Analysis

  • max time kernel
    154s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    22-10-2021 18:44

General

  • Target

    af8af919173d2af2b99ec479cb6f887b.exe

  • Size

    344KB

  • MD5

    af8af919173d2af2b99ec479cb6f887b

  • SHA1

    8961fbdbbf88256438aea61106f91786ac99a3e7

  • SHA256

    ee469f144571531a0b2961a624141b76c6ed18ec2f6d72badb86bd46ad430b44

  • SHA512

    c78c2741818ca268183cc150d429f5eac5158732a14738381ecdff41240942c9e3f518d606967481130e178b1662c420b6fdbd028344518f148a5ab80f432bba

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://gejajoo7.top/

http://sysaheu9.top/

http://nusurtal4f.net/

http://netomishnetojuk.net/

http://escalivrouter.net/

http://nick22doom4.net/

http://wrioshtivsio.su/

http://nusotiso4.su/

http://rickkhtovkka.biz/

http://palisotoliso.net/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

1875681804

C2

enticationmetho.ink

Extracted

Family

raccoon

Botnet

6655b26b014f56ed3e8df973c407aa18e865e396

Attributes
  • url4cnc

    http://telegka.top/kaba4ello

    http://telegin.top/kaba4ello

    https://t.me/kaba4ello

rc4.plain
rc4.plain

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe
    "C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe
      "C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:752
  • C:\Users\Admin\AppData\Local\Temp\2839.exe
    C:\Users\Admin\AppData\Local\Temp\2839.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\2839.exe
      C:\Users\Admin\AppData\Local\Temp\2839.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:932
  • C:\Users\Admin\AppData\Local\Temp\3351.exe
    C:\Users\Admin\AppData\Local\Temp\3351.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1008
  • C:\Users\Admin\AppData\Local\Temp\36AC.exe
    C:\Users\Admin\AppData\Local\Temp\36AC.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1784
  • C:\Users\Admin\AppData\Local\Temp\391D.exe
    C:\Users\Admin\AppData\Local\Temp\391D.exe
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    PID:1944
  • C:\Users\Admin\AppData\Local\Temp\3E3C.exe
    C:\Users\Admin\AppData\Local\Temp\3E3C.exe
    1⤵
    • Executes dropped EXE
    PID:112
  • C:\Users\Admin\AppData\Local\Temp\4494.exe
    C:\Users\Admin\AppData\Local\Temp\4494.exe
    1⤵
    • Executes dropped EXE
    PID:1816

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2839.exe
    MD5

    aa5580062d5e8aa4d82e10ca863e1862

    SHA1

    9ed064ce82bc48e8955905147bac8baf063c2db4

    SHA256

    d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416

    SHA512

    2794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3

  • C:\Users\Admin\AppData\Local\Temp\2839.exe
    MD5

    aa5580062d5e8aa4d82e10ca863e1862

    SHA1

    9ed064ce82bc48e8955905147bac8baf063c2db4

    SHA256

    d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416

    SHA512

    2794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3

  • C:\Users\Admin\AppData\Local\Temp\2839.exe
    MD5

    aa5580062d5e8aa4d82e10ca863e1862

    SHA1

    9ed064ce82bc48e8955905147bac8baf063c2db4

    SHA256

    d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416

    SHA512

    2794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3

  • C:\Users\Admin\AppData\Local\Temp\3351.exe
    MD5

    d0c332dd942a7b680063c4eca607f2c4

    SHA1

    d57b7c95c258c968e7e2f5cd39bf52928cd587fd

    SHA256

    756f3dc3ceb0db783e3f1cabd10ee6a3af4688147adde714cdea6f226e5f0024

    SHA512

    70abbdaedfbc7ff4fb06ccd619ad812cb2731e7448d5055a414a609d048fc95067594e2ee74f35284d671b8d618d1914232e20d5cc7d862726a3138c4ec61019

  • C:\Users\Admin\AppData\Local\Temp\36AC.exe
    MD5

    560a826cd29ca6598851fd4943de2523

    SHA1

    e2b9140aeac3c24808b513b17ff68a20581a6aef

    SHA256

    9821a789596a5923634011cbb4df4dc37d2993e81beaa3b8ffc38279ea3b6c14

    SHA512

    e6385f9ceb41ac023d3505b810b97579e45a9ea8f8033b7491b26601dad7d33740e82c0df5ef353f330f676529ec6efe9f7be63215d480d4c43a1ef8a7a2b7e1

  • C:\Users\Admin\AppData\Local\Temp\391D.exe
    MD5

    81fc38de5b6197c4db58eb506037e7cb

    SHA1

    c2258ab3204e6061d548df202c99aa361242d848

    SHA256

    2b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b

    SHA512

    4c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a

  • C:\Users\Admin\AppData\Local\Temp\3E3C.exe
    MD5

    aa4e082db04b5f44f47f552223e80cac

    SHA1

    c13cea9a5844ae0efba489c557a1d28e9db33bc7

    SHA256

    2e60c985939f7ced8d26ccc57e8c43bec2c7f639027e31f7d9a61c726ea7fe09

    SHA512

    84dea40f9414d9cc4e2ff24fc7fcc2aab942c9636524529198996244e09cc71a85d40939cda997201ded6e1f396a0d7be4369ca402ac88030ae8869008d09f83

  • C:\Users\Admin\AppData\Local\Temp\4494.exe
    MD5

    9527bc2fb20d6c1a43cb4c53bd1253d7

    SHA1

    b67f4071faec387113096ab28e04724c6db79ae9

    SHA256

    6098630ddf7f5011ede5992ded355949baa00f2c763ea58285bc4552adb7a2f7

    SHA512

    51e8019c741fc7d88a2da20e60e407895ea1b2efa2c2c623812288057fc8288f2a4379bda1c8a09aff5b88191953a6c27356ef790e09d3228f6280b2d8c95596

  • \Users\Admin\AppData\Local\Temp\1105.tmp
    MD5

    d124f55b9393c976963407dff51ffa79

    SHA1

    2c7bbedd79791bfb866898c85b504186db610b5d

    SHA256

    ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

    SHA512

    278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

  • \Users\Admin\AppData\Local\Temp\2839.exe
    MD5

    aa5580062d5e8aa4d82e10ca863e1862

    SHA1

    9ed064ce82bc48e8955905147bac8baf063c2db4

    SHA256

    d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416

    SHA512

    2794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3

  • \Users\Admin\AppData\Local\Temp\391D.exe
    MD5

    81fc38de5b6197c4db58eb506037e7cb

    SHA1

    c2258ab3204e6061d548df202c99aa361242d848

    SHA256

    2b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b

    SHA512

    4c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a

  • \Users\Admin\AppData\Local\Temp\391D.exe
    MD5

    81fc38de5b6197c4db58eb506037e7cb

    SHA1

    c2258ab3204e6061d548df202c99aa361242d848

    SHA256

    2b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b

    SHA512

    4c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a

  • memory/112-88-0x0000000000000000-mapping.dmp
  • memory/112-94-0x0000000000310000-0x000000000039E000-memory.dmp
    Filesize

    568KB

  • memory/112-90-0x00000000009C9000-0x0000000000A17000-memory.dmp
    Filesize

    312KB

  • memory/112-95-0x0000000000400000-0x00000000008C3000-memory.dmp
    Filesize

    4.8MB

  • memory/684-62-0x0000000000A69000-0x0000000000A79000-memory.dmp
    Filesize

    64KB

  • memory/684-60-0x0000000000000000-mapping.dmp
  • memory/752-56-0x0000000000402EE8-mapping.dmp
  • memory/752-57-0x0000000076851000-0x0000000076853000-memory.dmp
    Filesize

    8KB

  • memory/752-55-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/932-66-0x0000000000402EE8-mapping.dmp
  • memory/972-54-0x00000000009D9000-0x00000000009E9000-memory.dmp
    Filesize

    64KB

  • memory/972-58-0x0000000000020000-0x0000000000029000-memory.dmp
    Filesize

    36KB

  • memory/1008-74-0x0000000001170000-0x0000000001171000-memory.dmp
    Filesize

    4KB

  • memory/1008-85-0x00000000054D0000-0x00000000054D1000-memory.dmp
    Filesize

    4KB

  • memory/1008-69-0x0000000000000000-mapping.dmp
  • memory/1204-59-0x0000000001D90000-0x0000000001DA6000-memory.dmp
    Filesize

    88KB

  • memory/1204-93-0x0000000003BA0000-0x0000000003BB6000-memory.dmp
    Filesize

    88KB

  • memory/1204-99-0x0000000003DC0000-0x0000000003DD6000-memory.dmp
    Filesize

    88KB

  • memory/1784-86-0x0000000000020000-0x0000000000029000-memory.dmp
    Filesize

    36KB

  • memory/1784-87-0x0000000000400000-0x0000000000882000-memory.dmp
    Filesize

    4.5MB

  • memory/1784-78-0x0000000000949000-0x0000000000959000-memory.dmp
    Filesize

    64KB

  • memory/1784-76-0x0000000000000000-mapping.dmp
  • memory/1816-96-0x0000000000000000-mapping.dmp
  • memory/1944-92-0x0000000140000000-0x0000000140009000-memory.dmp
    Filesize

    36KB

  • memory/1944-83-0x0000000000000000-mapping.dmp