Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-09-2021 18:03

General

  • Target

    85450b08c8b089b5a642511b086c838e568dbc5a30174a398bb44eb62db6fdb6.exe

  • Size

    222KB

  • MD5

    c30c528c3c3d33903c598ef03b799e58

  • SHA1

    8551c666ae37a03fd61cded18a9d3227c745d0cd

  • SHA256

    85450b08c8b089b5a642511b086c838e568dbc5a30174a398bb44eb62db6fdb6

  • SHA512

    70c46d9a53a895131ad3d1a35dfb682637ff75a61d909a66de7bf4abe6b7dc20aa106538b97adda89dcba977e81c3e3bdb5aa69f808f7d484f20c42f11988d18

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://fiskahlilian16.top/

http://paishancho17.top/

http://ydiannetter18.top/

http://azarehanelle19.top/

http://quericeriant20.top/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE Amadey CnC Check-In

    suricata: ET MALWARE Amadey CnC Check-In

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 13 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85450b08c8b089b5a642511b086c838e568dbc5a30174a398bb44eb62db6fdb6.exe
    "C:\Users\Admin\AppData\Local\Temp\85450b08c8b089b5a642511b086c838e568dbc5a30174a398bb44eb62db6fdb6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Users\Admin\AppData\Local\Temp\85450b08c8b089b5a642511b086c838e568dbc5a30174a398bb44eb62db6fdb6.exe
      "C:\Users\Admin\AppData\Local\Temp\85450b08c8b089b5a642511b086c838e568dbc5a30174a398bb44eb62db6fdb6.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3880
  • C:\Users\Admin\AppData\Local\Temp\8B33.exe
    C:\Users\Admin\AppData\Local\Temp\8B33.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management 1.7.3.2\install\97C955F\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\8B33.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632945720 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:1564
  • C:\Users\Admin\AppData\Local\Temp\97D7.exe
    C:\Users\Admin\AppData\Local\Temp\97D7.exe
    1⤵
    • Executes dropped EXE
    PID:3568
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 43F1E428162CBF2F55BF1898C36D77ED C
      2⤵
      • Loads dropped DLL
      PID:1212
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 6A32FD9D8A74BFE48619BB9203EEE200
      2⤵
      • Loads dropped DLL
      PID:2360
    • C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe
      "C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      PID:3876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3024-117-0x0000000000C00000-0x0000000000C15000-memory.dmp

    Filesize

    84KB

  • memory/3568-128-0x00000000020B0000-0x0000000002140000-memory.dmp

    Filesize

    576KB

  • memory/3568-129-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/3880-114-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4000-116-0x00000000005B0000-0x00000000005B9000-memory.dmp

    Filesize

    36KB