Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2023 21:51

General

  • Target

    f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe

  • Size

    245KB

  • MD5

    db58fe20918f027a03873fa02d6c8b2e

  • SHA1

    2d57885cc841b38dcd6173369607a895b3dfad8d

  • SHA256

    f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062

  • SHA512

    75462c83355e1117be061072418761bf6bf4a0f7afcbe2d0289362cf2fe487108f78b5a000ef41a71657474cc2da9ed7fecb099d160dbc4d09189ec961bfb2ea

  • SSDEEP

    3072:4E26uUALupyqn/RtpRFaUHb7lZ+1uHIw43KrC001zvoZH6sCKAVUy:zztALupxRnaMbBZfC6rC0oUZasC

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • .NET Reactor proctector 3 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 5 IoCs
  • Obfuscated with Agile.Net obfuscator 3 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Uses the VBS compiler for execution 1 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe
    "C:\Users\Admin\AppData\Local\Temp\f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4784
  • C:\Users\Admin\AppData\Local\Temp\45B4.exe
    C:\Users\Admin\AppData\Local\Temp\45B4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:3596
    • C:\Users\Admin\AppData\Local\Temp\5063.exe
      C:\Users\Admin\AppData\Local\Temp\5063.exe
      1⤵
      • Executes dropped EXE
      PID:1852
    • C:\Users\Admin\AppData\Local\Temp\AF3D.exe
      C:\Users\Admin\AppData\Local\Temp\AF3D.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1936
    • C:\Users\Admin\AppData\Local\Temp\C382.exe
      C:\Users\Admin\AppData\Local\Temp\C382.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4304
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 260
        2⤵
        • Program crash
        PID:3444
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2504 -ip 2504
      1⤵
        PID:2168
      • C:\Users\Admin\AppData\Local\Temp\CC8B.exe
        C:\Users\Admin\AppData\Local\Temp\CC8B.exe
        1⤵
        • Executes dropped EXE
        PID:3436
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:4868
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:4268
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:4260
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:4280
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1212
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:4072
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:2568
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:2932
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:1460

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scripting

                        1
                        T1064

                        Defense Evasion

                        Virtualization/Sandbox Evasion

                        1
                        T1497

                        Scripting

                        1
                        T1064

                        Credential Access

                        Credentials in Files

                        1
                        T1081

                        Discovery

                        Query Registry

                        4
                        T1012

                        Virtualization/Sandbox Evasion

                        1
                        T1497

                        System Information Discovery

                        4
                        T1082

                        Peripheral Device Discovery

                        1
                        T1120

                        Collection

                        Data from Local System

                        1
                        T1005

                        Command and Control

                        Web Service

                        1
                        T1102

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\45B4.exe
                          Filesize

                          8.4MB

                          MD5

                          d38e84427edbc6789f1bb12ae69c6dc5

                          SHA1

                          718aa1778e1ad4a23b53adea4dbabeeb39b89f94

                          SHA256

                          bd4e3e2c455b2322b4b874a319a14c638e6b567c7c1e83edc839ac05aee1a6a4

                          SHA512

                          271966fc13137d5cda7eb9283c3c9c77361dd10d37eef713d0ac9c08326d930c1202d7470f1f2ad9e66f2a798354f09ce846139a8e2ca2b91d7719c215a68948

                        • C:\Users\Admin\AppData\Local\Temp\45B4.exe
                          Filesize

                          8.4MB

                          MD5

                          d38e84427edbc6789f1bb12ae69c6dc5

                          SHA1

                          718aa1778e1ad4a23b53adea4dbabeeb39b89f94

                          SHA256

                          bd4e3e2c455b2322b4b874a319a14c638e6b567c7c1e83edc839ac05aee1a6a4

                          SHA512

                          271966fc13137d5cda7eb9283c3c9c77361dd10d37eef713d0ac9c08326d930c1202d7470f1f2ad9e66f2a798354f09ce846139a8e2ca2b91d7719c215a68948

                        • C:\Users\Admin\AppData\Local\Temp\5063.exe
                          Filesize

                          4KB

                          MD5

                          9748489855d9dd82ab09da5e3e55b19e

                          SHA1

                          6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                          SHA256

                          05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                          SHA512

                          7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                        • C:\Users\Admin\AppData\Local\Temp\5063.exe
                          Filesize

                          4KB

                          MD5

                          9748489855d9dd82ab09da5e3e55b19e

                          SHA1

                          6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                          SHA256

                          05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                          SHA512

                          7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                        • C:\Users\Admin\AppData\Local\Temp\AF3D.exe
                          Filesize

                          5.3MB

                          MD5

                          870406ba58703185ab2c177bd7c1ecaf

                          SHA1

                          e5f688ee7319c5391ccc3215f4cae5323870aca9

                          SHA256

                          256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e

                          SHA512

                          f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2

                        • C:\Users\Admin\AppData\Local\Temp\AF3D.exe
                          Filesize

                          5.3MB

                          MD5

                          870406ba58703185ab2c177bd7c1ecaf

                          SHA1

                          e5f688ee7319c5391ccc3215f4cae5323870aca9

                          SHA256

                          256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e

                          SHA512

                          f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2

                        • C:\Users\Admin\AppData\Local\Temp\C382.exe
                          Filesize

                          1.1MB

                          MD5

                          b5cd4deb250cbeda544d8622d7ed90bf

                          SHA1

                          d8f784eba044a176e935cd6bc9a97d346a810c98

                          SHA256

                          8f4b3502e38100486b960ef7d7aea1c43ba2ba38f5d31439b1ae9324c3f43621

                          SHA512

                          1a828445c797a4af0279eb2d0ba2e973b2768da5eeec6ebc42c104a1bf689268798380b8da2496757d7ee0e61f10cadadc7369fb5cb535d13260d7721562f2ae

                        • C:\Users\Admin\AppData\Local\Temp\C382.exe
                          Filesize

                          1.1MB

                          MD5

                          b5cd4deb250cbeda544d8622d7ed90bf

                          SHA1

                          d8f784eba044a176e935cd6bc9a97d346a810c98

                          SHA256

                          8f4b3502e38100486b960ef7d7aea1c43ba2ba38f5d31439b1ae9324c3f43621

                          SHA512

                          1a828445c797a4af0279eb2d0ba2e973b2768da5eeec6ebc42c104a1bf689268798380b8da2496757d7ee0e61f10cadadc7369fb5cb535d13260d7721562f2ae

                        • C:\Users\Admin\AppData\Local\Temp\CC8B.exe
                          Filesize

                          4KB

                          MD5

                          9748489855d9dd82ab09da5e3e55b19e

                          SHA1

                          6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                          SHA256

                          05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                          SHA512

                          7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                        • C:\Users\Admin\AppData\Local\Temp\CC8B.exe
                          Filesize

                          4KB

                          MD5

                          9748489855d9dd82ab09da5e3e55b19e

                          SHA1

                          6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                          SHA256

                          05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                          SHA512

                          7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                        • memory/1212-202-0x0000000000F90000-0x0000000000FB7000-memory.dmp
                          Filesize

                          156KB

                        • memory/1212-201-0x0000000000FC0000-0x0000000000FE2000-memory.dmp
                          Filesize

                          136KB

                        • memory/1212-200-0x0000000000000000-mapping.dmp
                        • memory/1212-219-0x0000000000FC0000-0x0000000000FE2000-memory.dmp
                          Filesize

                          136KB

                        • memory/1460-222-0x0000000000420000-0x0000000000428000-memory.dmp
                          Filesize

                          32KB

                        • memory/1460-213-0x0000000000000000-mapping.dmp
                        • memory/1460-214-0x0000000000420000-0x0000000000428000-memory.dmp
                          Filesize

                          32KB

                        • memory/1460-215-0x0000000000410000-0x000000000041B000-memory.dmp
                          Filesize

                          44KB

                        • memory/1852-146-0x0000000000000000-mapping.dmp
                        • memory/1852-149-0x0000000000CA0000-0x0000000000CA8000-memory.dmp
                          Filesize

                          32KB

                        • memory/1852-150-0x00007FFA046C0000-0x00007FFA05181000-memory.dmp
                          Filesize

                          10.8MB

                        • memory/1936-160-0x0000000000170000-0x0000000000E7E000-memory.dmp
                          Filesize

                          13.1MB

                        • memory/1936-153-0x0000000000000000-mapping.dmp
                        • memory/1936-156-0x0000000000170000-0x0000000000E7E000-memory.dmp
                          Filesize

                          13.1MB

                        • memory/1936-159-0x0000000000170000-0x0000000000E7E000-memory.dmp
                          Filesize

                          13.1MB

                        • memory/1936-178-0x0000000007290000-0x0000000007834000-memory.dmp
                          Filesize

                          5.6MB

                        • memory/1936-161-0x00000000056E0000-0x0000000005746000-memory.dmp
                          Filesize

                          408KB

                        • memory/1936-203-0x0000000000170000-0x0000000000E7E000-memory.dmp
                          Filesize

                          13.1MB

                        • memory/1936-176-0x0000000006C40000-0x0000000006CD2000-memory.dmp
                          Filesize

                          584KB

                        • memory/1936-184-0x0000000000170000-0x0000000000E7E000-memory.dmp
                          Filesize

                          13.1MB

                        • memory/2504-162-0x0000000000000000-mapping.dmp
                        • memory/2504-175-0x0000000000680000-0x0000000000798000-memory.dmp
                          Filesize

                          1.1MB

                        • memory/2568-221-0x0000000000DC0000-0x0000000000DC6000-memory.dmp
                          Filesize

                          24KB

                        • memory/2568-209-0x0000000000DB0000-0x0000000000DBB000-memory.dmp
                          Filesize

                          44KB

                        • memory/2568-208-0x0000000000DC0000-0x0000000000DC6000-memory.dmp
                          Filesize

                          24KB

                        • memory/2568-207-0x0000000000000000-mapping.dmp
                        • memory/2740-139-0x0000000000BF0000-0x0000000001466000-memory.dmp
                          Filesize

                          8.5MB

                        • memory/2740-141-0x00007FFA046C0000-0x00007FFA05181000-memory.dmp
                          Filesize

                          10.8MB

                        • memory/2740-136-0x0000000000000000-mapping.dmp
                        • memory/2740-145-0x00007FFA046C0000-0x00007FFA05181000-memory.dmp
                          Filesize

                          10.8MB

                        • memory/2932-210-0x0000000000000000-mapping.dmp
                        • memory/2932-212-0x0000000000370000-0x000000000037D000-memory.dmp
                          Filesize

                          52KB

                        • memory/2932-211-0x0000000000380000-0x0000000000387000-memory.dmp
                          Filesize

                          28KB

                        • memory/3436-181-0x00007FFA046C0000-0x00007FFA05181000-memory.dmp
                          Filesize

                          10.8MB

                        • memory/3436-177-0x0000000000000000-mapping.dmp
                        • memory/3596-142-0x00000000004088B8-mapping.dmp
                        • memory/3596-140-0x0000000000400000-0x000000000041D000-memory.dmp
                          Filesize

                          116KB

                        • memory/3596-152-0x0000000000400000-0x000000000041D000-memory.dmp
                          Filesize

                          116KB

                        • memory/3596-144-0x0000000000400000-0x000000000041D000-memory.dmp
                          Filesize

                          116KB

                        • memory/3596-151-0x0000000000400000-0x000000000041D000-memory.dmp
                          Filesize

                          116KB

                        • memory/4072-204-0x0000000000000000-mapping.dmp
                        • memory/4072-205-0x0000000000810000-0x0000000000815000-memory.dmp
                          Filesize

                          20KB

                        • memory/4072-206-0x0000000000800000-0x0000000000809000-memory.dmp
                          Filesize

                          36KB

                        • memory/4072-220-0x0000000000810000-0x0000000000815000-memory.dmp
                          Filesize

                          20KB

                        • memory/4260-191-0x0000000000000000-mapping.dmp
                        • memory/4260-193-0x0000000000390000-0x0000000000395000-memory.dmp
                          Filesize

                          20KB

                        • memory/4260-194-0x0000000000380000-0x0000000000389000-memory.dmp
                          Filesize

                          36KB

                        • memory/4260-217-0x0000000000390000-0x0000000000395000-memory.dmp
                          Filesize

                          20KB

                        • memory/4268-187-0x00000000009B0000-0x00000000009B9000-memory.dmp
                          Filesize

                          36KB

                        • memory/4268-183-0x0000000000000000-mapping.dmp
                        • memory/4268-188-0x00000000009A0000-0x00000000009AF000-memory.dmp
                          Filesize

                          60KB

                        • memory/4280-198-0x0000000000310000-0x0000000000316000-memory.dmp
                          Filesize

                          24KB

                        • memory/4280-199-0x0000000000300000-0x000000000030C000-memory.dmp
                          Filesize

                          48KB

                        • memory/4280-197-0x0000000000000000-mapping.dmp
                        • memory/4280-218-0x0000000000310000-0x0000000000316000-memory.dmp
                          Filesize

                          24KB

                        • memory/4304-192-0x0000000006A70000-0x0000000006AC0000-memory.dmp
                          Filesize

                          320KB

                        • memory/4304-173-0x0000000005020000-0x000000000512A000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/4304-189-0x00000000069F0000-0x0000000006A66000-memory.dmp
                          Filesize

                          472KB

                        • memory/4304-195-0x0000000006C90000-0x0000000006E52000-memory.dmp
                          Filesize

                          1.8MB

                        • memory/4304-165-0x0000000000000000-mapping.dmp
                        • memory/4304-166-0x00000000007C0000-0x0000000000804000-memory.dmp
                          Filesize

                          272KB

                        • memory/4304-171-0x00000000054F0000-0x0000000005B08000-memory.dmp
                          Filesize

                          6.1MB

                        • memory/4304-196-0x0000000007A50000-0x0000000007F7C000-memory.dmp
                          Filesize

                          5.2MB

                        • memory/4304-172-0x0000000004EF0000-0x0000000004F02000-memory.dmp
                          Filesize

                          72KB

                        • memory/4304-190-0x0000000006210000-0x000000000622E000-memory.dmp
                          Filesize

                          120KB

                        • memory/4304-174-0x0000000004F50000-0x0000000004F8C000-memory.dmp
                          Filesize

                          240KB

                        • memory/4784-134-0x0000000000400000-0x0000000000467000-memory.dmp
                          Filesize

                          412KB

                        • memory/4784-133-0x00000000021A0000-0x00000000021A9000-memory.dmp
                          Filesize

                          36KB

                        • memory/4784-132-0x000000000059C000-0x00000000005B1000-memory.dmp
                          Filesize

                          84KB

                        • memory/4784-135-0x0000000000400000-0x0000000000467000-memory.dmp
                          Filesize

                          412KB

                        • memory/4868-216-0x0000000000730000-0x0000000000737000-memory.dmp
                          Filesize

                          28KB

                        • memory/4868-182-0x0000000000000000-mapping.dmp
                        • memory/4868-185-0x0000000000730000-0x0000000000737000-memory.dmp
                          Filesize

                          28KB

                        • memory/4868-186-0x0000000000720000-0x000000000072B000-memory.dmp
                          Filesize

                          44KB