Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
WEXTRACT.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
WEXTRACT.exe
Resource
win10v2004-20231222-en
General
-
Target
WEXTRACT.exe
-
Size
427KB
-
MD5
be982f88b4dc59376512980069e223e6
-
SHA1
0e410efd5f98f96ae5cea91ea60a827db48bdb11
-
SHA256
17c7cc079465da191a8ed1512b8088b869415f5bc5bccf3eb72b0820b7f35619
-
SHA512
b763f0235689765d1aceefc76925cc6b714630e1760b6e221b378263e9019e18f5f2002bcbb242ce1016efbc0ff79d7645c3025e7b7a6f27daba02552377a197
-
SSDEEP
6144:K2y+bnr+Bp0yN90QEF6VvTOaAJL63hsjz+7Ha3th4oIrfwXxp3DMgZtyXs2bBub9:+MrZy90KdIJLUxstfWfwXxpzMg+RQ9
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4208-19-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/4208-20-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/4208-21-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral2/memory/4208-23-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 5 IoCs
pid Process 4496 v0143080.exe 4268 a8638369.exe 2728 b5299161.exe 1524 c2304229.exe 4384 wtfddvi -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" WEXTRACT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0143080.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4268 set thread context of 2012 4268 a8638369.exe 90 PID 2728 set thread context of 4208 2728 b5299161.exe 99 -
Program crash 3 IoCs
pid pid_target Process procid_target 3552 4268 WerFault.exe 88 1196 2728 WerFault.exe 97 4240 4208 WerFault.exe 99 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 AppLaunch.exe 2012 AppLaunch.exe 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2012 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3528 Process not Found 3528 Process not Found -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4496 4936 WEXTRACT.exe 87 PID 4936 wrote to memory of 4496 4936 WEXTRACT.exe 87 PID 4936 wrote to memory of 4496 4936 WEXTRACT.exe 87 PID 4496 wrote to memory of 4268 4496 v0143080.exe 88 PID 4496 wrote to memory of 4268 4496 v0143080.exe 88 PID 4496 wrote to memory of 4268 4496 v0143080.exe 88 PID 4268 wrote to memory of 2012 4268 a8638369.exe 90 PID 4268 wrote to memory of 2012 4268 a8638369.exe 90 PID 4268 wrote to memory of 2012 4268 a8638369.exe 90 PID 4268 wrote to memory of 2012 4268 a8638369.exe 90 PID 4268 wrote to memory of 2012 4268 a8638369.exe 90 PID 4268 wrote to memory of 2012 4268 a8638369.exe 90 PID 4496 wrote to memory of 2728 4496 v0143080.exe 97 PID 4496 wrote to memory of 2728 4496 v0143080.exe 97 PID 4496 wrote to memory of 2728 4496 v0143080.exe 97 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 2728 wrote to memory of 4208 2728 b5299161.exe 99 PID 4936 wrote to memory of 1524 4936 WEXTRACT.exe 104 PID 4936 wrote to memory of 1524 4936 WEXTRACT.exe 104 PID 4936 wrote to memory of 1524 4936 WEXTRACT.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0143080.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0143080.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8638369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8638369.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 1564⤵
- Program crash
PID:3552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5299161.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5299161.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 5405⤵
- Program crash
PID:4240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1604⤵
- Program crash
PID:1196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c2304229.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c2304229.exe2⤵
- Executes dropped EXE
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4268 -ip 42681⤵PID:732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2728 -ip 27281⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4208 -ip 42081⤵PID:4436
-
C:\Users\Admin\AppData\Roaming\wtfddviC:\Users\Admin\AppData\Roaming\wtfddvi1⤵
- Executes dropped EXE
PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5ae1128f8325cc4d45ed289c024b585e8
SHA166c7e968252d8bed88fe0d48f175253d098fe347
SHA256eb349ba4b46439f870afa6be6d8e7929aa2aa7703dd05c06849243c7397e9106
SHA512c6989844b3bcf937783c9a0d44a8a9ecdae4a89a9c6211f557cb7defc009a2aeeaa0a0f6d7126598fcb8958be51c1432be88a8bcbe27de8bf2404b76143d8b20
-
Filesize
325KB
MD56d3e807bc5b1075951cb02aee1040ce4
SHA1e46b8731eb240af658cd92f869b9c4c48255d572
SHA2563044994d68ed802e317cd4395ed588a0928dd006e4359ff907691fdcfd3b45f7
SHA512b2bccf1135ef7a8d0adfeaa158933e730206e0cbf3920ffab0a8aad0eda01d6c14ac176bf0215bcb0e77385b6f5562fb1ddb7e87a8acb8cfdb3290dd1800ea2f
-
Filesize
166KB
MD56b3b5578bfce84e4564382d8dcb84c88
SHA1fbe695d073f9bf1c4480f0da2e75de798d58deba
SHA25648eab4277fff7669eb09844dd2d5de7a5edc2a487a6a4ef9b540785fff1bc9c1
SHA512c4b48b40fdb6ebdbfd4cd6c42a4ce34c8a5d4e74163eda9cb197e7bad1a2d2bb80653b1ecb47dbb4ad106e1570663945de22301623aceef70c802354091957f8
-
Filesize
276KB
MD512d4bca9bbb0cd07025f3dcaed7eb23a
SHA1ac51d5a3e131b07440e63d4e1d28ac29431aebf3
SHA256f50a9e7dc019f9e0e7505636e2616867326662af461b34f43946263301fa6ee1
SHA5129630feebdd23900b7db614d5edce27d17511036c439f754116cc2ddb84e5950b62c2a7ff3dfab9abb6ab6f5f9e6f2db4a883a9ad987de8db14f4a2a78da3099d
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc