Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 02:06
Static task
static1
Behavioral task
behavioral1
Sample
0b174fea183b59e9fd82bbbf4d6ca51a.exe
Resource
win7-20231215-en
General
-
Target
0b174fea183b59e9fd82bbbf4d6ca51a.exe
-
Size
3.9MB
-
MD5
0b174fea183b59e9fd82bbbf4d6ca51a
-
SHA1
d3a5217af89a4144b292798fe35b81981f16f640
-
SHA256
7e85e9eea33b5c3576d801f9206cba0132f81e569c31e0f76f0ba9229b50b083
-
SHA512
6359c2dd3d33a519831d05ec058e3caaba6de4be2911ad1e519412e04d1d1ec537b07add719f366b4fa6936187a3e10c268e307fceca5eaaaa7278198085cd75
-
SSDEEP
98304:xDCvLUBsgUtB/0xIOUg2im1HKHSCK85OXovU/FqL:x4LUCgQZ0mS2im1qSZaFUc
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
39.3
706
https://bandakere.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Nirsoft 2 IoCs
resource yara_rule behavioral2/memory/2952-154-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/3180-184-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/1272-167-0x0000000002900000-0x0000000002997000-memory.dmp family_vidar behavioral2/memory/1272-173-0x0000000000400000-0x0000000000C68000-memory.dmp family_vidar behavioral2/memory/1272-191-0x0000000000400000-0x0000000000C68000-memory.dmp family_vidar behavioral2/memory/1272-203-0x0000000002900000-0x0000000002997000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000600000002320f-28.dat aspack_v212_v242 behavioral2/files/0x00070000000231f4-34.dat aspack_v212_v242 behavioral2/files/0x000600000002320f-33.dat aspack_v212_v242 -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/4936-101-0x00000000003C0000-0x00000000004CE000-memory.dmp agile_net -
resource yara_rule behavioral2/memory/2952-154-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3180-184-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3180-178-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 3996 976 WerFault.exe 1876 4016 WerFault.exe 4656 3816 WerFault.exe 40 4400 1272 WerFault.exe 36 1736 3172 WerFault.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b174fea183b59e9fd82bbbf4d6ca51a.exe"C:\Users\Admin\AppData\Local\Temp\0b174fea183b59e9fd82bbbf4d6ca51a.exe"1⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\setup_install.exe"2⤵PID:976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_2.exe1⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_2.exemetina_2.exe2⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 3963⤵
- Program crash
PID:4656
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-JT5M1.tmp\metina_5.tmp"C:\Users\Admin\AppData\Local\Temp\is-JT5M1.tmp\metina_5.tmp" /SL5="$8005E,189670,105984,C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_5.exe"1⤵PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 4601⤵
- Program crash
PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 976 -ip 9761⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt1⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4016 -ip 40161⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 6001⤵
- Program crash
PID:1876
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",init1⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SVHOST.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SVHOST.exe1⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SVHOST.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SVHOST.exe"2⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_3.exemetina_3.exe1⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 10402⤵
- Program crash
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_5.exemetina_5.exe1⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_7.exemetina_7.exe1⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_6.exemetina_6.exe1⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_4.exemetina_4.exe1⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\7zS44C6D907\metina_1.exemetina_1.exe1⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_7.exe1⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_6.exe1⤵PID:1232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_5.exe1⤵PID:2256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_4.exe1⤵PID:2620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_3.exe1⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c metina_1.exe1⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3816 -ip 38161⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1272 -ip 12721⤵PID:3624
-
C:\Users\Admin\AppData\Roaming\urvwhgwC:\Users\Admin\AppData\Roaming\urvwhgw1⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 4082⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3172 -ip 31721⤵PID:3340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
290KB
MD5af41d6d43df35d8c831695e584169a71
SHA1bb8d6f081e93d2860ce62fabefbe9cdf80ebf06e
SHA256cbab323219211a8bb57f5b0ee9bdd97b45724c61da8b842f02174ed87f908141
SHA5125fce8bb65d14ca38178ac1cf9ba7d012a2e64b7af9ae3c6cf31b6cf7be44708474b9381da50cb9c9eea9a4b0429eb4b2e280afba0424b6f5ef0a26379221af9a
-
Filesize
92KB
MD566e4d85d4ca9857cf96683f0a03956a1
SHA1658d0f967a411314dc5e0f8d8da583c611eca53c
SHA256f58ea6ce680f31fb59c3b69588e6be86a400e6963782a8466cb62b92e5304d73
SHA512c20f28cc43720694338fba1f12e2a68ac80ad669b960b337c502a9c4765c184a466a2da474e0181da081c97ea54f9c3aea59cdb66bbe0d6e7d455be62ce5835e