Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    31-03-2021 17:23

General

  • Target

    SecuriteInfo.com.Mal.GandCrypt-A.26403.26463.exe

  • Size

    176KB

  • MD5

    de276c3b5b196028e89b37f04230a39d

  • SHA1

    77df36a5cccf073b4fb998efe4e42df8b78e3277

  • SHA256

    ed4c8f72e049a22a51ff3d1b871fb42c1e333d4831710b7180e040d5a27a8b24

  • SHA512

    0268a4deb27a2874a7796086e1635b325ac98d2a83d93521a8b3fb7fc3142d3165a55724b411bf5934a1c80c7096374690afebf4edbf0d57a954343de4a5a4ea

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xsss99.icu/upload/

http://bingooodsg.icu/upload/

http://junntd.xyz/upload/

http://ginessa11.xyz/upload/

http://overplayninsx.xyz/upload/

http://bananinze.com/upload/

http://daunimlas.com/upload/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.GandCrypt-A.26403.26463.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.GandCrypt-A.26403.26463.exe"
    1⤵
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:596
  • C:\Users\Admin\AppData\Local\Temp\6ECA.exe
    C:\Users\Admin\AppData\Local\Temp\6ECA.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\c46e1d8b-f408-4c99-9057-d10a2062ae7c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1512
    • C:\Users\Admin\AppData\Local\Temp\6ECA.exe
      "C:\Users\Admin\AppData\Local\Temp\6ECA.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1648
      • C:\Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin1.exe
        "C:\Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin1.exe"
        3⤵
          PID:900
        • C:\Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin2.exe
          "C:\Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin2.exe"
          3⤵
            PID:1304
      • C:\Users\Admin\AppData\Local\Temp\848C.exe
        C:\Users\Admin\AppData\Local\Temp\848C.exe
        1⤵
        • Executes dropped EXE
        PID:1684

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      File Permissions Modification

      1
      T1222

      Modify Registry

      2
      T1112

      Install Root Certificate

      1
      T1130

      Discovery

      System Information Discovery

      2
      T1082

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
        MD5

        0936d19232cfcdafbced53ad410a7302

        SHA1

        7ecf78bc4b20f07d1b4e37d3b6d23276d559b18a

        SHA256

        9046bb77872ac1e6d8b9a6af797f1fdd5cac5b833de440cbd285f396938c54fa

        SHA512

        642215bbc005909a0a4ff3e1cfd9fb3017838e7a6bdf03c5716e980b59d46a793fd24d63ce8e27867d58daa644112e53e63fac7f671ee6f3a9b28bbde805805c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        MD5

        61a03d15cf62612f50b74867090dbe79

        SHA1

        15228f34067b4b107e917bebaf17cc7c3c1280a8

        SHA256

        f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d

        SHA512

        5fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
        MD5

        9c381e1c05936ad539bc8d0fe34981c3

        SHA1

        cff61eb4121208e3fc90e0ae7cc605fc44e65ab9

        SHA256

        bde1d8daaa1cb82ecab9742c4e06ae955070fb10be6689f5f177efe3496d32e3

        SHA512

        bdc49a8fd3318658de368d640198e91a07dac3365fd1a6eff2265b1d909fb5a32d398b4fa94a6d8dd04876980b138217f15a579d1b47df0820f58ee4db295d65

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
        MD5

        2150e5431d8a4d9197e3d2593ae12ec6

        SHA1

        b7399bb8dd175f0eb09834718f4805189d33b678

        SHA256

        9c1df40798473294df488f133b068dc3d70f2d566dd2c426ee20a43cfbb4223d

        SHA512

        f5f7b1956141d7486b7c6315f8a7ac36674eeea18ac25821fa459588b889f6ca5e90fc2d93dcfb85ce3c7054a5e0940ea8dadd461ac26f4e7729e40491ad3c4f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        MD5

        5e8ea725f92cdc5ca319ec111c92b279

        SHA1

        f0db4e9f1e062661ac366db1e4e2573074ae5303

        SHA256

        b4ba09172a2a346e3e7d2317a20335ea7a3ab0d1dbe6d2925e91b5f748e0e8dd

        SHA512

        7a4153549d1829cacce34620266a44cff66f4d76b7aaffbcad049d4d782f5e74772f969b643d4f4bbd6c4acf605345d69c101890cd1dd7e663d8b9b204fdb5ce

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
        MD5

        a77cf03f1d707829c2239f2ead1ab49c

        SHA1

        83cf8df6731fd67939efa9561ec07b02434dec07

        SHA256

        0f9f3904ce495dae1114b0cfa0bc5e983048cf259eeafff79400867e4939fa7e

        SHA512

        7a63745a77c0a3a4b81bfa3c0d6009465dc45c1ca48fda915789f5d15947cd1bf54c3b89b7f9e7c0f98059ba6002f857b87dbabfbd27a99acbee05cb787b19df

      • C:\Users\Admin\AppData\Local\Temp\6ECA.exe
        MD5

        dfbf4111aaf98ca30c0cf21e99a08ff7

        SHA1

        8d0fc08860666b9d619dc0f82cebc467705b46f3

        SHA256

        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

        SHA512

        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

      • C:\Users\Admin\AppData\Local\Temp\6ECA.exe
        MD5

        dfbf4111aaf98ca30c0cf21e99a08ff7

        SHA1

        8d0fc08860666b9d619dc0f82cebc467705b46f3

        SHA256

        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

        SHA512

        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

      • C:\Users\Admin\AppData\Local\Temp\6ECA.exe
        MD5

        dfbf4111aaf98ca30c0cf21e99a08ff7

        SHA1

        8d0fc08860666b9d619dc0f82cebc467705b46f3

        SHA256

        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

        SHA512

        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

      • C:\Users\Admin\AppData\Local\Temp\848C.exe
        MD5

        4328b263719a51a40732349a08ba3bb6

        SHA1

        904bd397a12c124af4a24021c6a21060955c79a3

        SHA256

        a351c1d494a1060fc9cd1c914bb846d87318181202c4f9c06c6931a73c933522

        SHA512

        75a6cdea5867875cab4c8c446c950805ab643a81d5acba6e2fc459f2859f7606690a7f19b00fb4ab22ece57236bbeaaf83295901a1807eba1881c7342f298107

      • C:\Users\Admin\AppData\Local\c46e1d8b-f408-4c99-9057-d10a2062ae7c\6ECA.exe
        MD5

        dfbf4111aaf98ca30c0cf21e99a08ff7

        SHA1

        8d0fc08860666b9d619dc0f82cebc467705b46f3

        SHA256

        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

        SHA512

        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

      • C:\Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin1.exe
        MD5

        5b4bd24d6240f467bfbc74803c9f15b0

        SHA1

        c17f98c182d299845c54069872e8137645768a1a

        SHA256

        14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

        SHA512

        a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

      • C:\Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin1.exe
        MD5

        5b4bd24d6240f467bfbc74803c9f15b0

        SHA1

        c17f98c182d299845c54069872e8137645768a1a

        SHA256

        14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

        SHA512

        a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

      • \Users\Admin\AppData\Local\Temp\6ECA.exe
        MD5

        dfbf4111aaf98ca30c0cf21e99a08ff7

        SHA1

        8d0fc08860666b9d619dc0f82cebc467705b46f3

        SHA256

        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

        SHA512

        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

      • \Users\Admin\AppData\Local\Temp\6ECA.exe
        MD5

        dfbf4111aaf98ca30c0cf21e99a08ff7

        SHA1

        8d0fc08860666b9d619dc0f82cebc467705b46f3

        SHA256

        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

        SHA512

        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

      • \Users\Admin\AppData\Local\Temp\CC4F.tmp
        MD5

        d124f55b9393c976963407dff51ffa79

        SHA1

        2c7bbedd79791bfb866898c85b504186db610b5d

        SHA256

        ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

        SHA512

        278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

      • \Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin1.exe
        MD5

        5b4bd24d6240f467bfbc74803c9f15b0

        SHA1

        c17f98c182d299845c54069872e8137645768a1a

        SHA256

        14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

        SHA512

        a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

      • \Users\Admin\AppData\Local\cca1a880-09e8-4cc5-8ab1-dc1e9e42e712\updatewin2.exe
        MD5

        38b4acb4783d0ba43c3f725b9dcaa1f7

        SHA1

        82a4fd2ec3de052a6a11f2a3afa8422d63e9c689

        SHA256

        c22620b33fd7a33ac16987cb241343f9f21b4acd9567e9eea7242b16cc20f4d0

        SHA512

        9546f6e19c41a3675a1261875565ba254cf95e163451851c499e1b2d9ac45fb84a01bd4df7e83f91b8caba95cc3f3a8ba4175ee714ce12ec8443f23cc6b15f88

      • memory/596-2-0x00000000046D0000-0x00000000046E1000-memory.dmp
        Filesize

        68KB

      • memory/596-6-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/596-3-0x00000000767C1000-0x00000000767C3000-memory.dmp
        Filesize

        8KB

      • memory/596-5-0x0000000000220000-0x0000000000229000-memory.dmp
        Filesize

        36KB

      • memory/676-8-0x0000000000000000-mapping.dmp
      • memory/676-13-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/676-10-0x0000000001C20000-0x0000000001C31000-memory.dmp
        Filesize

        68KB

      • memory/676-12-0x0000000001800000-0x000000000191A000-memory.dmp
        Filesize

        1.1MB

      • memory/872-14-0x000007FEF6970000-0x000007FEF6BEA000-memory.dmp
        Filesize

        2.5MB

      • memory/900-33-0x0000000000000000-mapping.dmp
      • memory/1256-7-0x0000000002A60000-0x0000000002A76000-memory.dmp
        Filesize

        88KB

      • memory/1512-16-0x0000000000000000-mapping.dmp
      • memory/1648-22-0x0000000000000000-mapping.dmp
      • memory/1648-24-0x0000000001BA0000-0x0000000001BB1000-memory.dmp
        Filesize

        68KB

      • memory/1648-38-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/1684-18-0x0000000000000000-mapping.dmp