.exe 31 PID 2476 wrote to memory of 2372 2476 2xV7880.exe 33 PID 2476 wrote to memory of 2372 2476 2xV7880.exe 33 PID 2476 wrote to memory of 2372 2476 2xV7880.exe 33 PID 2476 wrote to memory of 2372 2476 2xV7880.exe 33 PID 2476 wrote to memory of 2372 2476 2xV7880.exe 33 PID 2476 wrote to memory of 2372 2476 2xV7880.exe 33 PID 2476 wrote to memory of 2372 2476 2xV7880.exe 33 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2476 wrote to memory of 2536 2476 2xV7880.exe 34 PID 2560 wrote to memory of 2600 2560 eJ0Un33.exe 35 PID 2560 wrote to memory of 2600 2560 eJ0Un33.exe 35 PID 2560 wrote to memory of 2600 2560 eJ0Un33.exe 35 PID 2560 wrote to memory of 2600 2560 eJ0Un33.exe 35 PID 2560 wrote to memory of 2600 2560 eJ0Un33.exe 35 PID 2560 wrote to memory of 2600 2560 eJ0Un33.exe 35 PID 2560 wrote to memory of 2600 2560 eJ0Un33.exe 35 PID 2600 wrote to memory of 2116 2600 3gR32Ml.exe 37 PID 2600 wrote to memory of 2116 2600 3gR32Ml.exe 37 PID 2600 wrote to memory of 2116 2600 3gR32Ml.exe 37 PID 2600 wrote to memory of 2116 2600 3gR32Ml.exe 37 PID 2600 wrote to memory of 2116 2600 3gR32Ml.exe 37 PID 2600 wrote to memory of 2116 2600 3gR32Ml.exe 37 PID 2600 wrote to memory of 2116 2600 3gR32Ml.exe 37 PID 2600 wrote to memory of 2912 2600 3gR32Ml.exe 38 PID 2600 wrote to memory of 2912 2600 3gR32Ml.exe 38 PID 2600 wrote to memory of 2912 2600 3gR32Ml.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe"C:\Users\Admin\AppData\Local\Temp\c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wJ0fd45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wJ0fd45.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bL8eQ94.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bL8eQ94.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eJ0Un33.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eJ0Un33.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xV7880.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2xV7880.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2372
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3gR32Ml.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3gR32Ml.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nN703ND.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4nN703ND.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5bm5qH5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5bm5qH5.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qJ9Tv5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6qJ9Tv5.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
1020KB
MD52c277e93930fdf344061b9de61da43fd
SHA119deab510aff019844306bd8e8382764cdb31044
SHA2568e5bdce1b78f27ce3332001426b1d1f1e332f122fe11506ed12e7c1994ea6143
SHA512db960983d0b8c99b2434147e27cb433e1206a8cb4aca871f804d1eee615f569141fcbb6bad927fac53f99429c0fe5716a53aefde398312a404c604d86e77233a
-
Filesize
37KB
MD5b938034561ab089d7047093d46deea8f
SHA1d778c32cc46be09b107fa47cf3505ba5b748853d
SHA256260784b1afd8b819cb6ccb91f01090942375e527abdc060dd835992d88c04161
SHA5124909585c112fba3575e07428679fd7add07453e11169f33922faca2012d8e8fa6dfb763d991c68d3b4bbc6e78b6f37d2380c502daada325d73c7fff6c647769b
-
Filesize
894KB
MD5b2e12a91c45628da38bda44827b28c85
SHA1e1c0b727d1c4f30bd7082fbd435625375e1e4726
SHA25699c587206075544ce20344ba152632324dc3474f183d572e4f3915021ff92ae0
SHA512771727e0820e143a579d3b4b0d34bb02b10818a6017a7a9cb9b52c9f597817d068a4a3e841740091d9fba0c21894a1c5e99ba9c6f53ee9098bd6a4a7ad75a888
-
Filesize
724KB
MD50e634b03cd7c3c28376c6827ba622bed
SHA1086b92b865a929f5e46e8bcb63af56ba5fdae551
SHA256d0b66e11cc4db7ddb80bdaec5c0147f9c77f418904843fb6bf26da594be2430e
SHA5129c28317a13f0edefcc586a946c464b78b21582cc155a0bb08097b8b8515a88d32c222279970440028167cea8df4fa982a90e6962372727afbe0e6ace360c93b5
-
Filesize
431KB
MD5c1569c5d9cd8d2de907c09f8e295a575
SHA115320dccccb378a900b0edb20b0305138a060e1d
SHA256ba299e3de116ce40ca647721f90927f02497e5d93a2617249dbaff6f8d30317b
SHA51207631ec9e2ffcacd4fd8a462df285e85ffe0fff79f78727cafdd663c3fc09528535887c095b3b178ef4925b845e7ee94cec20d33952d1ac185c6999f64772c92
-
Filesize
415KB
MD5394523fe5c26046b08d7bb19138a9106
SHA1fdba9cd03ae4efc39be033654b7042b471219f54
SHA256a89756fa3413156c01245e1e4b37658ea988e4836685d0d2b914351e89a68679
SHA512e70623387ca8141ee22d394df30bff370a984988a2a69270624dfee23f2d2f86f69bc4d1b0802597f8cc1ca1654dd206c394248d413c0b635947c19cb1953ac2
-
Filesize
378KB
MD55399d9e4522f87f272dc87f13d62a23c
SHA18fb9f17db86b086948cb2f17f00760fb5d29066e
SHA2563ca8e335e9aa746e8d61d35e117bd4d05b8b6d68fc0da50c7cfeacf6cd9f69b2
SHA512ac62cc79388fd01b5149c90a22b68b05c5b71fb07fdf91813b0bd18bb4688e513cc3dc5babc2779ded7e8300ca17bd1fef7c86127d6f6d768d0dbe49c661f882