Analysis

  • max time kernel
    301s
  • max time network
    303s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    22-03-2022 10:40

General

  • Target

    3c362636f19b4626866ca745bb197ebcc4f2fab1f2bec6b7f208c0748dc39dcd.exe

  • Size

    2.6MB

  • MD5

    c4cadec9357bec022e6ce6a11f67289c

  • SHA1

    5d4f5f80e946724aadedbd1ea833d5e582e98bd8

  • SHA256

    3c362636f19b4626866ca745bb197ebcc4f2fab1f2bec6b7f208c0748dc39dcd

  • SHA512

    9d113f7681e4304fc30a312aae75f9958a6f0aedba0e5d2830897ecf67fba1c4542fdd9b7b249ea07abe960776526297f356b68e9f8676ce91b33b8f4fc54fb0

Malware Config

Extracted

Family

vidar

Version

39.7

Botnet

933

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    933

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c362636f19b4626866ca745bb197ebcc4f2fab1f2bec6b7f208c0748dc39dcd.exe
    "C:\Users\Admin\AppData\Local\Temp\3c362636f19b4626866ca745bb197ebcc4f2fab1f2bec6b7f208c0748dc39dcd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_7.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_7.exe
          sonia_7.exe
          4⤵
          • Executes dropped EXE
          PID:4576
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_6.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_6.exe
          sonia_6.exe
          4⤵
          • Executes dropped EXE
          PID:4140
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_5.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3868
        • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_5.exe
          sonia_5.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:5104
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_4.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_3.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_3.exe
          sonia_3.exe
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Modifies system certificate store
          PID:3196
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_2.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_2.exe
          sonia_2.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:3644
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sonia_1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 516
        3⤵
        • Program crash
        PID:4676
  • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_4.exe
    sonia_4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2820
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 872 -ip 872
    1⤵
      PID:3972
    • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_1.exe
      sonia_1.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_1.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS023ED12D\sonia_1.exe" -a
        2⤵
        • Executes dropped EXE
        PID:1216
    • C:\Windows\system32\rUNdlL32.eXe
      rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
      1⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Windows\SysWOW64\rundll32.exe
        rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
        2⤵
        • Loads dropped DLL
        PID:976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 608
          3⤵
          • Program crash
          PID:1548
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 976 -ip 976
      1⤵
        PID:1184
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 440 -p 2328 -ip 2328
        1⤵
          PID:3900
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:4004
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
              PID:4808
            • C:\Windows\system32\sihost.exe
              sihost.exe
              1⤵
                PID:668
              • C:\Windows\system32\sihost.exe
                sihost.exe
                1⤵
                  PID:1796
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -pss -s 540 -p 1020 -ip 1020
                  1⤵
                    PID:4968
                  • C:\Windows\system32\dwm.exe
                    "dwm.exe"
                    1⤵
                      PID:3956

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/872-149-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/872-156-0x0000000000400000-0x000000000051D000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/872-190-0x0000000064940000-0x0000000064959000-memory.dmp

                      Filesize

                      100KB

                    • memory/872-160-0x0000000000400000-0x000000000051D000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/872-148-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/872-158-0x0000000000400000-0x000000000051D000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/872-157-0x0000000000400000-0x000000000051D000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/872-189-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/872-155-0x0000000000400000-0x000000000051D000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/872-147-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/872-153-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/872-152-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/872-151-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/872-150-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/872-188-0x0000000000F20000-0x0000000000FAF000-memory.dmp

                      Filesize

                      572KB

                    • memory/872-187-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/872-186-0x000000006B280000-0x000000006B2A6000-memory.dmp

                      Filesize

                      152KB

                    • memory/872-159-0x0000000000400000-0x000000000051D000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/872-154-0x000000006B280000-0x000000006B2A6000-memory.dmp

                      Filesize

                      152KB

                    • memory/872-185-0x0000000000400000-0x000000000051D000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2772-199-0x0000000002A80000-0x0000000002A95000-memory.dmp

                      Filesize

                      84KB

                    • memory/2820-170-0x0000000000960000-0x0000000000968000-memory.dmp

                      Filesize

                      32KB

                    • memory/2820-193-0x000000001B520000-0x000000001B522000-memory.dmp

                      Filesize

                      8KB

                    • memory/2820-191-0x00007FFFED010000-0x00007FFFEDAD1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3196-194-0x00000000048B0000-0x000000000494D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3196-192-0x0000000002EFD000-0x0000000002F61000-memory.dmp

                      Filesize

                      400KB

                    • memory/3196-198-0x0000000000400000-0x0000000002BD7000-memory.dmp

                      Filesize

                      39.8MB

                    • memory/3196-178-0x0000000002EFD000-0x0000000002F61000-memory.dmp

                      Filesize

                      400KB

                    • memory/3644-174-0x0000000002E2D000-0x0000000002E36000-memory.dmp

                      Filesize

                      36KB

                    • memory/3644-195-0x0000000002E2D000-0x0000000002E36000-memory.dmp

                      Filesize

                      36KB

                    • memory/3644-196-0x0000000002C80000-0x0000000002C89000-memory.dmp

                      Filesize

                      36KB

                    • memory/3644-197-0x0000000000400000-0x0000000002B7B000-memory.dmp

                      Filesize

                      39.5MB

                    • memory/5104-176-0x0000000000870000-0x00000000008AE000-memory.dmp

                      Filesize

                      248KB

                    • memory/5104-180-0x00007FFFED010000-0x00007FFFEDAD1000-memory.dmp

                      Filesize

                      10.8MB