Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    27-03-2021 20:34

General

  • Target

    SecuriteInfo.com.Mal.GandCrypt-A.24654.15083.exe

  • Size

    162KB

  • MD5

    5ae56adee91014f52a52c2568535332d

  • SHA1

    553ca6fbd31dca8fa3d0e4e73ae595b977247744

  • SHA256

    e91878bc507051fd594e422452cc31d4dc9f26af8f79b7499f6c04303ffbbcb2

  • SHA512

    27301d713fcc431251395f7764ac37a6ab2f8b953056d6e60ef06336dbdbe2d8e613217ee41986c9b39e4c9523eebac1a49dfa47eb5cedfb1d6be658cfc3b62e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xsss99.icu/upload/

http://bingooodsg.icu/upload/

http://junntd.xyz/upload/

http://ginessa11.xyz/upload/

http://overplayninsx.xyz/upload/

http://bananinze.com/upload/

http://daunimlas.com/upload/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.GandCrypt-A.24654.15083.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.GandCrypt-A.24654.15083.exe"
    1⤵
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:384
  • C:\Users\Admin\AppData\Local\Temp\736B.exe
    C:\Users\Admin\AppData\Local\Temp\736B.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\44d8147d-4064-4599-b7fe-8b00f5bb5d2c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1688
    • C:\Users\Admin\AppData\Local\Temp\736B.exe
      "C:\Users\Admin\AppData\Local\Temp\736B.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1204
      • C:\Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe
        "C:\Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe"
        3⤵
          PID:1656
        • C:\Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\5.exe
          "C:\Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\5.exe"
          3⤵
            PID:880
      • C:\Users\Admin\AppData\Local\Temp\8325.exe
        C:\Users\Admin\AppData\Local\Temp\8325.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        PID:1744
      • C:\Users\Admin\AppData\Local\Temp\97CF.exe
        C:\Users\Admin\AppData\Local\Temp\97CF.exe
        1⤵
        • Executes dropped EXE
        PID:1608

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        MD5

        f73d46ba9c9045633cac5ebf1442b931

        SHA1

        f1e81e9eaf322ffb8a25fc428231e486fa1028fe

        SHA256

        baddcff6da313cce5bd9590c7de0ef99f69e7d64840e2af33353b866d772bc91

        SHA512

        ed3bf10ecde1162ccce8f243c65f24b621184ef52efd6288a95fd9ff889c0d2407af127305f3f1c12d6bd591966f811cbee32bc2e3fe7d9e607e81dd987e6462

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        MD5

        61a03d15cf62612f50b74867090dbe79

        SHA1

        15228f34067b4b107e917bebaf17cc7c3c1280a8

        SHA256

        f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d

        SHA512

        5fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        MD5

        7d98a1a29082095fcf0be14aded739bf

        SHA1

        d2ef5678db6ab6573ec7275aae4af9ab3d8ddd3c

        SHA256

        2f6cb738db05f4049507fcf434120dfcbb9d84cdd0494ff9008941977659b100

        SHA512

        d2da9c1531595074825665d74acd90f04a3b0cc69827ad988408490beb739588a2b92a0926a4fcd975c8787406153b89444d54fc13f354040867804aeb454a1f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        MD5

        fd77ae39957a0442012f7fd9a7adad4d

        SHA1

        608c853288bc712f6db9cc5671be3e3970f2c75c

        SHA256

        cedb967f511be12a6eaf1ee13daeec068535e675ff5680f19dd4d56300286162

        SHA512

        9dcd78fa64623b131ed256fc487cd054abc9e2d593db1f02cb0776f794a98d3ec0e48268bf3c88bd2b134d02c678ad54e18280aaf433ec64e54e23a0765aef0e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        MD5

        3d83fb8f75c062a95534c3b469d3b4c4

        SHA1

        f8ac32c6a4d502ec7741b813135e31898512b660

        SHA256

        1b5210c91cc73bb874c577c12d8c8a45c4baa08d17e554af7070a28aab2e2ae9

        SHA512

        0b678acdb76b070f1bc1a728b649d745f4d5a09a95bd91a79b5cce1feea355cd9c6a6213081a58d379d6c169e61bf380e95bc519adeb5426334aa1b7e3e4a314

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        MD5

        dfd86105049cc05ee4a0b568dfc374ce

        SHA1

        22476138eea2d9388b0431f8eb891359f3477768

        SHA256

        578649821bd6cbee1c812da18bf06973bd678560db923b32b24503f05eb96398

        SHA512

        1dace858cfad734c4cbea9b8ee3dacd1386ab34e8b922a212f3b42a8661d28ade50516a5dba2c51462a2d1e87dc80c14d3f59720c278d33713ef0b0550539254

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        MD5

        d10b4490071c2c1ebba604e6b48b6916

        SHA1

        ac6dd32f23dc423b030f5afff2fc0cffea0b6885

        SHA256

        6b4df330c66fa63ff00f707b08ddea0d7502e5782248e06aeacfa3bb47ebdd47

        SHA512

        6475b6b3cdd545b82d07518e6836b03141533f5797c190b90d2b042c1d6b5fdb1819688d83afabc09961af1962a77426c6841ac10af70f696000b79a76729946

      • C:\Users\Admin\AppData\Local\44d8147d-4064-4599-b7fe-8b00f5bb5d2c\736B.exe

        MD5

        f3f35dcb69fca49ae55a22812770ecb2

        SHA1

        eb8c95dc050978d10c05073b0d5311f86da986ed

        SHA256

        a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2

        SHA512

        098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632

      • C:\Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe

        MD5

        9010fa92cc83afe00fab38703e6ffa77

        SHA1

        4d603ec27d02d84a65d1555c2df0896d7675fafc

        SHA256

        38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

        SHA512

        a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

      • C:\Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe

        MD5

        9010fa92cc83afe00fab38703e6ffa77

        SHA1

        4d603ec27d02d84a65d1555c2df0896d7675fafc

        SHA256

        38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

        SHA512

        a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

      • C:\Users\Admin\AppData\Local\Temp\736B.exe

        MD5

        f3f35dcb69fca49ae55a22812770ecb2

        SHA1

        eb8c95dc050978d10c05073b0d5311f86da986ed

        SHA256

        a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2

        SHA512

        098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632

      • C:\Users\Admin\AppData\Local\Temp\736B.exe

        MD5

        f3f35dcb69fca49ae55a22812770ecb2

        SHA1

        eb8c95dc050978d10c05073b0d5311f86da986ed

        SHA256

        a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2

        SHA512

        098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632

      • C:\Users\Admin\AppData\Local\Temp\736B.exe

        MD5

        f3f35dcb69fca49ae55a22812770ecb2

        SHA1

        eb8c95dc050978d10c05073b0d5311f86da986ed

        SHA256

        a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2

        SHA512

        098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632

      • C:\Users\Admin\AppData\Local\Temp\8325.exe

        MD5

        db8ccbbbcf3fd49089a596868128dcbe

        SHA1

        04afd57ba0a3ff60370c77b227b086f7b9869f62

        SHA256

        08058b1b27a29f5c3310b0b1ed36d3d4e11282e5fa9a5f9790d3c5b3515e84e3

        SHA512

        a67034aea26122d5979cc7d421e4598cbe49a694549c484eef16eec622c56fa635308f7482ede325d4991205f26d17095f89a4fb23a5e2d40f33969964c4a4dc

      • C:\Users\Admin\AppData\Local\Temp\97CF.exe

        MD5

        7ca6e483fb326d2947d725c850d5242d

        SHA1

        62fe89354684793ad2112c6973c0f169c2c7a6fd

        SHA256

        706fbf9e00bb7b3e48dd802b04f1f96c0b66e4eb097b97576f2f5935a5360bb1

        SHA512

        3f84b8bd0fd15374f0f65bfcd5c824f3f54101153dba05eefafc7f6505990f0981bb24db52dbe174a7b19e9105a1ec13d1b6acd95c21a25c26365765175042b9

      • \ProgramData\mozglue.dll

        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\msvcp140.dll

        MD5

        109f0f02fd37c84bfc7508d4227d7ed5

        SHA1

        ef7420141bb15ac334d3964082361a460bfdb975

        SHA256

        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

        SHA512

        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

      • \ProgramData\nss3.dll

        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \ProgramData\vcruntime140.dll

        MD5

        7587bf9cb4147022cd5681b015183046

        SHA1

        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

        SHA256

        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

        SHA512

        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

      • \Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe

        MD5

        9010fa92cc83afe00fab38703e6ffa77

        SHA1

        4d603ec27d02d84a65d1555c2df0896d7675fafc

        SHA256

        38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

        SHA512

        a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

      • \Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe

        MD5

        9010fa92cc83afe00fab38703e6ffa77

        SHA1

        4d603ec27d02d84a65d1555c2df0896d7675fafc

        SHA256

        38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

        SHA512

        a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

      • \Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe

        MD5

        9010fa92cc83afe00fab38703e6ffa77

        SHA1

        4d603ec27d02d84a65d1555c2df0896d7675fafc

        SHA256

        38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

        SHA512

        a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

      • \Users\Admin\AppData\Local\7ff6eeed-fb62-44ae-aa2d-fa38d7e79c4b\updatewin.exe

        MD5

        9010fa92cc83afe00fab38703e6ffa77

        SHA1

        4d603ec27d02d84a65d1555c2df0896d7675fafc

        SHA256

        38e6f4d8f53e8a38950594d9588cb00218bf46113c51b5241771181a521b9c75

        SHA512

        a39ea249da189fedd5f8d1c13d03693626c70ba08c69c4ec76396d3475c5480e98c8dba1da0b74089252d8d781fc050e4eed9346b648ccbb42e22cf6d15399e8

      • \Users\Admin\AppData\Local\Temp\736B.exe

        MD5

        f3f35dcb69fca49ae55a22812770ecb2

        SHA1

        eb8c95dc050978d10c05073b0d5311f86da986ed

        SHA256

        a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2

        SHA512

        098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632

      • \Users\Admin\AppData\Local\Temp\736B.exe

        MD5

        f3f35dcb69fca49ae55a22812770ecb2

        SHA1

        eb8c95dc050978d10c05073b0d5311f86da986ed

        SHA256

        a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2

        SHA512

        098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632

      • \Users\Admin\AppData\Local\Temp\CC4F.tmp

        MD5

        d124f55b9393c976963407dff51ffa79

        SHA1

        2c7bbedd79791bfb866898c85b504186db610b5d

        SHA256

        ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

        SHA512

        278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

      • memory/384-6-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/384-5-0x0000000000220000-0x0000000000229000-memory.dmp

        Filesize

        36KB

      • memory/384-3-0x0000000075C61000-0x0000000075C63000-memory.dmp

        Filesize

        8KB

      • memory/384-2-0x0000000002450000-0x0000000002461000-memory.dmp

        Filesize

        68KB

      • memory/548-16-0x000007FEF7040000-0x000007FEF72BA000-memory.dmp

        Filesize

        2.5MB

      • memory/1164-8-0x0000000000000000-mapping.dmp

      • memory/1164-13-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/1164-11-0x0000000001900000-0x0000000001A1A000-memory.dmp

        Filesize

        1.1MB

      • memory/1164-10-0x0000000001900000-0x0000000001911000-memory.dmp

        Filesize

        68KB

      • memory/1204-35-0x0000000001A10000-0x0000000001A21000-memory.dmp

        Filesize

        68KB

      • memory/1204-38-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/1204-32-0x0000000000000000-mapping.dmp

      • memory/1232-7-0x0000000002AD0000-0x0000000002AE6000-memory.dmp

        Filesize

        88KB

      • memory/1608-31-0x0000000000000000-mapping.dmp

      • memory/1656-46-0x0000000000000000-mapping.dmp

      • memory/1688-23-0x0000000000000000-mapping.dmp

      • memory/1744-20-0x0000000000400000-0x0000000000498000-memory.dmp

        Filesize

        608KB

      • memory/1744-17-0x00000000022E0000-0x00000000022F1000-memory.dmp

        Filesize

        68KB

      • memory/1744-14-0x0000000000000000-mapping.dmp

      • memory/1744-19-0x00000000002D0000-0x0000000000365000-memory.dmp

        Filesize

        596KB