Analysis

  • max time kernel
    160s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    22-02-2022 22:42

General

  • Target

    E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe

  • Size

    285KB

  • MD5

    8bce39cd73af077e8a24360ad94cd368

  • SHA1

    f761251b872215b0d34b76a53dd6b1452c6ca255

  • SHA256

    e7a7032ddae1adfd64c4c378c6e97be7a2453228c7014a21d3945fc3ddc85d75

  • SHA512

    5c3d9be970deef5ea27c11758656512b49533cdbaeae432569f442c7f30c4c054c313e283b09aea282de7d93a09af143293592221014784c337626250a7b81a0

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nahbleiben.at/upload/

http://noblecreativeaz.com/upload/

http://tvqaq.cn/upload/

http://recmaster.ru/upload/

http://sovels.ru/upload/

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

1843818144

C2

grendafolz.com

Extracted

Family

raccoon

Botnet

9185b8c5d1dac158cc47aef92b143671d2c3a9bf

Attributes
  • url4cnc

    http://206.189.100.203/kernelnixbarbos

    http://194.180.191.234/kernelnixbarbos

    http://185.163.204.216/kernelnixbarbos

    http://139.162.157.205/kernelnixbarbos

    https://t.me/kernelnixbarbos

rc4.plain
rc4.plain

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

  • suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

    suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

  • suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)

    suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • IcedID First Stage Loader 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe
    "C:\Users\Admin\AppData\Local\Temp\E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2612
  • C:\Users\Admin\AppData\Local\Temp\B04D.exe
    C:\Users\Admin\AppData\Local\Temp\B04D.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2932
  • C:\Users\Admin\AppData\Local\Temp\D0C7.exe
    C:\Users\Admin\AppData\Local\Temp\D0C7.exe
    1⤵
    • Executes dropped EXE
    PID:680
  • C:\Users\Admin\AppData\Local\Temp\14E.exe
    C:\Users\Admin\AppData\Local\Temp\14E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:2520
  • C:\Users\Admin\AppData\Local\Temp\1FC3.exe
    C:\Users\Admin\AppData\Local\Temp\1FC3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:3292
  • C:\Windows\system32\cmd.exe
    cmd
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3960
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:220
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
      2⤵
        PID:3316
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
        2⤵
          PID:540
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
          2⤵
            PID:2080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2148 -ip 2148
          1⤵
          • Suspicious use of NtCreateProcessExOtherParentProcess
          PID:2616
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4000 -ip 4000
          1⤵
          • Suspicious use of NtCreateProcessExOtherParentProcess
          PID:4048
        • C:\Users\Admin\AppData\Local\Temp\6F5B.exe
          C:\Users\Admin\AppData\Local\Temp\6F5B.exe
          1⤵
          • Executes dropped EXE
          PID:4036
        • C:\Windows\system32\msiexec.exe
          C:\Windows\system32\msiexec.exe /V
          1⤵
            PID:3400

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\14E.exe

            MD5

            06be7147faa9333dde2aa100d7cb3b0c

            SHA1

            e35819d29b2f5d9b63c65c1541eddcd92ac59125

            SHA256

            2f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5

            SHA512

            9bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337

          • C:\Users\Admin\AppData\Local\Temp\14E.exe

            MD5

            06be7147faa9333dde2aa100d7cb3b0c

            SHA1

            e35819d29b2f5d9b63c65c1541eddcd92ac59125

            SHA256

            2f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5

            SHA512

            9bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337

          • C:\Users\Admin\AppData\Local\Temp\1FC3.exe

            MD5

            06be7147faa9333dde2aa100d7cb3b0c

            SHA1

            e35819d29b2f5d9b63c65c1541eddcd92ac59125

            SHA256

            2f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5

            SHA512

            9bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337

          • C:\Users\Admin\AppData\Local\Temp\1FC3.exe

            MD5

            06be7147faa9333dde2aa100d7cb3b0c

            SHA1

            e35819d29b2f5d9b63c65c1541eddcd92ac59125

            SHA256

            2f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5

            SHA512

            9bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337

          • C:\Users\Admin\AppData\Local\Temp\6F5B.exe

            MD5

            ff4ab1345cc07c5b050ef5a78eae97ef

            SHA1

            157d19cb5c0f4dd740a57b315f86e5291be139f7

            SHA256

            d9666f203b175e302f2657c0b54b9cf2def99f43cefe78b9e048e689149fdd34

            SHA512

            47a1ffc765b07c9ba9e684a86e841a0ea78280e4371935ececd69e06aca4181c6402b9fe03c3a88746923a0a57480c4f3ed498563110aac411e3dad9e851b45d

          • C:\Users\Admin\AppData\Local\Temp\6F5B.exe

            MD5

            ff4ab1345cc07c5b050ef5a78eae97ef

            SHA1

            157d19cb5c0f4dd740a57b315f86e5291be139f7

            SHA256

            d9666f203b175e302f2657c0b54b9cf2def99f43cefe78b9e048e689149fdd34

            SHA512

            47a1ffc765b07c9ba9e684a86e841a0ea78280e4371935ececd69e06aca4181c6402b9fe03c3a88746923a0a57480c4f3ed498563110aac411e3dad9e851b45d

          • C:\Users\Admin\AppData\Local\Temp\B04D.exe

            MD5

            69170f5a7aca115104a5677d1ab86703

            SHA1

            3819bb03b3187c1881d203ccda6db2760218b191

            SHA256

            2bbb6025b5031a9df94ad75041457d43ab502c8829c149517fed553172035306

            SHA512

            d6946b7682b18dd38f79cd914f16b83f6d88f924340403043ce4f76a2333fccb5d8f0d51ff0852037526bccc8f5227480120093e82396405982238f34a1d4454

          • C:\Users\Admin\AppData\Local\Temp\B04D.exe

            MD5

            69170f5a7aca115104a5677d1ab86703

            SHA1

            3819bb03b3187c1881d203ccda6db2760218b191

            SHA256

            2bbb6025b5031a9df94ad75041457d43ab502c8829c149517fed553172035306

            SHA512

            d6946b7682b18dd38f79cd914f16b83f6d88f924340403043ce4f76a2333fccb5d8f0d51ff0852037526bccc8f5227480120093e82396405982238f34a1d4454

          • C:\Users\Admin\AppData\Local\Temp\D0C7.exe

            MD5

            ee0e37deb11cf4a2985c6ed958b13d62

            SHA1

            7d8670e51edef13c46a6189734975f43035f601c

            SHA256

            c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

            SHA512

            bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

          • C:\Users\Admin\AppData\Local\Temp\D0C7.exe

            MD5

            ee0e37deb11cf4a2985c6ed958b13d62

            SHA1

            7d8670e51edef13c46a6189734975f43035f601c

            SHA256

            c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

            SHA512

            bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

          • memory/680-142-0x0000018205880000-0x000001820588B000-memory.dmp

            Filesize

            44KB

          • memory/2148-149-0x0000000000400000-0x0000000000635000-memory.dmp

            Filesize

            2.2MB

          • memory/2148-150-0x0000000000400000-0x0000000000735000-memory.dmp

            Filesize

            3.2MB

          • memory/2148-146-0x0000000002570000-0x0000000002799000-memory.dmp

            Filesize

            2.2MB

          • memory/2148-151-0x00000000005E9000-0x00000000005F2000-memory.dmp

            Filesize

            36KB

          • memory/2148-145-0x0000000002490000-0x0000000002570000-memory.dmp

            Filesize

            896KB

          • memory/2364-152-0x00000000084D0000-0x00000000084DF000-memory.dmp

            Filesize

            60KB

          • memory/2364-133-0x0000000000A10000-0x0000000000A26000-memory.dmp

            Filesize

            88KB

          • memory/2364-141-0x00000000073C0000-0x00000000073D6000-memory.dmp

            Filesize

            88KB

          • memory/2520-171-0x0000000002DA0000-0x0000000002DA3000-memory.dmp

            Filesize

            12KB

          • memory/2520-172-0x0000000002DB0000-0x0000000002DB3000-memory.dmp

            Filesize

            12KB

          • memory/2520-168-0x0000000076F94000-0x0000000076F95000-memory.dmp

            Filesize

            4KB

          • memory/2520-166-0x0000000002D70000-0x0000000002D73000-memory.dmp

            Filesize

            12KB

          • memory/2520-170-0x0000000002D90000-0x0000000002D93000-memory.dmp

            Filesize

            12KB

          • memory/2520-169-0x0000000002D80000-0x0000000002D83000-memory.dmp

            Filesize

            12KB

          • memory/2520-173-0x0000000002DC0000-0x0000000002DC3000-memory.dmp

            Filesize

            12KB

          • memory/2520-174-0x0000000002DD0000-0x0000000002DD3000-memory.dmp

            Filesize

            12KB

          • memory/2612-132-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/2612-131-0x00000000001C0000-0x00000000001C9000-memory.dmp

            Filesize

            36KB

          • memory/2612-130-0x0000000000030000-0x0000000000038000-memory.dmp

            Filesize

            32KB

          • memory/2932-137-0x00000000007B0000-0x00000000007B9000-memory.dmp

            Filesize

            36KB

          • memory/2932-136-0x00000000007A0000-0x00000000007A8000-memory.dmp

            Filesize

            32KB

          • memory/2932-138-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3292-175-0x00000000025F0000-0x00000000025F3000-memory.dmp

            Filesize

            12KB

          • memory/3292-176-0x0000000002880000-0x0000000002883000-memory.dmp

            Filesize

            12KB

          • memory/3292-165-0x0000000077204000-0x0000000077205000-memory.dmp

            Filesize

            4KB

          • memory/3292-164-0x00000000025E0000-0x00000000025E3000-memory.dmp

            Filesize

            12KB

          • memory/3292-167-0x0000000076F94000-0x0000000076F95000-memory.dmp

            Filesize

            4KB

          • memory/4000-154-0x0000000002580000-0x00000000027A9000-memory.dmp

            Filesize

            2.2MB

          • memory/4000-156-0x0000000077202000-0x0000000077203000-memory.dmp

            Filesize

            4KB

          • memory/4000-155-0x0000000000400000-0x0000000000635000-memory.dmp

            Filesize

            2.2MB

          • memory/4000-153-0x0000000000400000-0x0000000000735000-memory.dmp

            Filesize

            3.2MB

          • memory/4036-163-0x0000000000400000-0x0000000000493000-memory.dmp

            Filesize

            588KB

          • memory/4036-162-0x0000000002220000-0x00000000022B2000-memory.dmp

            Filesize

            584KB

          • memory/4036-161-0x00000000021D0000-0x0000000002220000-memory.dmp

            Filesize

            320KB