Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 05:55

General

  • Target

    c9705afcbe13766eedfe83cd901a1cd2.exe

  • Size

    1.5MB

  • MD5

    c9705afcbe13766eedfe83cd901a1cd2

  • SHA1

    5f0a179c3a72744d8e7d16aedebaf5c000b2c019

  • SHA256

    e270a47e3c09fe00dd072297302d96b830682e18214cb7410be4d56f6feb0dd0

  • SHA512

    d34efb1d0f2ef24e277914e292cc09e753f4ca0e9e6189d7163e9932062f4fe2259b180a29ed9d2d5fa3486b3f4e1f2c7e40cf11b7a385562f72534b35f3a53e

  • SSDEEP

    24576:Eg5Qr587v2TIC7sQpnVBf9QQMfcflspnr1+dReMQfOtzan2WnbSXqmndlLMV44gT:EgirovmIm/VhMfcfepnPfgJWn2fPLI6T

Malware Config

Extracted

Family

nullmixer

C2

http://wxkeww.xyz/

Extracted

Family

smokeloader

Botnet

pub6

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 32 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9705afcbe13766eedfe83cd901a1cd2.exe
    "C:\Users\Admin\AppData\Local\Temp\c9705afcbe13766eedfe83cd901a1cd2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Users\Admin\AppData\Local\Temp\7zS0971DBA6\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS0971DBA6\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 372
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1292
  • C:\Windows\SysWOW64\cmd.exe
    C:\Windows\system32\cmd.exe /c karotima_2.exe
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\7zS0971DBA6\karotima_2.exe
      karotima_2.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2800
  • C:\Users\Admin\AppData\Local\Temp\7zS0971DBA6\karotima_1.exe
    karotima_1.exe
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:2860
  • C:\Windows\SysWOW64\cmd.exe
    C:\Windows\system32\cmd.exe /c karotima_1.exe
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1988
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {E7ACB9F6-CC09-4FF5-BF01-7ECF31101041} S-1-5-21-1268429524-3929314613-1992311491-1000:XBTLDBHN\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Roaming\drhwadf
      C:\Users\Admin\AppData\Roaming\drhwadf
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 124
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CC4F.tmp

    Filesize

    382KB

    MD5

    7110c62cfeae8451d0a91eed0266edde

    SHA1

    93cbbd558cf954afac40f49e12805ba344413b9d

    SHA256

    4ec22ac35fdc138395f500f6fd0355a0026aa156497f0556e5f5ccca6eaf4312

    SHA512

    24729e031ac35bf15d792b3d3510b89c86cb338201e46b5a16f20006a8f645dffa9add158c55caf595a2fa7877ec95a07da3f1bf60c81add1204771c137c419f

  • C:\Users\Admin\AppData\Roaming\drhwadf

    Filesize

    201KB

    MD5

    7e3cb6bf4000e17ada2121b84b63ddc1

    SHA1

    3d9d09e4603b89913b0eca604021df3c49b4aa31

    SHA256

    439c74d75423ffb0071e342f248c48567f50f50e1f836ae119f5db1387147188

    SHA512

    0989ca525843ca03ebfb32b1f000307e7be9674b7453c7a8724f2206028e9ecc04b9f2ef130639858041d37a2b7a11d7e9b1e23197f22bb0e95f9d6f75291ebf

  • \Users\Admin\AppData\Local\Temp\setup_installer.exe

    Filesize

    92KB

    MD5

    d772d6902200f5d4599a9b27d0d8f9e6

    SHA1

    564eefb3fabe655b2fb51f492959b158cb20e12d

    SHA256

    7bf11639663306b53a7fe0e3826d12f03e1dda7b1fb3abaa758e3281d35f8e17

    SHA512

    6682d79a013129aceba9cde75a82f0444a28d30bfbd1c4656d7e3774b469283027a780362657c908c991f9b5939db32792e6713a323667ab763a95b3f3e23d36

  • memory/1192-100-0x0000000002A20000-0x0000000002A35000-memory.dmp

    Filesize

    84KB

  • memory/1704-218-0x0000000000400000-0x000000000089C000-memory.dmp

    Filesize

    4.6MB

  • memory/1704-212-0x0000000000A10000-0x0000000000B10000-memory.dmp

    Filesize

    1024KB

  • memory/1704-233-0x0000000000A10000-0x0000000000B10000-memory.dmp

    Filesize

    1024KB

  • memory/1936-38-0x00000000028E0000-0x00000000029FE000-memory.dmp

    Filesize

    1.1MB

  • memory/1936-31-0x00000000028E0000-0x00000000029FE000-memory.dmp

    Filesize

    1.1MB

  • memory/2800-91-0x0000000000240000-0x0000000000249000-memory.dmp

    Filesize

    36KB

  • memory/2800-101-0x0000000000400000-0x000000000089C000-memory.dmp

    Filesize

    4.6MB

  • memory/2800-104-0x0000000000240000-0x0000000000249000-memory.dmp

    Filesize

    36KB

  • memory/2800-93-0x0000000000400000-0x000000000089C000-memory.dmp

    Filesize

    4.6MB

  • memory/2800-90-0x00000000009C0000-0x0000000000AC0000-memory.dmp

    Filesize

    1024KB

  • memory/2960-77-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-76-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2960-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2960-62-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2960-61-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2960-58-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2960-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2960-49-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2960-69-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2960-71-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-74-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-75-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-68-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2960-73-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-70-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2960-142-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2960-144-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2960-143-0x000000006EB40000-0x000000006EB63000-memory.dmp

    Filesize

    140KB

  • memory/2960-141-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2960-140-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2960-139-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2960-63-0x0000000000C50000-0x0000000000D6E000-memory.dmp

    Filesize

    1.1MB

  • memory/2960-59-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2960-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2960-50-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB