Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 03:33

General

  • Target

    c061f6c696cde2214e0425839ae84f84.exe

  • Size

    2.6MB

  • MD5

    c061f6c696cde2214e0425839ae84f84

  • SHA1

    907c23a4e0aed6b887e0f7c8b16e1b4f82d1f340

  • SHA256

    d520edc59c5aee94806782d012efa7e0f905e90ce4e177f14cd612e7b8bb17ba

  • SHA512

    c0dc8dc9e5569d0db1ac6c9ac084599111f16b60cf39c230c791327304c5452df6036dbc9f0564c05a283ba369cefb87daad3714029caa4a021b94e6d88eabd6

  • SSDEEP

    49152:xcBxPkZVi7iKiF8cUvFyP2jckAjxt3htaPkvAesMMOZEwJ84vLRaBtIl9mT+Pep:xRri7ixZUvFyPScjVt4j/hCvLUBsKv

Malware Config

Extracted

Family

nullmixer

C2

http://razino.xyz/

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

vidar

Version

39.7

Botnet

933

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    933

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 8 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 15 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c061f6c696cde2214e0425839ae84f84.exe
    "C:\Users\Admin\AppData\Local\Temp\c061f6c696cde2214e0425839ae84f84.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_7.exe
        3⤵
          PID:376
          • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_7.exe
            sahiba_7.exe
            4⤵
              PID:3196
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 548
            3⤵
            • Program crash
            PID:4272
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c sahiba_6.exe
            3⤵
              PID:1876
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c sahiba_5.exe
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3208
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c sahiba_4.exe
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5076
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c sahiba_3.exe
              3⤵
                PID:2384
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sahiba_2.exe
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:5096
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c sahiba_1.exe
                3⤵
                  PID:4528
            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_1.exe
              sahiba_1.exe
              1⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4348
              • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_1.exe
                "C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_1.exe" -a
                2⤵
                  PID:3584
              • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_6.exe
                sahiba_6.exe
                1⤵
                  PID:2320
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1720 -ip 1720
                  1⤵
                    PID:1944
                  • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_3.exe
                    sahiba_3.exe
                    1⤵
                      PID:4144
                    • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_5.exe
                      sahiba_5.exe
                      1⤵
                      • Executes dropped EXE
                      PID:3392
                    • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_4.exe
                      sahiba_4.exe
                      1⤵
                      • Executes dropped EXE
                      PID:4760
                    • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_2.exe
                      sahiba_2.exe
                      1⤵
                      • Executes dropped EXE
                      PID:4152
                    • C:\Windows\SysWOW64\rundll32.exe
                      rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                      1⤵
                        PID:4468
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 600
                          2⤵
                          • Program crash
                          PID:4520
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4468 -ip 4468
                        1⤵
                          PID:2208
                        • C:\Windows\system32\rUNdlL32.eXe
                          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                          1⤵
                          • Process spawned unexpected child process
                          PID:5012
                        • C:\Windows\system32\dwm.exe
                          "dwm.exe"
                          1⤵
                            PID:5048
                          • C:\Windows\system32\dwm.exe
                            "dwm.exe"
                            1⤵
                              PID:4564
                            • C:\Windows\system32\dwm.exe
                              "dwm.exe"
                              1⤵
                                PID:3312
                              • C:\Windows\system32\dwm.exe
                                "dwm.exe"
                                1⤵
                                  PID:3336
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  1⤵
                                    PID:3504
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    1⤵
                                      PID:2880
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      1⤵
                                        PID:4504
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        1⤵
                                          PID:3108
                                        • C:\Windows\system32\sihost.exe
                                          sihost.exe
                                          1⤵
                                            PID:4924
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            1⤵
                                              PID:4328
                                            • C:\Windows\System32\smss.exe
                                              \SystemRoot\System32\smss.exe 0000033c 00000084
                                              1⤵
                                              • Executes dropped EXE
                                              PID:3584
                                            • C:\Windows\System32\smss.exe
                                              \SystemRoot\System32\smss.exe 00000244 00000084
                                              1⤵
                                              • Loads dropped DLL
                                              PID:4468
                                            • C:\Windows\System32\smss.exe
                                              \SystemRoot\System32\smss.exe 00000250 00000084
                                              1⤵
                                              • Executes dropped EXE
                                              PID:4144
                                            • C:\Windows\System32\smss.exe
                                              \SystemRoot\System32\smss.exe 000000cc 00000084
                                              1⤵
                                              • Executes dropped EXE
                                              PID:3196
                                            • C:\Windows\System32\smss.exe
                                              \SystemRoot\System32\smss.exe 000000f8 00000084
                                              1⤵
                                              • Executes dropped EXE
                                              PID:2320

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\libcurl.dll

                                              Filesize

                                              218KB

                                              MD5

                                              d09be1f47fd6b827c81a4812b4f7296f

                                              SHA1

                                              028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                              SHA256

                                              0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                              SHA512

                                              857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\libcurlpp.dll

                                              Filesize

                                              54KB

                                              MD5

                                              e6e578373c2e416289a8da55f1dc5e8e

                                              SHA1

                                              b601a229b66ec3d19c2369b36216c6f6eb1c063e

                                              SHA256

                                              43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                                              SHA512

                                              9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\libgcc_s_dw2-1.dll

                                              Filesize

                                              113KB

                                              MD5

                                              9aec524b616618b0d3d00b27b6f51da1

                                              SHA1

                                              64264300801a353db324d11738ffed876550e1d3

                                              SHA256

                                              59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                              SHA512

                                              0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\libstdc++-6.dll

                                              Filesize

                                              647KB

                                              MD5

                                              5e279950775baae5fea04d2cc4526bcc

                                              SHA1

                                              8aef1e10031c3629512c43dd8b0b5d9060878453

                                              SHA256

                                              97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                                              SHA512

                                              666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\libwinpthread-1.dll

                                              Filesize

                                              69KB

                                              MD5

                                              1e0d62c34ff2e649ebc5c372065732ee

                                              SHA1

                                              fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                                              SHA256

                                              509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                                              SHA512

                                              3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_1.txt

                                              Filesize

                                              712KB

                                              MD5

                                              6e43430011784cff369ea5a5ae4b000f

                                              SHA1

                                              5999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f

                                              SHA256

                                              a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a

                                              SHA512

                                              33ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_2.txt

                                              Filesize

                                              202KB

                                              MD5

                                              4a958b7f15d342fbaaed26da7b9a5628

                                              SHA1

                                              25e663702193dc851e7fd57005ef45d9e65077f4

                                              SHA256

                                              5b397fc6966368fc4b2c3302e0aa529d14de521a1ff2810a8145a7c574fa7709

                                              SHA512

                                              dab2955ea896b36f8c8854157dbee975afc13efb53335c940f2efc6d13aae7aafdd515fa156c866d243a93edf16ba20e1884559ed7621b7a1a4d26091980f43e

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_3.txt

                                              Filesize

                                              365KB

                                              MD5

                                              e07c849f0610b6494a316e686abe9208

                                              SHA1

                                              b15949d5c196d9e8deb063be771de2a28a625def

                                              SHA256

                                              a20e96a2c647b8c89987f6397644ea2f5b56787860d4df5d9893f500e847404d

                                              SHA512

                                              9ad48e2fbfb75d86573742f6d5491f6fea8f6adda9e0dce47b1a0d8740bea700e5013203eb956904b3353f709ed901587b6606a6514b417906593e93036f8d58

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_4.txt

                                              Filesize

                                              8KB

                                              MD5

                                              3338af5387be57396e2ab03cdd18271f

                                              SHA1

                                              e60e505a56fedd2f91e0ac4ec7267c270b86ebc3

                                              SHA256

                                              396adb904ebd81c2996a01520af921ef4bffedaf45b65d50d158e95a10c2b943

                                              SHA512

                                              f1173732a3a1e20c89f3c354bcaf9d9b737526dce6697044cfa65d130ec120f1b75148d6c7b881af892c507b112c050dc2218b71e9522f88da6aff2015524b33

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\sahiba_5.txt

                                              Filesize

                                              92KB

                                              MD5

                                              bf5e071e1c72d0cc1779f2974a6dc14a

                                              SHA1

                                              dcbbe2db2554b76a01c6d972971cc33eb8f45773

                                              SHA256

                                              85951209d1a34f81273c8cf0bf6667b2ff1260b689e4647dc89ae7dc4cee27e0

                                              SHA512

                                              3d1ba9929cc2d6cc15dea16a6161a5e7bd19f29c82b86d07d3a3ba102c97caedf0c8edc8ef7bb59a795b3904f0b5f274caf5ba989b246252fd58682c017b99b7

                                            • C:\Users\Admin\AppData\Local\Temp\7zS0BFBC297\setup_install.exe

                                              Filesize

                                              287KB

                                              MD5

                                              8e316ec3b4d715862e31529b7c155aee

                                              SHA1

                                              1e1e1268bb609d92b3e778cecbdae4e97c1b5bb2

                                              SHA256

                                              ef5fbfafa5b4b138302c45631c72e699dd8ab43d93a77a19ba5a7b155a55d794

                                              SHA512

                                              3e0085b92a3d2105a6f5c5618701daf0341b34f37c9ec37fc13d3093694494536c1af1e7e66e45a6a0edd7fd2d34b720fd16c1cf6a976aa3b6a4939b0f291acc

                                            • memory/1720-53-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/1720-49-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                              Filesize

                                              572KB

                                            • memory/1720-39-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/1720-44-0x00000000007F0000-0x000000000087F000-memory.dmp

                                              Filesize

                                              572KB

                                            • memory/1720-60-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-47-0x0000000064940000-0x0000000064959000-memory.dmp

                                              Filesize

                                              100KB

                                            • memory/1720-51-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/1720-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/1720-54-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/1720-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/1720-57-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/1720-52-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                              Filesize

                                              572KB

                                            • memory/1720-50-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                              Filesize

                                              572KB

                                            • memory/1720-64-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-58-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/1720-59-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-61-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-62-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-63-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-32-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-108-0x0000000000400000-0x000000000051E000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1720-110-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/1720-113-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/1720-112-0x000000006EB40000-0x000000006EB63000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/1720-111-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                              Filesize

                                              572KB

                                            • memory/1720-109-0x0000000064940000-0x0000000064959000-memory.dmp

                                              Filesize

                                              100KB

                                            • memory/3392-85-0x00007FFD88880000-0x00007FFD89341000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/3392-115-0x00007FFD88880000-0x00007FFD89341000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/3392-94-0x000000001B200000-0x000000001B210000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3392-88-0x00000000027E0000-0x00000000027E6000-memory.dmp

                                              Filesize

                                              24KB

                                            • memory/3392-84-0x00000000027B0000-0x00000000027B6000-memory.dmp

                                              Filesize

                                              24KB

                                            • memory/3392-87-0x00000000027C0000-0x00000000027E4000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/3392-82-0x0000000000600000-0x0000000000630000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/3444-122-0x0000000002850000-0x0000000002865000-memory.dmp

                                              Filesize

                                              84KB

                                            • memory/4144-98-0x0000000000400000-0x00000000008F8000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/4144-139-0x0000000000400000-0x00000000008F8000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/4144-93-0x0000000000DB0000-0x0000000000E4D000-memory.dmp

                                              Filesize

                                              628KB

                                            • memory/4144-91-0x00000000009B0000-0x0000000000AB0000-memory.dmp

                                              Filesize

                                              1024KB

                                            • memory/4144-132-0x00000000009B0000-0x0000000000AB0000-memory.dmp

                                              Filesize

                                              1024KB

                                            • memory/4152-90-0x00000000001C0000-0x00000000001C9000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/4152-123-0x00000000001C0000-0x00000000001C9000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/4152-89-0x0000000000950000-0x0000000000A50000-memory.dmp

                                              Filesize

                                              1024KB

                                            • memory/4152-100-0x0000000000400000-0x000000000089C000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/4760-86-0x000000001B9D0000-0x000000001B9E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4760-81-0x00007FFD88880000-0x00007FFD89341000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4760-75-0x0000000000C50000-0x0000000000C58000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/4760-141-0x00007FFD88880000-0x00007FFD89341000-memory.dmp

                                              Filesize

                                              10.8MB