Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 20:43
Static task
static1
Behavioral task
behavioral1
Sample
8d437876e8f8d2d06f3eea7872e19366.exe
Resource
win7-20231215-en
General
-
Target
8d437876e8f8d2d06f3eea7872e19366.exe
-
Size
1.5MB
-
MD5
8d437876e8f8d2d06f3eea7872e19366
-
SHA1
1602c0b6f1526a7b65fcb1815c9fdf8dbfe68681
-
SHA256
a11aef5350475e61ecbe2372af59768d8b41178d70ed4ce9ee04d4feb5179a9e
-
SHA512
d675a1ebe62ccd66f925a1098d44c825ed0b27a1c038734250d58f88143ed3d97a9179f308ab637cdc03021c2df29dca1e5824dc30b7b37ced89a552a5368095
-
SSDEEP
49152:EgeYWTMp+nJJ1RzFVml3ySsB+cmeKQMSlmwcTYC:Jbijm3ySsBkSQX
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
smokeloader
pub6
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" karotima_1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" karotima_1.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
resource yara_rule behavioral1/files/0x00060000000161e2-54.dat aspack_v212_v242 behavioral1/files/0x0008000000015fdb-51.dat aspack_v212_v242 behavioral1/files/0x0007000000015ccc-44.dat aspack_v212_v242 behavioral1/files/0x0007000000015cd9-42.dat aspack_v212_v242 behavioral1/files/0x00060000000161e2-30.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 2264 setup_installer.exe 2896 setup_install.exe 1216 karotima_2.exe 1504 karotima_1.exe -
Loads dropped DLL 27 IoCs
pid Process 1660 8d437876e8f8d2d06f3eea7872e19366.exe 2264 setup_installer.exe 2264 setup_installer.exe 2264 setup_installer.exe 2264 setup_installer.exe 2264 setup_installer.exe 2264 setup_installer.exe 2896 setup_install.exe 2896 setup_install.exe 2896 setup_install.exe 2896 setup_install.exe 2896 setup_install.exe 2896 setup_install.exe 2896 setup_install.exe 2896 setup_install.exe 1452 cmd.exe 1452 cmd.exe 2996 cmd.exe 1216 karotima_2.exe 1216 karotima_2.exe 1504 karotima_1.exe 1504 karotima_1.exe 1216 karotima_2.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe 1320 WerFault.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io 5 ipinfo.io 11 api.db-ip.com 12 api.db-ip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1320 2896 WerFault.exe 34 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI karotima_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI karotima_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI karotima_2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1216 karotima_2.exe 1216 karotima_2.exe 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found 1180 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1216 karotima_2.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2264 1660 8d437876e8f8d2d06f3eea7872e19366.exe 28 PID 1660 wrote to memory of 2264 1660 8d437876e8f8d2d06f3eea7872e19366.exe 28 PID 1660 wrote to memory of 2264 1660 8d437876e8f8d2d06f3eea7872e19366.exe 28 PID 1660 wrote to memory of 2264 1660 8d437876e8f8d2d06f3eea7872e19366.exe 28 PID 1660 wrote to memory of 2264 1660 8d437876e8f8d2d06f3eea7872e19366.exe 28 PID 1660 wrote to memory of 2264 1660 8d437876e8f8d2d06f3eea7872e19366.exe 28 PID 1660 wrote to memory of 2264 1660 8d437876e8f8d2d06f3eea7872e19366.exe 28 PID 2264 wrote to memory of 2896 2264 setup_installer.exe 34 PID 2264 wrote to memory of 2896 2264 setup_installer.exe 34 PID 2264 wrote to memory of 2896 2264 setup_installer.exe 34 PID 2264 wrote to memory of 2896 2264 setup_installer.exe 34 PID 2264 wrote to memory of 2896 2264 setup_installer.exe 34 PID 2264 wrote to memory of 2896 2264 setup_installer.exe 34 PID 2264 wrote to memory of 2896 2264 setup_installer.exe 34 PID 2896 wrote to memory of 2996 2896 setup_install.exe 33 PID 2896 wrote to memory of 2996 2896 setup_install.exe 33 PID 2896 wrote to memory of 2996 2896 setup_install.exe 33 PID 2896 wrote to memory of 2996 2896 setup_install.exe 33 PID 2896 wrote to memory of 2996 2896 setup_install.exe 33 PID 2896 wrote to memory of 2996 2896 setup_install.exe 33 PID 2896 wrote to memory of 2996 2896 setup_install.exe 33 PID 2896 wrote to memory of 1452 2896 setup_install.exe 30 PID 2896 wrote to memory of 1452 2896 setup_install.exe 30 PID 2896 wrote to memory of 1452 2896 setup_install.exe 30 PID 2896 wrote to memory of 1452 2896 setup_install.exe 30 PID 2896 wrote to memory of 1452 2896 setup_install.exe 30 PID 2896 wrote to memory of 1452 2896 setup_install.exe 30 PID 2896 wrote to memory of 1452 2896 setup_install.exe 30 PID 1452 wrote to memory of 1216 1452 cmd.exe 32 PID 1452 wrote to memory of 1216 1452 cmd.exe 32 PID 1452 wrote to memory of 1216 1452 cmd.exe 32 PID 1452 wrote to memory of 1216 1452 cmd.exe 32 PID 1452 wrote to memory of 1216 1452 cmd.exe 32 PID 1452 wrote to memory of 1216 1452 cmd.exe 32 PID 1452 wrote to memory of 1216 1452 cmd.exe 32 PID 2996 wrote to memory of 1504 2996 cmd.exe 31 PID 2996 wrote to memory of 1504 2996 cmd.exe 31 PID 2996 wrote to memory of 1504 2996 cmd.exe 31 PID 2996 wrote to memory of 1504 2996 cmd.exe 31 PID 2996 wrote to memory of 1504 2996 cmd.exe 31 PID 2996 wrote to memory of 1504 2996 cmd.exe 31 PID 2996 wrote to memory of 1504 2996 cmd.exe 31 PID 2896 wrote to memory of 1320 2896 setup_install.exe 35 PID 2896 wrote to memory of 1320 2896 setup_install.exe 35 PID 2896 wrote to memory of 1320 2896 setup_install.exe 35 PID 2896 wrote to memory of 1320 2896 setup_install.exe 35 PID 2896 wrote to memory of 1320 2896 setup_install.exe 35 PID 2896 wrote to memory of 1320 2896 setup_install.exe 35 PID 2896 wrote to memory of 1320 2896 setup_install.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d437876e8f8d2d06f3eea7872e19366.exe"C:\Users\Admin\AppData\Local\Temp\8d437876e8f8d2d06f3eea7872e19366.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\7zS8D8DDF36\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8D8DDF36\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 3684⤵
- Loads dropped DLL
- Program crash
PID:1320
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c karotima_2.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\7zS8D8DDF36\karotima_2.exekarotima_2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8D8DDF36\karotima_1.exekarotima_1.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
PID:1504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c karotima_1.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5b28b8c4b230d589ba006eb247717f9f7
SHA154ec9a05dc855cfbca4aed5bae1e29a610f12f76
SHA2560b0eea3e23307f7ff7dd95068fbe09247bcbef7ae4e5d62475b0dff2b4d9f1f6
SHA512d548cdad0648896d16e0572babdf8370c078e1c6f3975ae5a0df7327d5a67057dea0d66d40e0f3564b4dbef1a9c527452733c32e3a3fe33dde983207479a0021
-
Filesize
290KB
MD50754e79a9afd9ad08a26f68844f0242f
SHA1f56e81928d78549f804bc2f85f394d1f59069ae1
SHA256d58f14aeb638ffa98c4adada312bd2301dde0e211e1e2fce57d19c7ba2508bf9
SHA512c1e5378766a61783172022c00fab6c931d0b28750b8373c268d89bff2ae84f989c765b4110f04401c54571ae83c8aded7e7f30e0120a521dc2567bdb71b42be1
-
Filesize
1.0MB
MD5bea6b5c8dbafa4df3684ed4e2cad3589
SHA1cd80549ba63b3f8237cf4e0d4afeb48b1680c1ad
SHA25642738f01d2ed00f9ace1684ffeb9e5c8a7a397e3b9d85d2fc02783204c0a1561
SHA5126a48809c92376ec9b21de3efce9bf4bfdd2b2bfdfceede6569b8aecc2b821f9e3686e3cf8493b709f8c8379135163348d5d6b86a4ba67fa4dd2ccbd1f132714d
-
Filesize
1024KB
MD52165bfbc735d951983c870505deb5e57
SHA1ec765a6583f79fb1b3191df355d0d40dc5c8bc2a
SHA256ed5b50f27981312b9fcac0bbf1a73c55ec7cb1c2cb5e455fc9f0112118ab1f3d
SHA51297756fa61af507ca2594c2e01c12225f78f0be7f807d6e8bd8d59e4f0e144269c7c25a9de9f90315273c47a5bf84f1ff8441900161c7648fea6f4be4c7c2b8ce
-
Filesize
96KB
MD56d4d51b2fd28f7dae97d4db7a3ffee68
SHA131a6e13cfb5e82c39cc15fe964309416d8715a36
SHA2560550a3eadf408f266592a0843cdf7e626842299ac90fe99a473dcfcbc936aa4f
SHA5124085ad1431e9c8666267b914d2b1a77741194706050a4c7109d96138f05f80fb39ebb04c0c5937f11fb8778ccbfef22953b8d68218d62aa89cc6b35cf1315cc8
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
92KB
MD57cc94e079aec3631a7922e007fd83f68
SHA1c2377791bbbeb81e475c0d60dfe325f60959bca2
SHA256d85247262e308a3f2ce9f7f1511872dd8c64e1a164ea790f7b8c589484ac5383
SHA5128c01310dba9dcb571910b88a990d138c29238678179d9b24b3fd1919d9e5584ecb1ab4e8fe31b8378e5936fde5ad50c387c83571b76a997a56aaaba768cbca53
-
Filesize
1.1MB
MD5a578c410b0d65fc089452928fb06dcd9
SHA1775b60b888fbbcad67305914bcfb39d4eb77627b
SHA2561b18c140c42914d8bfeec5db158f9e3f3640eed9d3bb74aa90abeb9296e95697
SHA51203b56b5faf9129856eff42ef68d4b7741f0eb9bb56bce5e9b236a7ecbf1dece0774dcb4323f6144593de9bcda52c0558148f64ffb7d7b4142a5fed71ba87d9e3
-
Filesize
1.5MB
MD58d59acc208fe2bac950c8de93d64db21
SHA1f8c1928e249aa58d6c6ca59aa0620cb4592de6e9
SHA256e3dbeabb39f8e35d1c610edb4eb2bcc0b11f41d2feda8dd3f0b4a044b91b6004
SHA512afe93b0e99f63cc3e039f085b0ebbbb81dc50ccab38e47ad69e32c951f075e143fe1c832210a089db23a5130fabe2f14277d5678d02068bb6607ea31051d32f9
-
Filesize
92KB
MD5d772d6902200f5d4599a9b27d0d8f9e6
SHA1564eefb3fabe655b2fb51f492959b158cb20e12d
SHA2567bf11639663306b53a7fe0e3826d12f03e1dda7b1fb3abaa758e3281d35f8e17
SHA5126682d79a013129aceba9cde75a82f0444a28d30bfbd1c4656d7e3774b469283027a780362657c908c991f9b5939db32792e6713a323667ab763a95b3f3e23d36