Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19-02-2023 14:35
Static task
static1
General
-
Target
994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe
-
Size
229KB
-
MD5
b069ab58cf11b8b11e4414bf5ea4bfe8
-
SHA1
7d66355aec28616d043c6c1d2b8d804a566c9fc2
-
SHA256
994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356
-
SHA512
4b6e9b8a9c830dd45899e3a9deaa9e0f0a0d840421318c5f9509232b7f589f93953d1d7cb46823be7aacc0a9b2a6c99393495f24dd2ced2c6d6bc54db05b12fc
-
SSDEEP
3072:4i9rxR8bLL1PnCsH2EUOWDZKaHfqjUUUU0HKhc6q1EX62Le5umF1K1MfF:txR8bLVCCUOcDHqUUUUg+c6ljLqK1M
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2100-152-0x0000000000740000-0x0000000000749000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
BE7D.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BE7D.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BE7D.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BE7D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BE7D.exe -
Deletes itself 1 IoCs
Processes:
pid process 3040 -
Executes dropped EXE 5 IoCs
Processes:
BE7D.exeC39F.exeCECB.exeD479.exeD9D9.exepid process 3516 BE7D.exe 4848 C39F.exe 4192 CECB.exe 1588 D479.exe 4636 D9D9.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/3516-273-0x0000000000B10000-0x000000000181E000-memory.dmp agile_net behavioral1/memory/3516-283-0x0000000000B10000-0x000000000181E000-memory.dmp agile_net behavioral1/memory/3516-785-0x0000000000B10000-0x000000000181E000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\BE7D.exe themida C:\Users\Admin\AppData\Local\Temp\BE7D.exe themida behavioral1/memory/3516-273-0x0000000000B10000-0x000000000181E000-memory.dmp themida behavioral1/memory/3516-283-0x0000000000B10000-0x000000000181E000-memory.dmp themida behavioral1/memory/3516-785-0x0000000000B10000-0x000000000181E000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
BE7D.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BE7D.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 61 ip-api.com 63 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
D479.exeCECB.exedescription pid process target process PID 1588 set thread context of 3032 1588 D479.exe InstallUtil.exe PID 4192 set thread context of 3012 4192 CECB.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
BE7D.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BE7D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BE7D.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 BE7D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier BE7D.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exepid process 2100 994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe 2100 994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exepid process 2100 994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
BE7D.exeInstallUtil.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 3516 BE7D.exe Token: SeDebugPrivilege 3032 InstallUtil.exe Token: SeSecurityPrivilege 4712 msiexec.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
CECB.exeD479.exedescription pid process target process PID 3040 wrote to memory of 3516 3040 BE7D.exe PID 3040 wrote to memory of 3516 3040 BE7D.exe PID 3040 wrote to memory of 3516 3040 BE7D.exe PID 3040 wrote to memory of 4848 3040 C39F.exe PID 3040 wrote to memory of 4848 3040 C39F.exe PID 3040 wrote to memory of 4192 3040 CECB.exe PID 3040 wrote to memory of 4192 3040 CECB.exe PID 3040 wrote to memory of 4192 3040 CECB.exe PID 3040 wrote to memory of 1588 3040 D479.exe PID 3040 wrote to memory of 1588 3040 D479.exe PID 3040 wrote to memory of 1588 3040 D479.exe PID 4192 wrote to memory of 3012 4192 CECB.exe AppLaunch.exe PID 4192 wrote to memory of 3012 4192 CECB.exe AppLaunch.exe PID 4192 wrote to memory of 3012 4192 CECB.exe AppLaunch.exe PID 4192 wrote to memory of 3012 4192 CECB.exe AppLaunch.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 1588 wrote to memory of 3032 1588 D479.exe InstallUtil.exe PID 3040 wrote to memory of 4636 3040 D9D9.exe PID 3040 wrote to memory of 4636 3040 D9D9.exe PID 4192 wrote to memory of 3012 4192 CECB.exe AppLaunch.exe PID 3040 wrote to memory of 1716 3040 explorer.exe PID 3040 wrote to memory of 1716 3040 explorer.exe PID 3040 wrote to memory of 1716 3040 explorer.exe PID 3040 wrote to memory of 1716 3040 explorer.exe PID 3040 wrote to memory of 5100 3040 explorer.exe PID 3040 wrote to memory of 5100 3040 explorer.exe PID 3040 wrote to memory of 5100 3040 explorer.exe PID 3040 wrote to memory of 4056 3040 explorer.exe PID 3040 wrote to memory of 4056 3040 explorer.exe PID 3040 wrote to memory of 4056 3040 explorer.exe PID 3040 wrote to memory of 4056 3040 explorer.exe PID 3040 wrote to memory of 4752 3040 explorer.exe PID 3040 wrote to memory of 4752 3040 explorer.exe PID 3040 wrote to memory of 4752 3040 explorer.exe PID 3040 wrote to memory of 828 3040 explorer.exe PID 3040 wrote to memory of 828 3040 explorer.exe PID 3040 wrote to memory of 828 3040 explorer.exe PID 3040 wrote to memory of 828 3040 explorer.exe PID 3040 wrote to memory of 2268 3040 explorer.exe PID 3040 wrote to memory of 2268 3040 explorer.exe PID 3040 wrote to memory of 2268 3040 explorer.exe PID 3040 wrote to memory of 2268 3040 explorer.exe PID 3040 wrote to memory of 836 3040 explorer.exe PID 3040 wrote to memory of 836 3040 explorer.exe PID 3040 wrote to memory of 836 3040 explorer.exe PID 3040 wrote to memory of 836 3040 explorer.exe PID 3040 wrote to memory of 2172 3040 explorer.exe PID 3040 wrote to memory of 2172 3040 explorer.exe PID 3040 wrote to memory of 2172 3040 explorer.exe PID 3040 wrote to memory of 1772 3040 explorer.exe PID 3040 wrote to memory of 1772 3040 explorer.exe PID 3040 wrote to memory of 1772 3040 explorer.exe PID 3040 wrote to memory of 1772 3040 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe"C:\Users\Admin\AppData\Local\Temp\994066cac6a6b8221a8ec128a6eca14789f0e3e115311e1e89041aca9df45356.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2100
-
C:\Users\Admin\AppData\Local\Temp\BE7D.exeC:\Users\Admin\AppData\Local\Temp\BE7D.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
C:\Users\Admin\AppData\Local\Temp\C39F.exeC:\Users\Admin\AppData\Local\Temp\C39F.exe1⤵
- Executes dropped EXE
PID:4848
-
C:\Users\Admin\AppData\Local\Temp\CECB.exeC:\Users\Admin\AppData\Local\Temp\CECB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\D479.exeC:\Users\Admin\AppData\Local\Temp\D479.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\D9D9.exeC:\Users\Admin\AppData\Local\Temp\D9D9.exe1⤵
- Executes dropped EXE
PID:4636
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1716
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5100
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4056
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4752
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:828
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2268
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2172
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1772
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5870406ba58703185ab2c177bd7c1ecaf
SHA1e5f688ee7319c5391ccc3215f4cae5323870aca9
SHA256256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e
SHA512f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2
-
Filesize
5.3MB
MD5870406ba58703185ab2c177bd7c1ecaf
SHA1e5f688ee7319c5391ccc3215f4cae5323870aca9
SHA256256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e
SHA512f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
238KB
MD55395fd0cc67d34cc029f212ac41a04b0
SHA1adbf523691a026b836323ab0c0c9f088bbb778c1
SHA2567bf89640b889797c5020c6dc6a9ab7f5befeff84a69323f59fb82ce157aa99bf
SHA512a716a609222b4b41fba9ac11a4297872c2c1023fce739b5e726fb91a30672070804a7ef25e1c8cc5098c78bdae8d16a441917d5de77b1288d9d04096d4192a0e
-
Filesize
238KB
MD55395fd0cc67d34cc029f212ac41a04b0
SHA1adbf523691a026b836323ab0c0c9f088bbb778c1
SHA2567bf89640b889797c5020c6dc6a9ab7f5befeff84a69323f59fb82ce157aa99bf
SHA512a716a609222b4b41fba9ac11a4297872c2c1023fce739b5e726fb91a30672070804a7ef25e1c8cc5098c78bdae8d16a441917d5de77b1288d9d04096d4192a0e
-
Filesize
1.2MB
MD5ac5421f69b815966aca187815f1f64d0
SHA1202d8f4c4ff4bb39c498b08d28629f2a0977e764
SHA256ea55452ae8cc044d9b8fcc52af0d9aabfa72cf4c498d9fb4be7922b1658b68c1
SHA5128f9b2da0fccf1f94b065b186fa080c6198b6cd3ebcbcb8ccdddfcfd0724e879715cff06d4f688c0557384bcefee77b0cdfc6a3b62c0ccfc3085b71dd6620dbb0
-
Filesize
1.2MB
MD5ac5421f69b815966aca187815f1f64d0
SHA1202d8f4c4ff4bb39c498b08d28629f2a0977e764
SHA256ea55452ae8cc044d9b8fcc52af0d9aabfa72cf4c498d9fb4be7922b1658b68c1
SHA5128f9b2da0fccf1f94b065b186fa080c6198b6cd3ebcbcb8ccdddfcfd0724e879715cff06d4f688c0557384bcefee77b0cdfc6a3b62c0ccfc3085b71dd6620dbb0
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be