Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe
Resource
win10v2004-20240226-en
General
-
Target
cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe
-
Size
860KB
-
MD5
10546d4f84b9966d5f72ed3bdf530c4c
-
SHA1
f0179725a1691177a47341327ebaa2e0d2864edb
-
SHA256
cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714
-
SHA512
bdc714a77f447a130c10511b4a066b13180fd723c79efc59e4ead98e11b4fec73bf083431d19deec7036c5ee7a460f2e8f29c2651325f334e66e7eb53f130a05
-
SSDEEP
24576:pyzao0HuuMlmyvo5SO93mlKkgpvkryQwJiQHehoZM:cHuMl503Dkgkyiu
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000002324f-40.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1GK86gA3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1GK86gA3.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023249-51.dat family_redline behavioral1/memory/1540-53-0x0000000000B40000-0x0000000000B7E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 8 IoCs
pid Process 3168 Fu7FA98.exe 2040 wm8Uu21.exe 4604 Yl3FA41.exe 1096 ug2Bz93.exe 1868 1GK86gA3.exe 1212 2SA8995.exe 3224 3xy63bs.exe 1540 4Ae589gL.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1GK86gA3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1GK86gA3.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Fu7FA98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" wm8Uu21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Yl3FA41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ug2Bz93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xy63bs.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xy63bs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3xy63bs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 1GK86gA3.exe 1868 1GK86gA3.exe 3224 3xy63bs.exe 3224 3xy63bs.exe 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found 3364 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3224 3xy63bs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1868 1GK86gA3.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 412 wrote to memory of 3168 412 cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe 90 PID 412 wrote to memory of 3168 412 cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe 90 PID 412 wrote to memory of 3168 412 cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe 90 PID 3168 wrote to memory of 2040 3168 Fu7FA98.exe 91 PID 3168 wrote to memory of 2040 3168 Fu7FA98.exe 91 PID 3168 wrote to memory of 2040 3168 Fu7FA98.exe 91 PID 2040 wrote to memory of 4604 2040 wm8Uu21.exe 92 PID 2040 wrote to memory of 4604 2040 wm8Uu21.exe 92 PID 2040 wrote to memory of 4604 2040 wm8Uu21.exe 92 PID 4604 wrote to memory of 1096 4604 Yl3FA41.exe 93 PID 4604 wrote to memory of 1096 4604 Yl3FA41.exe 93 PID 4604 wrote to memory of 1096 4604 Yl3FA41.exe 93 PID 1096 wrote to memory of 1868 1096 ug2Bz93.exe 94 PID 1096 wrote to memory of 1868 1096 ug2Bz93.exe 94 PID 1096 wrote to memory of 1868 1096 ug2Bz93.exe 94 PID 1096 wrote to memory of 1212 1096 ug2Bz93.exe 97 PID 1096 wrote to memory of 1212 1096 ug2Bz93.exe 97 PID 1096 wrote to memory of 1212 1096 ug2Bz93.exe 97 PID 4604 wrote to memory of 3224 4604 Yl3FA41.exe 98 PID 4604 wrote to memory of 3224 4604 Yl3FA41.exe 98 PID 4604 wrote to memory of 3224 4604 Yl3FA41.exe 98 PID 2040 wrote to memory of 1540 2040 wm8Uu21.exe 99 PID 2040 wrote to memory of 1540 2040 wm8Uu21.exe 99 PID 2040 wrote to memory of 1540 2040 wm8Uu21.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe"C:\Users\Admin\AppData\Local\Temp\cbf2171616a11736845095e1a1e40b71c7a6b51e3c4453da03db769132820714.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fu7FA98.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fu7FA98.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wm8Uu21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wm8Uu21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yl3FA41.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yl3FA41.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ug2Bz93.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ug2Bz93.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1GK86gA3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1GK86gA3.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2SA8995.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2SA8995.exe6⤵
- Executes dropped EXE
PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3xy63bs.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3xy63bs.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Ae589gL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Ae589gL.exe4⤵
- Executes dropped EXE
PID:1540
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3856 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5389aa6a4960b6de773a0f491b14329b3
SHA1ef4cbb9d574d6475d1bac511fcd103bf68f4707f
SHA256d0c7b1ffa44a3d35577285c697a226cc905426c10d5e35031b3f60e101a92473
SHA51203f72727719e74c09b49cb9df7b8e40ec463e2fb5a102041f863eb8aef8c726335a17a273c228f3adbc5293ce267ec77c1aa174b7e3a82dd3e426d24ec0dab5c
-
Filesize
545KB
MD50e2d0c5ad0cfaf7f1956990498a44f41
SHA148d6ef07b7caae17a3a7e02917c439a8355bb7da
SHA25668e39a0f2038392bdb0296890eb2fd78f43af72b971973e10d6d5adfc120095f
SHA512d1dfb90431430c92cce106744e5f1e0199ff9c3ba05f6cb776ce40d733c1e6b1d1475d36b7b7ebc9929d32d33f652c7597b07f4213d0f835147f850b7d64d318
-
Filesize
221KB
MD58905918bd7e4f4aeda3a804d81f9ee40
SHA13c488a81539116085a1c22df26085f798f7202c8
SHA2560978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA5126530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56
-
Filesize
371KB
MD5c4d9a0c04f74a3a9c679637fc27bf8f1
SHA1b7c196d2c60d18e3595c67ba560cf5565b200a81
SHA25625b6ea13a8cd76a2e30144d9bc8b27254413777b2f4d2c32898802a0b71f06d9
SHA512835d8dc48adb9eb91cda1d737ae599f31b727282eeef0d93b7a2f35a2972588a407c37ba0b3173287f82ddd5ac7f07e0d0cd2aa76246c27c5c2dfc144e362a6b
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
246KB
MD54061eb8eeee971de67ce22a2a288873b
SHA14209d6c394897c1cfff9505da020bb6a9d81521b
SHA256b57d8bfdeb36184296fdfc848a3b8fb3de6fc146b28abad342584e4ef00ba3fb
SHA512a543add378d7e3a34455e9034d027dc93a7c806dace273dafed7f2f0c2e44917acb7200f5bd9e858b6e69595386035bdcaf4eb0e22d967b716a4bbff8d0c45da
-
Filesize
11KB
MD5d2ed05fd71460e6d4c505ce87495b859
SHA1a970dfe775c4e3f157b5b2e26b1f77da7ae6d884
SHA2563a119008fd025a394f6fb93a0c941e1dc0fa1f9c7606a674388f21d99dfe116f
SHA512a15efc7c5ddd82ea612444b5df530d11da43bbaaf7f7ae4801c8063c8cffe4538cd47e27639e380b9d1c7e342575169e06af4b298a8faf635865dc4f9dc11b8e
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9