Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    22-02-2022 17:42

General

  • Target

    0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8.exe

  • Size

    267KB

  • MD5

    5478d0872828e7cc05b8c3d59877de57

  • SHA1

    b8a74db005723b3431825d188ea7a03c5f7116c9

  • SHA256

    0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8

  • SHA512

    c09553be0d69e75bed30c572a98dc86c5373c2adbedb7be31d1fc1a45b66020b24830be1bdad077015394d8ddc40c9fdeaa687fb91e000a9764b5f5a0a7c08b2

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://dollybuster.at/upload/

http://spaldingcompanies.com/upload/

http://remik-franchise.ru/upload/

http://fennsports.com/upload/

http://am1420wbec.com/upload/

http://islamic-city.com/upload/

http://egsagl.com/upload/

http://mordo.ru/upload/

http://piratia-life.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

1843818144

C2

grendafolz.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • IcedID First Stage Loader 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 42 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8.exe
    "C:\Users\Admin\AppData\Local\Temp\0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2028
  • C:\Users\Admin\AppData\Local\Temp\9EAF.exe
    C:\Users\Admin\AppData\Local\Temp\9EAF.exe
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1484 -s 884
      2⤵
      • Loads dropped DLL
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:896
  • C:\Users\Admin\AppData\Local\Temp\CD3F.exe
    C:\Users\Admin\AppData\Local\Temp\CD3F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:1912
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      PID:2012
  • C:\Users\Admin\AppData\Local\Temp\E736.exe
    C:\Users\Admin\AppData\Local\Temp\E736.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:576
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • outlook_office_path
      • outlook_win_path
      PID:812
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14109
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9EAF.exe

    MD5

    ee0e37deb11cf4a2985c6ed958b13d62

    SHA1

    7d8670e51edef13c46a6189734975f43035f601c

    SHA256

    c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

    SHA512

    bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

  • C:\Users\Admin\AppData\Local\Temp\9EAF.exe

    MD5

    ee0e37deb11cf4a2985c6ed958b13d62

    SHA1

    7d8670e51edef13c46a6189734975f43035f601c

    SHA256

    c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

    SHA512

    bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

  • C:\Users\Admin\AppData\Local\Temp\Aeesafyftaohi.tmp

    MD5

    748bbd8633ad346381c0ae69be3a0ca3

    SHA1

    307a99df0a4ca1c550b536d79574497b4b3163eb

    SHA256

    25869e4d0fa9fcfb2446560efe9d2ef6cae8f334508d1ba7cea5e539517e40a9

    SHA512

    7a02ba4eb28a6985b2d4c95fe7ff9cbbc42f93a68db247ef8f58a13fc6b283dd79c594f5b7b5f3b9efc1adedc2d19b476031297bf794cd03c23ce59ad475fca7

  • C:\Users\Admin\AppData\Local\Temp\Aeesafyftaohi.tmp

    MD5

    748bbd8633ad346381c0ae69be3a0ca3

    SHA1

    307a99df0a4ca1c550b536d79574497b4b3163eb

    SHA256

    25869e4d0fa9fcfb2446560efe9d2ef6cae8f334508d1ba7cea5e539517e40a9

    SHA512

    7a02ba4eb28a6985b2d4c95fe7ff9cbbc42f93a68db247ef8f58a13fc6b283dd79c594f5b7b5f3b9efc1adedc2d19b476031297bf794cd03c23ce59ad475fca7

  • C:\Users\Admin\AppData\Local\Temp\CD3F.exe

    MD5

    e301c4e88d2ef3c3a79f12c47d2db55e

    SHA1

    5d3904b9cba99d8b643ddf1f6ada00aae3133353

    SHA256

    bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

    SHA512

    d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

  • C:\Users\Admin\AppData\Local\Temp\CD3F.exe

    MD5

    e301c4e88d2ef3c3a79f12c47d2db55e

    SHA1

    5d3904b9cba99d8b643ddf1f6ada00aae3133353

    SHA256

    bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

    SHA512

    d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

  • C:\Users\Admin\AppData\Local\Temp\E736.exe

    MD5

    e301c4e88d2ef3c3a79f12c47d2db55e

    SHA1

    5d3904b9cba99d8b643ddf1f6ada00aae3133353

    SHA256

    bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

    SHA512

    d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

  • C:\Users\Admin\AppData\Local\Temp\E736.exe

    MD5

    e301c4e88d2ef3c3a79f12c47d2db55e

    SHA1

    5d3904b9cba99d8b643ddf1f6ada00aae3133353

    SHA256

    bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

    SHA512

    d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

  • \Users\Admin\AppData\Local\Temp\9EAF.exe

    MD5

    ee0e37deb11cf4a2985c6ed958b13d62

    SHA1

    7d8670e51edef13c46a6189734975f43035f601c

    SHA256

    c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

    SHA512

    bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

  • \Users\Admin\AppData\Local\Temp\9EAF.exe

    MD5

    ee0e37deb11cf4a2985c6ed958b13d62

    SHA1

    7d8670e51edef13c46a6189734975f43035f601c

    SHA256

    c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

    SHA512

    bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

  • \Users\Admin\AppData\Local\Temp\9EAF.exe

    MD5

    ee0e37deb11cf4a2985c6ed958b13d62

    SHA1

    7d8670e51edef13c46a6189734975f43035f601c

    SHA256

    c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

    SHA512

    bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

  • \Users\Admin\AppData\Local\Temp\9EAF.exe

    MD5

    ee0e37deb11cf4a2985c6ed958b13d62

    SHA1

    7d8670e51edef13c46a6189734975f43035f601c

    SHA256

    c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

    SHA512

    bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

  • memory/576-149-0x0000000000120000-0x0000000000123000-memory.dmp

    Filesize

    12KB

  • memory/576-148-0x00000000000D0000-0x00000000000D3000-memory.dmp

    Filesize

    12KB

  • memory/576-150-0x0000000000130000-0x0000000000133000-memory.dmp

    Filesize

    12KB

  • memory/576-146-0x00000000000B0000-0x00000000000B3000-memory.dmp

    Filesize

    12KB

  • memory/576-111-0x0000000000210000-0x0000000000213000-memory.dmp

    Filesize

    12KB

  • memory/576-147-0x00000000000C0000-0x00000000000C3000-memory.dmp

    Filesize

    12KB

  • memory/576-144-0x0000000000090000-0x0000000000093000-memory.dmp

    Filesize

    12KB

  • memory/576-145-0x00000000000A0000-0x00000000000A3000-memory.dmp

    Filesize

    12KB

  • memory/576-142-0x0000000000080000-0x0000000000083000-memory.dmp

    Filesize

    12KB

  • memory/576-143-0x0000000075410000-0x0000000075411000-memory.dmp

    Filesize

    4KB

  • memory/576-112-0x0000000000210000-0x0000000000213000-memory.dmp

    Filesize

    12KB

  • memory/632-220-0x00000000029D0000-0x00000000029D1000-memory.dmp

    Filesize

    4KB

  • memory/632-73-0x0000000000740000-0x0000000000820000-memory.dmp

    Filesize

    896KB

  • memory/632-223-0x0000000002960000-0x0000000002961000-memory.dmp

    Filesize

    4KB

  • memory/632-154-0x0000000002B20000-0x000000000356B000-memory.dmp

    Filesize

    10.3MB

  • memory/632-218-0x0000000003737000-0x0000000003738000-memory.dmp

    Filesize

    4KB

  • memory/632-72-0x0000000000400000-0x0000000000735000-memory.dmp

    Filesize

    3.2MB

  • memory/632-89-0x000000007779F000-0x00000000777A0000-memory.dmp

    Filesize

    4KB

  • memory/632-74-0x00000000020D0000-0x00000000022F9000-memory.dmp

    Filesize

    2.2MB

  • memory/632-75-0x0000000000400000-0x0000000000635000-memory.dmp

    Filesize

    2.2MB

  • memory/632-213-0x00000000036D0000-0x00000000036D1000-memory.dmp

    Filesize

    4KB

  • memory/632-76-0x00000000005E9000-0x00000000005F2000-memory.dmp

    Filesize

    36KB

  • memory/632-156-0x0000000002B21000-0x000000000356B000-memory.dmp

    Filesize

    10.3MB

  • memory/632-206-0x00000000777A0000-0x00000000777A1000-memory.dmp

    Filesize

    4KB

  • memory/632-184-0x0000000003325000-0x0000000003326000-memory.dmp

    Filesize

    4KB

  • memory/632-166-0x0000000002B20000-0x000000000356B000-memory.dmp

    Filesize

    10.3MB

  • memory/632-165-0x0000000003780000-0x0000000003781000-memory.dmp

    Filesize

    4KB

  • memory/632-159-0x0000000002B20000-0x000000000356B000-memory.dmp

    Filesize

    10.3MB

  • memory/632-160-0x000000007779F000-0x00000000777A0000-memory.dmp

    Filesize

    4KB

  • memory/812-230-0x0000000002EE5000-0x0000000002EE6000-memory.dmp

    Filesize

    4KB

  • memory/812-214-0x000000007779F000-0x00000000777A0000-memory.dmp

    Filesize

    4KB

  • memory/812-215-0x00000000026E0000-0x000000000312B000-memory.dmp

    Filesize

    10.3MB

  • memory/812-226-0x000000000336E000-0x000000000336F000-memory.dmp

    Filesize

    4KB

  • memory/812-225-0x0000000003307000-0x0000000003308000-memory.dmp

    Filesize

    4KB

  • memory/812-217-0x0000000000B60000-0x0000000000B61000-memory.dmp

    Filesize

    4KB

  • memory/812-212-0x0000000000230000-0x0000000000B5B000-memory.dmp

    Filesize

    9.2MB

  • memory/896-70-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/896-64-0x000007FEFBE21000-0x000007FEFBE23000-memory.dmp

    Filesize

    8KB

  • memory/1416-60-0x00000000025A0000-0x00000000025B6000-memory.dmp

    Filesize

    88KB

  • memory/1484-63-0x00000000003E0000-0x00000000003EB000-memory.dmp

    Filesize

    44KB

  • memory/1500-249-0x0000000000200000-0x00000000003E3000-memory.dmp

    Filesize

    1.9MB

  • memory/1500-250-0x0000000001F10000-0x0000000002102000-memory.dmp

    Filesize

    1.9MB

  • memory/1912-78-0x0000000000280000-0x0000000000282000-memory.dmp

    Filesize

    8KB

  • memory/1912-121-0x0000000000100000-0x0000000000102000-memory.dmp

    Filesize

    8KB

  • memory/1912-79-0x0000000000280000-0x0000000000282000-memory.dmp

    Filesize

    8KB

  • memory/1912-106-0x00000000000C0000-0x00000000000C2000-memory.dmp

    Filesize

    8KB

  • memory/1912-107-0x0000000077790000-0x0000000077791000-memory.dmp

    Filesize

    4KB

  • memory/1912-132-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/1912-130-0x0000000000150000-0x0000000000152000-memory.dmp

    Filesize

    8KB

  • memory/1912-108-0x0000000075410000-0x0000000075411000-memory.dmp

    Filesize

    4KB

  • memory/1912-129-0x0000000000140000-0x0000000000142000-memory.dmp

    Filesize

    8KB

  • memory/1912-115-0x00000000000D0000-0x00000000000D2000-memory.dmp

    Filesize

    8KB

  • memory/1912-127-0x0000000000130000-0x0000000000132000-memory.dmp

    Filesize

    8KB

  • memory/1912-117-0x00000000000E0000-0x00000000000E2000-memory.dmp

    Filesize

    8KB

  • memory/1912-125-0x0000000000120000-0x0000000000122000-memory.dmp

    Filesize

    8KB

  • memory/1912-119-0x00000000000F0000-0x00000000000F2000-memory.dmp

    Filesize

    8KB

  • memory/1912-123-0x0000000000110000-0x0000000000112000-memory.dmp

    Filesize

    8KB

  • memory/2012-231-0x0000000002ED5000-0x0000000002ED6000-memory.dmp

    Filesize

    4KB

  • memory/2012-228-0x00000000026D0000-0x000000000311B000-memory.dmp

    Filesize

    10.3MB

  • memory/2012-229-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/2012-227-0x000000007779F000-0x00000000777A0000-memory.dmp

    Filesize

    4KB

  • memory/2012-224-0x00000000001E0000-0x0000000000B0B000-memory.dmp

    Filesize

    9.2MB

  • memory/2012-236-0x0000000003447000-0x0000000003448000-memory.dmp

    Filesize

    4KB

  • memory/2028-55-0x000000000065D000-0x000000000066E000-memory.dmp

    Filesize

    68KB

  • memory/2028-58-0x0000000000220000-0x0000000000229000-memory.dmp

    Filesize

    36KB

  • memory/2028-57-0x000000000065D000-0x000000000066E000-memory.dmp

    Filesize

    68KB

  • memory/2028-59-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2028-56-0x0000000076731000-0x0000000076733000-memory.dmp

    Filesize

    8KB

  • memory/2036-158-0x0000000002B00000-0x000000000354B000-memory.dmp

    Filesize

    10.3MB

  • memory/2036-186-0x0000000003305000-0x0000000003306000-memory.dmp

    Filesize

    4KB

  • memory/2036-216-0x0000000002320000-0x0000000002321000-memory.dmp

    Filesize

    4KB

  • memory/2036-164-0x0000000002B00000-0x000000000354B000-memory.dmp

    Filesize

    10.3MB

  • memory/2036-209-0x00000000036B0000-0x00000000036B1000-memory.dmp

    Filesize

    4KB

  • memory/2036-189-0x00000000777A0000-0x00000000777A1000-memory.dmp

    Filesize

    4KB

  • memory/2036-208-0x00000000038C7000-0x00000000038C8000-memory.dmp

    Filesize

    4KB

  • memory/2036-207-0x0000000003860000-0x0000000003861000-memory.dmp

    Filesize

    4KB

  • memory/2036-163-0x0000000003660000-0x0000000003661000-memory.dmp

    Filesize

    4KB

  • memory/2036-109-0x0000000000400000-0x0000000000735000-memory.dmp

    Filesize

    3.2MB

  • memory/2036-157-0x0000000002B01000-0x000000000354B000-memory.dmp

    Filesize

    10.3MB

  • memory/2036-135-0x0000000000400000-0x0000000000635000-memory.dmp

    Filesize

    2.2MB

  • memory/2036-155-0x0000000002B00000-0x000000000354B000-memory.dmp

    Filesize

    10.3MB