Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 23:40
Static task
static1
General
-
Target
4cc2560de1b2a15d3c8b8580154154af.exe
-
Size
2.4MB
-
MD5
4cc2560de1b2a15d3c8b8580154154af
-
SHA1
ae4ee80e9d7c315b66fc3e4f62d9ae1d25463ccc
-
SHA256
2120d92e96ad3e11b8e35cd6cf867e95c31b64d4d4e43c661560b6ab281bd306
-
SHA512
e4ffb1701a54884d053b5f17ce494a6e723ec3005a5fb967bbca021a3a6fe434e608b1a6e0f92e2b35b4f1624794b72147e339fe6ba2eecf384cf01bd469383a
-
SSDEEP
49152:EgBNMZwos3cWf3pyjfoQbdBXPUKwXGEOBRT2Os3ch1MVje8bSO:JBNz7f3UxtsKc5soZe83
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/1140-116-0x0000000000400000-0x0000000000A04000-memory.dmp family_vidar behavioral2/memory/1140-114-0x0000000002560000-0x00000000025FD000-memory.dmp family_vidar behavioral2/memory/1140-130-0x0000000000400000-0x0000000000A04000-memory.dmp family_vidar behavioral2/memory/1140-137-0x0000000002560000-0x00000000025FD000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000600000002321e-41.dat aspack_v212_v242 behavioral2/files/0x000600000002321c-53.dat aspack_v212_v242 behavioral2/files/0x0006000000023219-50.dat aspack_v212_v242 behavioral2/files/0x000600000002321a-48.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 4cc2560de1b2a15d3c8b8580154154af.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 setup_installer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipinfo.io 9 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4376 3676 WerFault.exe 3152 2608 WerFault.exe 43 4252 2916 WerFault.exe 53 1748 1140 WerFault.exe 50 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4864 2220 4cc2560de1b2a15d3c8b8580154154af.exe 29 PID 2220 wrote to memory of 4864 2220 4cc2560de1b2a15d3c8b8580154154af.exe 29 PID 2220 wrote to memory of 4864 2220 4cc2560de1b2a15d3c8b8580154154af.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cc2560de1b2a15d3c8b8580154154af.exe"C:\Users\Admin\AppData\Local\Temp\4cc2560de1b2a15d3c8b8580154154af.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\7zS00380107\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS00380107\setup_install.exe"3⤵PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_7.exe1⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_6.exesahiba_6.exe1⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3676 -ip 36761⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_1.exe" -a1⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 5601⤵
- Program crash
PID:4376
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 6002⤵
- Program crash
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2608 -ip 26081⤵PID:3804
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_5.exesahiba_5.exe1⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_3.exesahiba_3.exe1⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 10602⤵
- Program crash
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_4.exesahiba_4.exe1⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_1.exesahiba_1.exe1⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\7zS00380107\sahiba_2.exesahiba_2.exe1⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 3962⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_6.exe1⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_5.exe1⤵PID:2212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_4.exe1⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_3.exe1⤵PID:2588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_2.exe1⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_1.exe1⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2916 -ip 29161⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1140 -ip 11401⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
92KB
MD53947561e2e1528a3936ed77810504e80
SHA13a6891b73e59bfd230d43791914750cb1a07e126
SHA2562c6617cde9e29d37e2fe979df0458f0c62303bc233753370a28bef035b91a0dd
SHA5124bb05f9e36b65a881721bdb7ea4b8249562eb49294999be72e9189dbcb8e8822dc566b21aa61c8773c22211a59d261056746b2c2638a35b3b73d2401505654bc
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
287KB
MD541e1dc8e34109e4cb4ba39dd8e09c6b4
SHA108d717f63ce3e78cfa429baa6e69b3517ee043d2
SHA256e398b7b89d19348afef5af9623d86cf79ae7799a13bedafe98d580bc6d8cc365
SHA512defddc813d6b6a6345fa645356bed2e91321b86dfb4ca609cf1db8fa53891cc82d80a3688dc6dc31ffc732ada49a4cad3a014d4783aa67819160f4276cd4955f
-
Filesize
896KB
MD5090c444600a33135b212aaa17458cd7a
SHA166d46cbbe7abfb6615b2df10de4bfe97c275017f
SHA25624cad9d60e67ee439c8d98faa12d495682bef015d78e8160de6974d036ea5347
SHA512b3186d8144086a45bd988d94faede3c8b5b37f11599e613ccf078fbb0acbe873bab15c4adefdd3e05d5e283a7fe97b10d44548d8abe59f13ba4e419f53816bea
-
Filesize
1.1MB
MD559ca02be239106d0f2d069ff65be83b7
SHA133fd4b29803f22ef73e68c907cc2814dea65429f
SHA25639b69fcab1f7b7535c0898572b6655628719385df7a6179fedb3c78ae6dfaaa3
SHA512afe5a5253586c19d2ffb173ce9a3f2ecc018806e829179469ff65d5ed2ef69adac383a987e25e561c995ee315d887a2705b6b9838ca423140152697e413e78b4
-
Filesize
664KB
MD5f4c64baa14bd7d30a77101595e3217c9
SHA1fdf7c5a51af8ace361549c924d5c17f2d47d658f
SHA2560fac86ce81ea08795aabaea8f8b57476c08b64346f66f078da111f70d1af595a
SHA5124f108df6a1286427a2e99af065ff98b8616884b9c05810ef7b36a6c07bb4398a190184c1821f6db614967ad78133256e83baf488ec76f342254c3ea15aca9dc5