Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 08:45
Static task
static1
Behavioral task
behavioral1
Sample
60d52e13d49f75155b26c170f5a2ec5f.exe
Resource
win7-20231215-en
General
-
Target
60d52e13d49f75155b26c170f5a2ec5f.exe
-
Size
1.5MB
-
MD5
60d52e13d49f75155b26c170f5a2ec5f
-
SHA1
cf6a04d46a3408780e413c3d11dbea4c11571883
-
SHA256
3bc711bf1d32038cdcbbc7ff61228d50e05612cc33a8dcb271d6202f90ae4c6e
-
SHA512
ceca0427a8305f4f913d5c7dcc2bc11380cbbc7e49ff97e6fd501e82c8ade94e2e67f926f66ef12ef3dd882466a577fdb3d77e9b00a9c96968795cd05d7345e6
-
SSDEEP
24576:Eg5soYT1zAoaJ2sw5TCVUPCSHmHscNLx07XiNkvV+yhYL0xs5yDxa5/AAp93Ru6:EgboUJwJCV4CSFcNLwyNQkyhYLQL1GH1
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
smokeloader
pub6
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" karotima_1.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
resource yara_rule behavioral1/files/0x0006000000015ce7-28.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 2516 setup_installer.exe 2088 setup_install.exe 2188 karotima_2.exe 2408 karotima_1.exe -
Loads dropped DLL 27 IoCs
pid Process 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 2516 setup_installer.exe 2516 setup_installer.exe 2516 setup_installer.exe 2516 setup_installer.exe 2516 setup_installer.exe 2516 setup_installer.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2088 setup_install.exe 2692 cmd.exe 2692 cmd.exe 2188 karotima_2.exe 2188 karotima_2.exe 2676 cmd.exe 2408 karotima_1.exe 2408 karotima_1.exe 2188 karotima_2.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io 4 ipinfo.io 11 api.db-ip.com 12 api.db-ip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 320 2088 WerFault.exe 23 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI karotima_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI karotima_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI karotima_2.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 karotima_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 karotima_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 karotima_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 karotima_1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 karotima_2.exe 2188 karotima_2.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2188 karotima_2.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2516 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 24 PID 2896 wrote to memory of 2516 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 24 PID 2896 wrote to memory of 2516 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 24 PID 2896 wrote to memory of 2516 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 24 PID 2896 wrote to memory of 2516 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 24 PID 2896 wrote to memory of 2516 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 24 PID 2896 wrote to memory of 2516 2896 60d52e13d49f75155b26c170f5a2ec5f.exe 24 PID 2516 wrote to memory of 2088 2516 setup_installer.exe 23 PID 2516 wrote to memory of 2088 2516 setup_installer.exe 23 PID 2516 wrote to memory of 2088 2516 setup_installer.exe 23 PID 2516 wrote to memory of 2088 2516 setup_installer.exe 23 PID 2516 wrote to memory of 2088 2516 setup_installer.exe 23 PID 2516 wrote to memory of 2088 2516 setup_installer.exe 23 PID 2516 wrote to memory of 2088 2516 setup_installer.exe 23 PID 2088 wrote to memory of 2676 2088 setup_install.exe 21 PID 2088 wrote to memory of 2676 2088 setup_install.exe 21 PID 2088 wrote to memory of 2676 2088 setup_install.exe 21 PID 2088 wrote to memory of 2676 2088 setup_install.exe 21 PID 2088 wrote to memory of 2676 2088 setup_install.exe 21 PID 2088 wrote to memory of 2676 2088 setup_install.exe 21 PID 2088 wrote to memory of 2676 2088 setup_install.exe 21 PID 2088 wrote to memory of 2692 2088 setup_install.exe 18 PID 2088 wrote to memory of 2692 2088 setup_install.exe 18 PID 2088 wrote to memory of 2692 2088 setup_install.exe 18 PID 2088 wrote to memory of 2692 2088 setup_install.exe 18 PID 2088 wrote to memory of 2692 2088 setup_install.exe 18 PID 2088 wrote to memory of 2692 2088 setup_install.exe 18 PID 2088 wrote to memory of 2692 2088 setup_install.exe 18 PID 2692 wrote to memory of 2188 2692 cmd.exe 20 PID 2692 wrote to memory of 2188 2692 cmd.exe 20 PID 2692 wrote to memory of 2188 2692 cmd.exe 20 PID 2692 wrote to memory of 2188 2692 cmd.exe 20 PID 2692 wrote to memory of 2188 2692 cmd.exe 20 PID 2692 wrote to memory of 2188 2692 cmd.exe 20 PID 2692 wrote to memory of 2188 2692 cmd.exe 20 PID 2676 wrote to memory of 2408 2676 cmd.exe 19 PID 2676 wrote to memory of 2408 2676 cmd.exe 19 PID 2676 wrote to memory of 2408 2676 cmd.exe 19 PID 2676 wrote to memory of 2408 2676 cmd.exe 19 PID 2676 wrote to memory of 2408 2676 cmd.exe 19 PID 2676 wrote to memory of 2408 2676 cmd.exe 19 PID 2676 wrote to memory of 2408 2676 cmd.exe 19 PID 2088 wrote to memory of 320 2088 setup_install.exe 35 PID 2088 wrote to memory of 320 2088 setup_install.exe 35 PID 2088 wrote to memory of 320 2088 setup_install.exe 35 PID 2088 wrote to memory of 320 2088 setup_install.exe 35 PID 2088 wrote to memory of 320 2088 setup_install.exe 35 PID 2088 wrote to memory of 320 2088 setup_install.exe 35 PID 2088 wrote to memory of 320 2088 setup_install.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d52e13d49f75155b26c170f5a2ec5f.exe"C:\Users\Admin\AppData\Local\Temp\60d52e13d49f75155b26c170f5a2ec5f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c karotima_2.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\7zS4D924B26\karotima_2.exekarotima_2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4D924B26\karotima_1.exekarotima_1.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:2408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c karotima_1.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676
-
C:\Users\Admin\AppData\Local\Temp\7zS4D924B26\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4D924B26\setup_install.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 3682⤵
- Loads dropped DLL
- Program crash
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD506d8b69d254e878db9ce252bfe3d88e8
SHA19ba47feb68386305c785a2cb4f775b97e36d12a6
SHA256a4f895a8f426c031be0f58964965de443a1e657c1705e4f3d86befa4b49ef530
SHA51223a02819ba5dc5ae7b39e5254134c9283b4883e2564716da78bf4c7ef3e7ca27dc6de06d88e7e07118645713b8078040baa85afff06c91a1c975445a117680af
-
Filesize
893KB
MD52ecfe8526de4fe74f9278ac325034d78
SHA1dc689ce64d534de59e1a1d66bd80dfc1681dea55
SHA2560f9dd60097ab17107aa5cad985b97fa54ee8b61d73e9df6c1dd5efa142b17401
SHA512339254313340ca33187de877406134f80ea687b5cf05eb64798b7272b9adce05499b337cbb6d620987ba67f9dce6c5cbd62c7f205c9698f62712f58d9d7b6ed0
-
Filesize
92KB
MD5305c00c540e5c010533765562d65c13e
SHA1aacc016e7852e78e73a26cc19e6aca30b4a1161a
SHA256bf1a789cc4befb3927cf39258e6111b2bbb8720b8e8d811daefdcd6a45500b4a
SHA512b1b86d6d8d62f8f7a9c12902da86ba54a651094360101810f6fb68937531caed8ac09973462cc9f20f0381da1b634049fb6ca0f6c5b74b57fae2c74bece7867a
-
Filesize
894KB
MD52ed0cf28097b6695dfc2ccc8312fa92c
SHA1c349ada2744bcf60470224063aaaf4dd7f51a2e8
SHA256e8f2fd4249576b6870eef435764ce9d3d5fdeacc1b434403f49c8370e9b2083e
SHA512875b95d16858d3052ce93a50e2dbf3332d011639c561f0bdc23b2df51fed3bc4f42bebb3cdc0e3b370358d2d30910f0198e35470f42f93fd4ce19563e3f16aa1
-
Filesize
381KB
MD55fdfec4aa5837c1fe487c8954748ed5c
SHA1760c823be75f0113793372014dc554b9e55f2eab
SHA256aa34c44bbc261ac32a9f56c1cbc5541ce5d9e2559df0619a89a3dc379a694c87
SHA512ad01895f728335c4abadd1813d10ae1e8abfdfa54048e662736d8c727bac138d11ed8b6d31bea7d6e2a334159de297cbeb40929556ed1df58dd63d538996de1a