Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
WEXTRACT.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
WEXTRACT.exe
Resource
win10v2004-20231222-en
General
-
Target
WEXTRACT.exe
-
Size
427KB
-
MD5
be982f88b4dc59376512980069e223e6
-
SHA1
0e410efd5f98f96ae5cea91ea60a827db48bdb11
-
SHA256
17c7cc079465da191a8ed1512b8088b869415f5bc5bccf3eb72b0820b7f35619
-
SHA512
b763f0235689765d1aceefc76925cc6b714630e1760b6e221b378263e9019e18f5f2002bcbb242ce1016efbc0ff79d7645c3025e7b7a6f27daba02552377a197
-
SSDEEP
6144:K2y+bnr+Bp0yN90QEF6VvTOaAJL63hsjz+7Ha3th4oIrfwXxp3DMgZtyXs2bBub9:+MrZy90KdIJLUxstfWfwXxpzMg+RQ9
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/3836-23-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/3836-21-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/3836-20-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/3836-19-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 5 IoCs
pid Process 4664 v0143080.exe 4376 a8638369.exe 184 b5299161.exe 4832 c2304229.exe 1968 dbtsrss -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" WEXTRACT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0143080.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4376 set thread context of 116 4376 a8638369.exe 96 PID 184 set thread context of 3836 184 b5299161.exe 108 -
Program crash 3 IoCs
pid pid_target Process procid_target 4972 4376 WerFault.exe 1444 3836 WerFault.exe 624 184 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 AppLaunch.exe 116 AppLaunch.exe 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 116 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3504 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4664 1920 WEXTRACT.exe 98 PID 1920 wrote to memory of 4664 1920 WEXTRACT.exe 98 PID 1920 wrote to memory of 4664 1920 WEXTRACT.exe 98 PID 4664 wrote to memory of 4376 4664 v0143080.exe 97 PID 4664 wrote to memory of 4376 4664 v0143080.exe 97 PID 4664 wrote to memory of 4376 4664 v0143080.exe 97 PID 4376 wrote to memory of 116 4376 a8638369.exe 96 PID 4376 wrote to memory of 116 4376 a8638369.exe 96 PID 4376 wrote to memory of 116 4376 a8638369.exe 96 PID 4376 wrote to memory of 116 4376 a8638369.exe 96 PID 4376 wrote to memory of 116 4376 a8638369.exe 96 PID 4376 wrote to memory of 116 4376 a8638369.exe 96 PID 4664 wrote to memory of 184 4664 v0143080.exe 100 PID 4664 wrote to memory of 184 4664 v0143080.exe 100 PID 4664 wrote to memory of 184 4664 v0143080.exe 100 PID 184 wrote to memory of 220 184 b5299161.exe 101 PID 184 wrote to memory of 220 184 b5299161.exe 101 PID 184 wrote to memory of 220 184 b5299161.exe 101 PID 184 wrote to memory of 3052 184 b5299161.exe 109 PID 184 wrote to memory of 3052 184 b5299161.exe 109 PID 184 wrote to memory of 3052 184 b5299161.exe 109 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 184 wrote to memory of 3836 184 b5299161.exe 108 PID 1920 wrote to memory of 4832 1920 WEXTRACT.exe 107 PID 1920 wrote to memory of 4832 1920 WEXTRACT.exe 107 PID 1920 wrote to memory of 4832 1920 WEXTRACT.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0143080.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0143080.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5299161.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5299161.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 184 -s 6084⤵
- Program crash
PID:624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c2304229.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c2304229.exe2⤵
- Executes dropped EXE
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4376 -ip 43761⤵PID:460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 5841⤵
- Program crash
PID:4972
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:116
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8638369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8638369.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 184 -ip 1841⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 5401⤵
- Program crash
PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3836 -ip 38361⤵PID:5084
-
C:\Users\Admin\AppData\Roaming\dbtsrssC:\Users\Admin\AppData\Roaming\dbtsrss1⤵
- Executes dropped EXE
PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD56d3e807bc5b1075951cb02aee1040ce4
SHA1e46b8731eb240af658cd92f869b9c4c48255d572
SHA2563044994d68ed802e317cd4395ed588a0928dd006e4359ff907691fdcfd3b45f7
SHA512b2bccf1135ef7a8d0adfeaa158933e730206e0cbf3920ffab0a8aad0eda01d6c14ac176bf0215bcb0e77385b6f5562fb1ddb7e87a8acb8cfdb3290dd1800ea2f
-
Filesize
166KB
MD56b3b5578bfce84e4564382d8dcb84c88
SHA1fbe695d073f9bf1c4480f0da2e75de798d58deba
SHA25648eab4277fff7669eb09844dd2d5de7a5edc2a487a6a4ef9b540785fff1bc9c1
SHA512c4b48b40fdb6ebdbfd4cd6c42a4ce34c8a5d4e74163eda9cb197e7bad1a2d2bb80653b1ecb47dbb4ad106e1570663945de22301623aceef70c802354091957f8
-
Filesize
276KB
MD512d4bca9bbb0cd07025f3dcaed7eb23a
SHA1ac51d5a3e131b07440e63d4e1d28ac29431aebf3
SHA256f50a9e7dc019f9e0e7505636e2616867326662af461b34f43946263301fa6ee1
SHA5129630feebdd23900b7db614d5edce27d17511036c439f754116cc2ddb84e5950b62c2a7ff3dfab9abb6ab6f5f9e6f2db4a883a9ad987de8db14f4a2a78da3099d
-
Filesize
92KB
MD5d845d020c5a9a23417739a81c3deeb01
SHA193f4623b3c5bec52cf7ed03a5efc4747bc6f8c11
SHA256ddfba974503d3e2cb2be859fda19971e571c4df9167f9b8ccc66bcab35583fe1
SHA5127013ff4c2649e44fa26ddbd3f218951fdc187c9137cd4e77bbff03e83c2bbf4b55c7cebae21ffcc3987a3ea7674cc065224712989a98d817fbb7574f4c1b73f6
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
65KB
MD5dd33a5e42a605baf20ef30022c8e8868
SHA10fa579d7d8b1f9ae272aca6bee4a4662b48a8865
SHA2560bc834f9566101f894bd2daeb923b9545e6faff9eeab332e5310a5ec638b69a5
SHA51220b047c81db3c8db1df14a888f4001f85fa3be79ec2b30086045aec1e4b6ee4d8dc02a9cd4c2ebf96e7fee86b56bbfc042d16e206a74a34455a8588988ed1063