Analysis
-
max time kernel
154s -
max time network
169s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-10-2021 18:44
Static task
static1
Behavioral task
behavioral1
Sample
af8af919173d2af2b99ec479cb6f887b.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
af8af919173d2af2b99ec479cb6f887b.exe
Resource
win10-en-20210920
General
-
Target
af8af919173d2af2b99ec479cb6f887b.exe
-
Size
344KB
-
MD5
af8af919173d2af2b99ec479cb6f887b
-
SHA1
8961fbdbbf88256438aea61106f91786ac99a3e7
-
SHA256
ee469f144571531a0b2961a624141b76c6ed18ec2f6d72badb86bd46ad430b44
-
SHA512
c78c2741818ca268183cc150d429f5eac5158732a14738381ecdff41240942c9e3f518d606967481130e178b1662c420b6fdbd028344518f148a5ab80f432bba
Malware Config
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
Extracted
icedid
1875681804
enticationmetho.ink
Extracted
raccoon
6655b26b014f56ed3e8df973c407aa18e865e396
-
url4cnc
http://telegka.top/kaba4ello
http://telegin.top/kaba4ello
https://t.me/kaba4ello
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
2839.exe2839.exe3351.exe36AC.exe391D.exe3E3C.exe4494.exepid process 684 2839.exe 932 2839.exe 1008 3351.exe 1784 36AC.exe 1944 391D.exe 112 3E3C.exe 1816 4494.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3351.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3351.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3351.exe -
Deletes itself 1 IoCs
Processes:
pid process 1204 -
Loads dropped DLL 4 IoCs
Processes:
2839.exe36AC.exepid process 684 2839.exe 1784 36AC.exe 1204 1204 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3351.exe themida behavioral1/memory/1008-74-0x0000000001170000-0x0000000001171000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
3351.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3351.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
3351.exepid process 1008 3351.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
af8af919173d2af2b99ec479cb6f887b.exe2839.exedescription pid process target process PID 972 set thread context of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 684 set thread context of 932 684 2839.exe 2839.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
af8af919173d2af2b99ec479cb6f887b.exe2839.exe36AC.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI af8af919173d2af2b99ec479cb6f887b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2839.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36AC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36AC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI af8af919173d2af2b99ec479cb6f887b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI af8af919173d2af2b99ec479cb6f887b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2839.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2839.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36AC.exe -
Processes:
391D.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 391D.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 391D.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
af8af919173d2af2b99ec479cb6f887b.exepid process 752 af8af919173d2af2b99ec479cb6f887b.exe 752 af8af919173d2af2b99ec479cb6f887b.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1204 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
af8af919173d2af2b99ec479cb6f887b.exe2839.exe36AC.exepid process 752 af8af919173d2af2b99ec479cb6f887b.exe 932 2839.exe 1784 36AC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3351.exedescription pid process Token: SeDebugPrivilege 1008 3351.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1204 1204 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1204 1204 -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
af8af919173d2af2b99ec479cb6f887b.exe2839.exedescription pid process target process PID 972 wrote to memory of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 972 wrote to memory of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 972 wrote to memory of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 972 wrote to memory of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 972 wrote to memory of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 972 wrote to memory of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 972 wrote to memory of 752 972 af8af919173d2af2b99ec479cb6f887b.exe af8af919173d2af2b99ec479cb6f887b.exe PID 1204 wrote to memory of 684 1204 2839.exe PID 1204 wrote to memory of 684 1204 2839.exe PID 1204 wrote to memory of 684 1204 2839.exe PID 1204 wrote to memory of 684 1204 2839.exe PID 684 wrote to memory of 932 684 2839.exe 2839.exe PID 684 wrote to memory of 932 684 2839.exe 2839.exe PID 684 wrote to memory of 932 684 2839.exe 2839.exe PID 684 wrote to memory of 932 684 2839.exe 2839.exe PID 684 wrote to memory of 932 684 2839.exe 2839.exe PID 684 wrote to memory of 932 684 2839.exe 2839.exe PID 684 wrote to memory of 932 684 2839.exe 2839.exe PID 1204 wrote to memory of 1008 1204 3351.exe PID 1204 wrote to memory of 1008 1204 3351.exe PID 1204 wrote to memory of 1008 1204 3351.exe PID 1204 wrote to memory of 1008 1204 3351.exe PID 1204 wrote to memory of 1784 1204 36AC.exe PID 1204 wrote to memory of 1784 1204 36AC.exe PID 1204 wrote to memory of 1784 1204 36AC.exe PID 1204 wrote to memory of 1784 1204 36AC.exe PID 1204 wrote to memory of 1944 1204 391D.exe PID 1204 wrote to memory of 1944 1204 391D.exe PID 1204 wrote to memory of 1944 1204 391D.exe PID 1204 wrote to memory of 112 1204 3E3C.exe PID 1204 wrote to memory of 112 1204 3E3C.exe PID 1204 wrote to memory of 112 1204 3E3C.exe PID 1204 wrote to memory of 112 1204 3E3C.exe PID 1204 wrote to memory of 1816 1204 4494.exe PID 1204 wrote to memory of 1816 1204 4494.exe PID 1204 wrote to memory of 1816 1204 4494.exe PID 1204 wrote to memory of 1816 1204 4494.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe"C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe"C:\Users\Admin\AppData\Local\Temp\af8af919173d2af2b99ec479cb6f887b.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\2839.exeC:\Users\Admin\AppData\Local\Temp\2839.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2839.exeC:\Users\Admin\AppData\Local\Temp\2839.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3351.exeC:\Users\Admin\AppData\Local\Temp\3351.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\36AC.exeC:\Users\Admin\AppData\Local\Temp\36AC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\391D.exeC:\Users\Admin\AppData\Local\Temp\391D.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\3E3C.exeC:\Users\Admin\AppData\Local\Temp\3E3C.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4494.exeC:\Users\Admin\AppData\Local\Temp\4494.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2839.exeMD5
aa5580062d5e8aa4d82e10ca863e1862
SHA19ed064ce82bc48e8955905147bac8baf063c2db4
SHA256d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416
SHA5122794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3
-
C:\Users\Admin\AppData\Local\Temp\2839.exeMD5
aa5580062d5e8aa4d82e10ca863e1862
SHA19ed064ce82bc48e8955905147bac8baf063c2db4
SHA256d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416
SHA5122794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3
-
C:\Users\Admin\AppData\Local\Temp\2839.exeMD5
aa5580062d5e8aa4d82e10ca863e1862
SHA19ed064ce82bc48e8955905147bac8baf063c2db4
SHA256d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416
SHA5122794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3
-
C:\Users\Admin\AppData\Local\Temp\3351.exeMD5
d0c332dd942a7b680063c4eca607f2c4
SHA1d57b7c95c258c968e7e2f5cd39bf52928cd587fd
SHA256756f3dc3ceb0db783e3f1cabd10ee6a3af4688147adde714cdea6f226e5f0024
SHA51270abbdaedfbc7ff4fb06ccd619ad812cb2731e7448d5055a414a609d048fc95067594e2ee74f35284d671b8d618d1914232e20d5cc7d862726a3138c4ec61019
-
C:\Users\Admin\AppData\Local\Temp\36AC.exeMD5
560a826cd29ca6598851fd4943de2523
SHA1e2b9140aeac3c24808b513b17ff68a20581a6aef
SHA2569821a789596a5923634011cbb4df4dc37d2993e81beaa3b8ffc38279ea3b6c14
SHA512e6385f9ceb41ac023d3505b810b97579e45a9ea8f8033b7491b26601dad7d33740e82c0df5ef353f330f676529ec6efe9f7be63215d480d4c43a1ef8a7a2b7e1
-
C:\Users\Admin\AppData\Local\Temp\391D.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
C:\Users\Admin\AppData\Local\Temp\3E3C.exeMD5
aa4e082db04b5f44f47f552223e80cac
SHA1c13cea9a5844ae0efba489c557a1d28e9db33bc7
SHA2562e60c985939f7ced8d26ccc57e8c43bec2c7f639027e31f7d9a61c726ea7fe09
SHA51284dea40f9414d9cc4e2ff24fc7fcc2aab942c9636524529198996244e09cc71a85d40939cda997201ded6e1f396a0d7be4369ca402ac88030ae8869008d09f83
-
C:\Users\Admin\AppData\Local\Temp\4494.exeMD5
9527bc2fb20d6c1a43cb4c53bd1253d7
SHA1b67f4071faec387113096ab28e04724c6db79ae9
SHA2566098630ddf7f5011ede5992ded355949baa00f2c763ea58285bc4552adb7a2f7
SHA51251e8019c741fc7d88a2da20e60e407895ea1b2efa2c2c623812288057fc8288f2a4379bda1c8a09aff5b88191953a6c27356ef790e09d3228f6280b2d8c95596
-
\Users\Admin\AppData\Local\Temp\1105.tmpMD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
\Users\Admin\AppData\Local\Temp\2839.exeMD5
aa5580062d5e8aa4d82e10ca863e1862
SHA19ed064ce82bc48e8955905147bac8baf063c2db4
SHA256d2b72372d1f6ff858237a0804714acfb2afa47ad2c2530a749ba738d2e0cf416
SHA5122794fcc8e0e0db2ee630fc1a96da2c2d58ae0ea7db2e8d843cbb6c9fe3b345e81d88a77bcd44d22b9c8fb2565e1a8bb66529dba316f9b75114b9de434ee1f3b3
-
\Users\Admin\AppData\Local\Temp\391D.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
\Users\Admin\AppData\Local\Temp\391D.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
memory/112-88-0x0000000000000000-mapping.dmp
-
memory/112-94-0x0000000000310000-0x000000000039E000-memory.dmpFilesize
568KB
-
memory/112-90-0x00000000009C9000-0x0000000000A17000-memory.dmpFilesize
312KB
-
memory/112-95-0x0000000000400000-0x00000000008C3000-memory.dmpFilesize
4.8MB
-
memory/684-62-0x0000000000A69000-0x0000000000A79000-memory.dmpFilesize
64KB
-
memory/684-60-0x0000000000000000-mapping.dmp
-
memory/752-56-0x0000000000402EE8-mapping.dmp
-
memory/752-57-0x0000000076851000-0x0000000076853000-memory.dmpFilesize
8KB
-
memory/752-55-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/932-66-0x0000000000402EE8-mapping.dmp
-
memory/972-54-0x00000000009D9000-0x00000000009E9000-memory.dmpFilesize
64KB
-
memory/972-58-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/1008-74-0x0000000001170000-0x0000000001171000-memory.dmpFilesize
4KB
-
memory/1008-85-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/1008-69-0x0000000000000000-mapping.dmp
-
memory/1204-59-0x0000000001D90000-0x0000000001DA6000-memory.dmpFilesize
88KB
-
memory/1204-93-0x0000000003BA0000-0x0000000003BB6000-memory.dmpFilesize
88KB
-
memory/1204-99-0x0000000003DC0000-0x0000000003DD6000-memory.dmpFilesize
88KB
-
memory/1784-86-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/1784-87-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/1784-78-0x0000000000949000-0x0000000000959000-memory.dmpFilesize
64KB
-
memory/1784-76-0x0000000000000000-mapping.dmp
-
memory/1816-96-0x0000000000000000-mapping.dmp
-
memory/1944-92-0x0000000140000000-0x0000000140009000-memory.dmpFilesize
36KB
-
memory/1944-83-0x0000000000000000-mapping.dmp