Analysis
-
max time kernel
160s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
22-02-2022 22:42
Static task
static1
Behavioral task
behavioral1
Sample
E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe
Resource
win10v2004-en-20220112
General
-
Target
E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe
-
Size
285KB
-
MD5
8bce39cd73af077e8a24360ad94cd368
-
SHA1
f761251b872215b0d34b76a53dd6b1452c6ca255
-
SHA256
e7a7032ddae1adfd64c4c378c6e97be7a2453228c7014a21d3945fc3ddc85d75
-
SHA512
5c3d9be970deef5ea27c11758656512b49533cdbaeae432569f442c7f30c4c054c313e283b09aea282de7d93a09af143293592221014784c337626250a7b81a0
Malware Config
Extracted
smokeloader
2020
http://nahbleiben.at/upload/
http://noblecreativeaz.com/upload/
http://tvqaq.cn/upload/
http://recmaster.ru/upload/
http://sovels.ru/upload/
https://oakland-studio.video/search.php
https://seattle-university.video/search.php
Extracted
icedid
1843818144
grendafolz.com
Extracted
raccoon
9185b8c5d1dac158cc47aef92b143671d2c3a9bf
-
url4cnc
http://206.189.100.203/kernelnixbarbos
http://194.180.191.234/kernelnixbarbos
http://185.163.204.216/kernelnixbarbos
http://139.162.157.205/kernelnixbarbos
https://t.me/kernelnixbarbos
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 2616 created 2148 2616 WerFault.exe 14E.exe PID 4048 created 4000 4048 WerFault.exe 1FC3.exe -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/680-142-0x0000018205880000-0x000001820588B000-memory.dmp IcedidFirstLoader -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 129 3292 rundll32.exe 130 2520 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
B04D.exeD0C7.exe14E.exe1FC3.exe6F5B.exepid process 2932 B04D.exe 680 D0C7.exe 2148 14E.exe 4000 1FC3.exe 4036 6F5B.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exeB04D.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B04D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B04D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B04D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exepid process 2612 E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe 2612 E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2364 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exeB04D.exepid process 2612 E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe 2932 B04D.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 2364 Token: SeCreatePagefilePrivilege 2364 Token: SeShutdownPrivilege 2364 Token: SeCreatePagefilePrivilege 2364 Token: SeIncreaseQuotaPrivilege 3960 WMIC.exe Token: SeSecurityPrivilege 3960 WMIC.exe Token: SeTakeOwnershipPrivilege 3960 WMIC.exe Token: SeLoadDriverPrivilege 3960 WMIC.exe Token: SeSystemProfilePrivilege 3960 WMIC.exe Token: SeSystemtimePrivilege 3960 WMIC.exe Token: SeProfSingleProcessPrivilege 3960 WMIC.exe Token: SeIncBasePriorityPrivilege 3960 WMIC.exe Token: SeCreatePagefilePrivilege 3960 WMIC.exe Token: SeBackupPrivilege 3960 WMIC.exe Token: SeRestorePrivilege 3960 WMIC.exe Token: SeShutdownPrivilege 3960 WMIC.exe Token: SeDebugPrivilege 3960 WMIC.exe Token: SeSystemEnvironmentPrivilege 3960 WMIC.exe Token: SeRemoteShutdownPrivilege 3960 WMIC.exe Token: SeUndockPrivilege 3960 WMIC.exe Token: SeManageVolumePrivilege 3960 WMIC.exe Token: 33 3960 WMIC.exe Token: 34 3960 WMIC.exe Token: 35 3960 WMIC.exe Token: 36 3960 WMIC.exe Token: SeIncreaseQuotaPrivilege 3960 WMIC.exe Token: SeSecurityPrivilege 3960 WMIC.exe Token: SeTakeOwnershipPrivilege 3960 WMIC.exe Token: SeLoadDriverPrivilege 3960 WMIC.exe Token: SeSystemProfilePrivilege 3960 WMIC.exe Token: SeSystemtimePrivilege 3960 WMIC.exe Token: SeProfSingleProcessPrivilege 3960 WMIC.exe Token: SeIncBasePriorityPrivilege 3960 WMIC.exe Token: SeCreatePagefilePrivilege 3960 WMIC.exe Token: SeBackupPrivilege 3960 WMIC.exe Token: SeRestorePrivilege 3960 WMIC.exe Token: SeShutdownPrivilege 3960 WMIC.exe Token: SeDebugPrivilege 3960 WMIC.exe Token: SeSystemEnvironmentPrivilege 3960 WMIC.exe Token: SeRemoteShutdownPrivilege 3960 WMIC.exe Token: SeUndockPrivilege 3960 WMIC.exe Token: SeManageVolumePrivilege 3960 WMIC.exe Token: 33 3960 WMIC.exe Token: 34 3960 WMIC.exe Token: 35 3960 WMIC.exe Token: 36 3960 WMIC.exe Token: SeIncreaseQuotaPrivilege 220 WMIC.exe Token: SeSecurityPrivilege 220 WMIC.exe Token: SeTakeOwnershipPrivilege 220 WMIC.exe Token: SeLoadDriverPrivilege 220 WMIC.exe Token: SeSystemProfilePrivilege 220 WMIC.exe Token: SeSystemtimePrivilege 220 WMIC.exe Token: SeProfSingleProcessPrivilege 220 WMIC.exe Token: SeIncBasePriorityPrivilege 220 WMIC.exe Token: SeCreatePagefilePrivilege 220 WMIC.exe Token: SeBackupPrivilege 220 WMIC.exe Token: SeRestorePrivilege 220 WMIC.exe Token: SeShutdownPrivilege 220 WMIC.exe Token: SeDebugPrivilege 220 WMIC.exe Token: SeSystemEnvironmentPrivilege 220 WMIC.exe Token: SeRemoteShutdownPrivilege 220 WMIC.exe Token: SeUndockPrivilege 220 WMIC.exe Token: SeManageVolumePrivilege 220 WMIC.exe Token: 33 220 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 2364 2364 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exe1FC3.exe14E.exedescription pid process target process PID 2364 wrote to memory of 2932 2364 B04D.exe PID 2364 wrote to memory of 2932 2364 B04D.exe PID 2364 wrote to memory of 2932 2364 B04D.exe PID 2364 wrote to memory of 680 2364 D0C7.exe PID 2364 wrote to memory of 680 2364 D0C7.exe PID 2364 wrote to memory of 2148 2364 14E.exe PID 2364 wrote to memory of 2148 2364 14E.exe PID 2364 wrote to memory of 2148 2364 14E.exe PID 2364 wrote to memory of 4000 2364 1FC3.exe PID 2364 wrote to memory of 4000 2364 1FC3.exe PID 2364 wrote to memory of 4000 2364 1FC3.exe PID 2364 wrote to memory of 1988 2364 cmd.exe PID 2364 wrote to memory of 1988 2364 cmd.exe PID 1988 wrote to memory of 3960 1988 cmd.exe WMIC.exe PID 1988 wrote to memory of 3960 1988 cmd.exe WMIC.exe PID 1988 wrote to memory of 220 1988 cmd.exe WMIC.exe PID 1988 wrote to memory of 220 1988 cmd.exe WMIC.exe PID 1988 wrote to memory of 3316 1988 cmd.exe WMIC.exe PID 1988 wrote to memory of 3316 1988 cmd.exe WMIC.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 1988 wrote to memory of 540 1988 cmd.exe WMIC.exe PID 1988 wrote to memory of 540 1988 cmd.exe WMIC.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 1988 wrote to memory of 2080 1988 cmd.exe WMIC.exe PID 1988 wrote to memory of 2080 1988 cmd.exe WMIC.exe PID 2364 wrote to memory of 4036 2364 6F5B.exe PID 2364 wrote to memory of 4036 2364 6F5B.exe PID 2364 wrote to memory of 4036 2364 6F5B.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 4000 wrote to memory of 3292 4000 1FC3.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe PID 2148 wrote to memory of 2520 2148 14E.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe"C:\Users\Admin\AppData\Local\Temp\E7A7032DDAE1ADFD64C4C378C6E97BE7A2453228C7014.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2612
-
C:\Users\Admin\AppData\Local\Temp\B04D.exeC:\Users\Admin\AppData\Local\Temp\B04D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2932
-
C:\Users\Admin\AppData\Local\Temp\D0C7.exeC:\Users\Admin\AppData\Local\Temp\D0C7.exe1⤵
- Executes dropped EXE
PID:680
-
C:\Users\Admin\AppData\Local\Temp\14E.exeC:\Users\Admin\AppData\Local\Temp\14E.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:2520
-
C:\Users\Admin\AppData\Local\Temp\1FC3.exeC:\Users\Admin\AppData\Local\Temp\1FC3.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:3292
-
C:\Windows\system32\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵PID:3316
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵PID:540
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2148 -ip 21481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4000 -ip 40001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4048
-
C:\Users\Admin\AppData\Local\Temp\6F5B.exeC:\Users\Admin\AppData\Local\Temp\6F5B.exe1⤵
- Executes dropped EXE
PID:4036
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:3400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
06be7147faa9333dde2aa100d7cb3b0c
SHA1e35819d29b2f5d9b63c65c1541eddcd92ac59125
SHA2562f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5
SHA5129bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337
-
MD5
06be7147faa9333dde2aa100d7cb3b0c
SHA1e35819d29b2f5d9b63c65c1541eddcd92ac59125
SHA2562f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5
SHA5129bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337
-
MD5
06be7147faa9333dde2aa100d7cb3b0c
SHA1e35819d29b2f5d9b63c65c1541eddcd92ac59125
SHA2562f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5
SHA5129bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337
-
MD5
06be7147faa9333dde2aa100d7cb3b0c
SHA1e35819d29b2f5d9b63c65c1541eddcd92ac59125
SHA2562f43972540a6cae0eb4e50d142860bdc278b44b9b4606747c58e19383efa82f5
SHA5129bff9210e264cb490d68cc6cc7abfb33c0d3fd5956775415ffaab6ab80dcd394c1a5af1ea9a2fb8996f4b3671f6a8b84837659ef7b69d214d0ea01960f07a337
-
MD5
ff4ab1345cc07c5b050ef5a78eae97ef
SHA1157d19cb5c0f4dd740a57b315f86e5291be139f7
SHA256d9666f203b175e302f2657c0b54b9cf2def99f43cefe78b9e048e689149fdd34
SHA51247a1ffc765b07c9ba9e684a86e841a0ea78280e4371935ececd69e06aca4181c6402b9fe03c3a88746923a0a57480c4f3ed498563110aac411e3dad9e851b45d
-
MD5
ff4ab1345cc07c5b050ef5a78eae97ef
SHA1157d19cb5c0f4dd740a57b315f86e5291be139f7
SHA256d9666f203b175e302f2657c0b54b9cf2def99f43cefe78b9e048e689149fdd34
SHA51247a1ffc765b07c9ba9e684a86e841a0ea78280e4371935ececd69e06aca4181c6402b9fe03c3a88746923a0a57480c4f3ed498563110aac411e3dad9e851b45d
-
MD5
69170f5a7aca115104a5677d1ab86703
SHA13819bb03b3187c1881d203ccda6db2760218b191
SHA2562bbb6025b5031a9df94ad75041457d43ab502c8829c149517fed553172035306
SHA512d6946b7682b18dd38f79cd914f16b83f6d88f924340403043ce4f76a2333fccb5d8f0d51ff0852037526bccc8f5227480120093e82396405982238f34a1d4454
-
MD5
69170f5a7aca115104a5677d1ab86703
SHA13819bb03b3187c1881d203ccda6db2760218b191
SHA2562bbb6025b5031a9df94ad75041457d43ab502c8829c149517fed553172035306
SHA512d6946b7682b18dd38f79cd914f16b83f6d88f924340403043ce4f76a2333fccb5d8f0d51ff0852037526bccc8f5227480120093e82396405982238f34a1d4454
-
MD5
ee0e37deb11cf4a2985c6ed958b13d62
SHA17d8670e51edef13c46a6189734975f43035f601c
SHA256c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94
SHA512bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246
-
MD5
ee0e37deb11cf4a2985c6ed958b13d62
SHA17d8670e51edef13c46a6189734975f43035f601c
SHA256c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94
SHA512bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246