Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2024 14:20

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

lumma

C2

https://willpoweragreebokkskiew.site/api

https://braidfadefriendklypk.site/api

Signatures

  • Allcome

    A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

  • Detect ZGRat V1 34 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detects executables packed with unregistered version of .NET Reactor 2 IoCs
  • Formbook payload 1 IoCs
  • Downloads MZ/PE file
  • .NET Reactor proctector 3 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
    "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\Files\Ogovckrrq.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Ogovckrrq.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Ogovckrrq';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Ogovckrrq' -Value '"C:\Users\Admin\AppData\Local\Temp\Files\Ogovckrrq.exe"' -PropertyType 'String'
        3⤵
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:224
    • C:\Users\Admin\AppData\Local\Temp\Files\cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2040
    • C:\Users\Admin\AppData\Local\Temp\Files\MRK.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\MRK.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:3232
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 1216
            4⤵
            • Program crash
            PID:2844
      • C:\Users\Admin\AppData\Local\Temp\Files\TrueCrypt_NKwtUN.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\TrueCrypt_NKwtUN.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"
          3⤵
            PID:3164
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe"
            3⤵
              PID:2372
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"
              3⤵
                PID:2976
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe"
                3⤵
                  PID:232
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"
                  3⤵
                    PID:3952
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe"
                    3⤵
                      PID:1172
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe"
                      3⤵
                        PID:4836
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe"
                        3⤵
                          PID:2660
                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe
                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe"
                          3⤵
                            PID:4204
                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe
                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe"
                            3⤵
                              PID:3488
                          • C:\Users\Admin\AppData\Local\Temp\Files\fortnite3.exe
                            "C:\Users\Admin\AppData\Local\Temp\Files\fortnite3.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:1300
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3232 -ip 3232
                          1⤵
                            PID:4060
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3232 -ip 3232
                            1⤵
                              PID:1344

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\Files\MRK.exe

                              Filesize

                              727KB

                              MD5

                              8b5cf3d102548da37888f34d3d468e27

                              SHA1

                              823aa91b6e4ecf3bb68a2154a122e6a9ffc7bf89

                              SHA256

                              3e8e1eae92427c05d36bbc665721382af5972780e0a7cd44e33f63684b1cf3e2

                              SHA512

                              da525ea8b851739940fcce41fae69b4fa7942c21e2ac7fca79fd468e247c5ce0e8fc105a9288290ff79c064a5d200e7214f67ea070114da1fb335b152a5ac10b

                            • C:\Users\Admin\AppData\Local\Temp\Files\Ogovckrrq.exe

                              Filesize

                              418KB

                              MD5

                              e320a03e4df01230ddd097fa1b0642e2

                              SHA1

                              1c595ef6d035b18073f67f04d585c275a22adcc0

                              SHA256

                              2c9283e699f8d5c2b08eb5e2727ce5ec0b4bfe83a4b13a92dc0e416cc6ed18ee

                              SHA512

                              192df1d461b2f3158a8a4880931c9288514ba9bd9412c248dad029afb8fcd266940cc12f70ff4d28ca89a24db51b2a9c1e1cdf3d3d5da963030c2089a554d318

                            • C:\Users\Admin\AppData\Local\Temp\Files\TrueCrypt_NKwtUN.exe

                              Filesize

                              2.9MB

                              MD5

                              24e7fe1519218477b3aef1d9250f4551

                              SHA1

                              c84c5d102b00b5553105dfbdfbe5443a68986120

                              SHA256

                              afcb1cbbfd97b24e7407c431cfc0e12d2ac6d8cf23f01e961ce825f5a10ea1cd

                              SHA512

                              2f515b56ced27afd69836e03b2ad5ee34a6ce3788fa974fe09d170247671c4a4967e01d66fffb958bd92f2164f0e3add8194bf2674c3bd36a4d79053000f6236

                            • C:\Users\Admin\AppData\Local\Temp\Files\TrueCrypt_NKwtUN.exe

                              Filesize

                              3.2MB

                              MD5

                              39f80737377063d3707ee4cca86f1178

                              SHA1

                              fd1587cc39f2d78fde2a2ad04acdedce1b95d8a1

                              SHA256

                              0179f03f8e49aa25a22e67d26ffa986eec43d603656cafeaa6d890bf3958d293

                              SHA512

                              aa67e26e6a741e1762bf6b912b81e1707656ed1f4749da7865c4e33ff88c589eac1be9eece8730d69c08430fec879812207fa6d26d6f047873073586c3677f7a

                            • C:\Users\Admin\AppData\Local\Temp\Files\cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe

                              Filesize

                              188KB

                              MD5

                              62062a7443a82e1b95c652ed85052532

                              SHA1

                              224952c1a0ec7956fb8f3da46ad943f1338c38c2

                              SHA256

                              cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1

                              SHA512

                              cb52806eacd1d2dc63948b1d460263ed3dff2465999580d8ac49c909e250a3ab57327e80c7ca31fb085bf1a5414036309842d1e5a7219f916086e4bf77906195

                            • C:\Users\Admin\AppData\Local\Temp\Files\fortnite3.exe

                              Filesize

                              123KB

                              MD5

                              ed0a563d3d57d03356187c1a2fbcce3f

                              SHA1

                              29b80e1cd5dcb6e134985ad547afe03fa9f5f9d5

                              SHA256

                              ed78295a1b60b7053383c7f2a4837c62cb5625d7d57b5f4121df45660a000c65

                              SHA512

                              d3670a61771d918a65c9ca6e5d46a6aa01872eadb71bd0afe681476bbf5b53ecfa25488facd1ab0ce46a8240958ad073c9dddf914678f3c6743178719f167b67

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_te2bpfwd.mu3.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\uYzuMuSxlwDXBQL.pdf

                              Filesize

                              233KB

                              MD5

                              b3ab2c7592b6d56f84e744339d903f85

                              SHA1

                              74f380d3169dbc8ec5b75774466bf0363a736681

                              SHA256

                              655232952e3270343757b2ad06f7440f079edec528e82c5306d98d407f8896de

                              SHA512

                              bb6762deb97eeb2172ac56b9aff5200afaf7cd771ba0a17cf9fb05529aa06bf994a2427018858e783ac7603156dc93c70d827a5a457e0840c1a60e1b81a80a5a

                            • memory/224-6159-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                              Filesize

                              64KB

                            • memory/224-6157-0x0000000000C10000-0x0000000000C46000-memory.dmp

                              Filesize

                              216KB

                            • memory/224-6179-0x0000000006CC0000-0x0000000006D56000-memory.dmp

                              Filesize

                              600KB

                            • memory/224-6176-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                              Filesize

                              64KB

                            • memory/224-6181-0x0000000006220000-0x0000000006242000-memory.dmp

                              Filesize

                              136KB

                            • memory/224-6174-0x0000000005D40000-0x0000000005D8C000-memory.dmp

                              Filesize

                              304KB

                            • memory/224-6173-0x0000000005CF0000-0x0000000005D0E000-memory.dmp

                              Filesize

                              120KB

                            • memory/224-6172-0x0000000005840000-0x0000000005B94000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/224-6184-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/224-6162-0x0000000004FE0000-0x0000000005046000-memory.dmp

                              Filesize

                              408KB

                            • memory/224-6161-0x0000000004F10000-0x0000000004F32000-memory.dmp

                              Filesize

                              136KB

                            • memory/224-6160-0x0000000005210000-0x0000000005838000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/224-6180-0x00000000061D0000-0x00000000061EA000-memory.dmp

                              Filesize

                              104KB

                            • memory/224-6158-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2040-130-0x0000000000730000-0x0000000000830000-memory.dmp

                              Filesize

                              1024KB

                            • memory/2040-132-0x00000000006B0000-0x00000000006B9000-memory.dmp

                              Filesize

                              36KB

                            • memory/2040-134-0x0000000000400000-0x000000000044C000-memory.dmp

                              Filesize

                              304KB

                            • memory/2040-1016-0x0000000000400000-0x000000000044C000-memory.dmp

                              Filesize

                              304KB

                            • memory/2536-3-0x00000000052B0000-0x00000000052C0000-memory.dmp

                              Filesize

                              64KB

                            • memory/2536-0-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2536-1019-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2536-2252-0x00000000052B0000-0x00000000052C0000-memory.dmp

                              Filesize

                              64KB

                            • memory/2536-1-0x00000000007B0000-0x00000000007B8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2536-2-0x0000000005150000-0x00000000051EC000-memory.dmp

                              Filesize

                              624KB

                            • memory/3232-3158-0x00000000011E0000-0x00000000011E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3232-6203-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/3232-3149-0x00000000011E0000-0x00000000011E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3232-3152-0x00000000011E0000-0x00000000011E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3232-3154-0x00000000011E0000-0x00000000011E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3232-3156-0x00000000011E0000-0x00000000011E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3232-3161-0x0000000000400000-0x000000000048A000-memory.dmp

                              Filesize

                              552KB

                            • memory/3232-6156-0x00000000011E0000-0x00000000011E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4788-51-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-45-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-94-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-90-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-88-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-86-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-84-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-82-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-80-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-78-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-3000-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4788-3005-0x0000000005620000-0x0000000005630000-memory.dmp

                              Filesize

                              64KB

                            • memory/4788-15-0x0000000000CB0000-0x0000000000D1E000-memory.dmp

                              Filesize

                              440KB

                            • memory/4788-16-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4788-17-0x0000000005620000-0x0000000005630000-memory.dmp

                              Filesize

                              64KB

                            • memory/4788-18-0x0000000005500000-0x00000000055D4000-memory.dmp

                              Filesize

                              848KB

                            • memory/4788-20-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-76-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-74-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-72-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-23-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-70-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-25-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-68-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-66-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-64-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-62-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-60-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-6153-0x00000000058E0000-0x0000000005946000-memory.dmp

                              Filesize

                              408KB

                            • memory/4788-58-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-56-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-53-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-49-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-47-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-92-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-43-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-41-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-39-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-27-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4788-34-0x0000000005500000-0x00000000055CF000-memory.dmp

                              Filesize

                              828KB

                            • memory/4872-3151-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4872-3147-0x00000000027B0000-0x00000000047B0000-memory.dmp

                              Filesize

                              32.0MB

                            • memory/4872-3024-0x0000000002760000-0x0000000002770000-memory.dmp

                              Filesize

                              64KB

                            • memory/4872-3020-0x0000000005250000-0x00000000052F6000-memory.dmp

                              Filesize

                              664KB

                            • memory/4872-3018-0x0000000004CA0000-0x0000000005244000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4872-3003-0x0000000004BF0000-0x0000000004C96000-memory.dmp

                              Filesize

                              664KB

                            • memory/4872-3004-0x00000000744C0000-0x0000000074C70000-memory.dmp

                              Filesize

                              7.7MB