Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/02/2023, 13:34

General

  • Target

    file.exe

  • Size

    314KB

  • MD5

    5cff4c33cbc6e1ccf53952ac54aef16c

  • SHA1

    ec660378cc11724e3914b9f8faec488fc228573b

  • SHA256

    f4b9bed143b714df0405531aa041fe29bfdecc5e10cfe97002687217fd95cc11

  • SHA512

    4ed147624483079a6c9276603f8ea662bb89e34dbdaacce451c86090241862ac46e38f3be7dc883d6574484b28062c0d13f387051d1cd42afe78f122c0557a9a

  • SSDEEP

    3072:Lwz0dZZ+B7uOuRpm8fOCbKyEWIcXqjyYFYaTmRLStKRxhUwEbj:Lu0byubph2qErcQHmgtKBEX

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ad75d4e2e9636ca662a337b6e798d36159f23acfc89bbe9400d0d451bd8d69fd

Signatures

  • Detects Smokeloader packer 1 IoCs
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4732
  • C:\Users\Admin\AppData\Local\Temp\C7E8.exe
    C:\Users\Admin\AppData\Local\Temp\C7E8.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
      2⤵
      • Creates scheduled task(s)
      PID:4348
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 1028
      2⤵
      • Program crash
      PID:4340
  • C:\Users\Admin\AppData\Local\Temp\C8C4.exe
    C:\Users\Admin\AppData\Local\Temp\C8C4.exe
    1⤵
    • Executes dropped EXE
    PID:1124
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3924 -ip 3924
    1⤵
      PID:4700
    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
      C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
      1⤵
      • Executes dropped EXE
      PID:260

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\C7E8.exe

      Filesize

      378KB

      MD5

      b141bc58618c537917cc1da179cbe8ab

      SHA1

      c76d3f5eeae9493e41a272a974b5dfec5f4e4724

      SHA256

      fd999e4a07d8b3d95f9d9231fd496b0125b56094f1b03ddca7a7b074c1d8c03e

      SHA512

      5c72f63124a394602a36a4f985e33a41e8159f54653f431c270b8f0fa8e13131517c31b497a936d5f5d3d27397f40fc7909efc4bfd04c01bcca7f306860c3114

    • C:\Users\Admin\AppData\Local\Temp\C7E8.exe

      Filesize

      378KB

      MD5

      b141bc58618c537917cc1da179cbe8ab

      SHA1

      c76d3f5eeae9493e41a272a974b5dfec5f4e4724

      SHA256

      fd999e4a07d8b3d95f9d9231fd496b0125b56094f1b03ddca7a7b074c1d8c03e

      SHA512

      5c72f63124a394602a36a4f985e33a41e8159f54653f431c270b8f0fa8e13131517c31b497a936d5f5d3d27397f40fc7909efc4bfd04c01bcca7f306860c3114

    • C:\Users\Admin\AppData\Local\Temp\C8C4.exe

      Filesize

      172KB

      MD5

      185596291815d84f3894dbeef5ea54e7

      SHA1

      6ff9c5982d02187a4e9961a98ab490ba479ed8e2

      SHA256

      3d723b2eac949a522f1d0d48d060a528cb275ae14803762200a760fdf9720e11

      SHA512

      99f61314609ce59795d7dce5c17a1564a18613d8babe242d192b83911c8baf0f746067e9aee08609da5f0d5514cb761c1364859f082bc1d18c6ecc7208f28eb5

    • C:\Users\Admin\AppData\Local\Temp\C8C4.exe

      Filesize

      172KB

      MD5

      185596291815d84f3894dbeef5ea54e7

      SHA1

      6ff9c5982d02187a4e9961a98ab490ba479ed8e2

      SHA256

      3d723b2eac949a522f1d0d48d060a528cb275ae14803762200a760fdf9720e11

      SHA512

      99f61314609ce59795d7dce5c17a1564a18613d8babe242d192b83911c8baf0f746067e9aee08609da5f0d5514cb761c1364859f082bc1d18c6ecc7208f28eb5

    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

      Filesize

      747.4MB

      MD5

      06d290c306dd0d78e93a2ce9c3428a50

      SHA1

      016e0546266eb88c519e7674235e4727e2369099

      SHA256

      e3b1b5df5a6ff64043e8d7d3bf33a89f2725bc8173f5ece656a195e941c4bb23

      SHA512

      34f50d6957f4dffbda007889cd8ab4efbe716fb934c3d8da3e3c26af8bc65d49a51b06c0ec8f1a12d4098b8ba9f7c8a3ff274d3c356d697e2796a53c8daa6665

    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

      Filesize

      747.4MB

      MD5

      06d290c306dd0d78e93a2ce9c3428a50

      SHA1

      016e0546266eb88c519e7674235e4727e2369099

      SHA256

      e3b1b5df5a6ff64043e8d7d3bf33a89f2725bc8173f5ece656a195e941c4bb23

      SHA512

      34f50d6957f4dffbda007889cd8ab4efbe716fb934c3d8da3e3c26af8bc65d49a51b06c0ec8f1a12d4098b8ba9f7c8a3ff274d3c356d697e2796a53c8daa6665

    • memory/260-156-0x0000000000707000-0x0000000000731000-memory.dmp

      Filesize

      168KB

    • memory/260-157-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/260-158-0x0000000000707000-0x0000000000731000-memory.dmp

      Filesize

      168KB

    • memory/1124-147-0x0000000000BB0000-0x0000000000BBD000-memory.dmp

      Filesize

      52KB

    • memory/1124-143-0x0000000000240000-0x000000000024E000-memory.dmp

      Filesize

      56KB

    • memory/1124-142-0x00000000003D0000-0x00000000003E1000-memory.dmp

      Filesize

      68KB

    • memory/1124-153-0x0000000000240000-0x000000000024E000-memory.dmp

      Filesize

      56KB

    • memory/3924-144-0x0000000000659000-0x0000000000683000-memory.dmp

      Filesize

      168KB

    • memory/3924-146-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/3924-151-0x0000000000659000-0x0000000000683000-memory.dmp

      Filesize

      168KB

    • memory/3924-152-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/3924-145-0x00000000005D0000-0x0000000000617000-memory.dmp

      Filesize

      284KB

    • memory/4732-132-0x000000000076F000-0x0000000000784000-memory.dmp

      Filesize

      84KB

    • memory/4732-135-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4732-134-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4732-133-0x0000000000720000-0x0000000000729000-memory.dmp

      Filesize

      36KB