Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
aa78c45f6e59bd71852b611786349324.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa78c45f6e59bd71852b611786349324.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
General
-
Target
aa78c45f6e59bd71852b611786349324.exe
-
Size
1.9MB
-
MD5
aa78c45f6e59bd71852b611786349324
-
SHA1
eb89fd0c85c15299c0785f251ef0495814ec0899
-
SHA256
14ab6299436aa43e2d039e0fbc6147d6dd495410c9e3c175ec0ac6d82af855ca
-
SHA512
68f2f801db7c1415b7f41b8652a1ea6f027f5f176da28be85c610d23e4c38032c8df05c8354cb3c1e73664a51734a796caae8f11007d4bd9fdbbe9991f99dbad
-
SSDEEP
49152:9gZTJnybQujEEZhLfTdCrQuQbLLaOLAuoo+nIfjLS:yZlngEEZhndCrQxLfVLS
Malware Config
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
pub5
Extracted
nullmixer
http://watira.xyz/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/2712-99-0x0000000000BD0000-0x0000000000C6D000-memory.dmp family_vidar behavioral2/memory/2712-98-0x0000000000AD0000-0x0000000000BD0000-memory.dmp family_vidar behavioral2/memory/2712-101-0x0000000000400000-0x0000000000959000-memory.dmp family_vidar behavioral2/memory/4472-104-0x0000000000A20000-0x0000000000B20000-memory.dmp family_vidar behavioral2/memory/2712-123-0x0000000000400000-0x0000000000959000-memory.dmp family_vidar behavioral2/memory/2712-124-0x0000000000BD0000-0x0000000000C6D000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000800000002320c-34.dat aspack_v212_v242 behavioral2/files/0x000700000002320f-38.dat aspack_v212_v242 behavioral2/files/0x000700000002320d-36.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation aa78c45f6e59bd71852b611786349324.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 8e122c389911.exe -
Executes dropped EXE 10 IoCs
pid Process 4260 setup_installer.exe 3440 setup_install.exe 3320 2eaca7cbe30dba52.exe 4472 944d670e7.exe 876 8e122c389911.exe 3716 553fdd31f6.exe 2712 cd9ed711254.exe 796 bc0f7de460834e5.exe 5116 9264ee7753.exe 4336 8e122c389911.exe -
Loads dropped DLL 6 IoCs
pid Process 3440 setup_install.exe 3440 setup_install.exe 3440 setup_install.exe 3440 setup_install.exe 3440 setup_install.exe 3440 setup_install.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 29 iplogger.org 30 iplogger.org 38 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1892 3440 WerFault.exe 94 2680 2712 WerFault.exe 109 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 944d670e7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 944d670e7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 944d670e7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 944d670e7.exe 4472 944d670e7.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4472 944d670e7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3716 553fdd31f6.exe Token: SeDebugPrivilege 796 bc0f7de460834e5.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3664 wrote to memory of 4260 3664 aa78c45f6e59bd71852b611786349324.exe 92 PID 3664 wrote to memory of 4260 3664 aa78c45f6e59bd71852b611786349324.exe 92 PID 3664 wrote to memory of 4260 3664 aa78c45f6e59bd71852b611786349324.exe 92 PID 4260 wrote to memory of 3440 4260 setup_installer.exe 94 PID 4260 wrote to memory of 3440 4260 setup_installer.exe 94 PID 4260 wrote to memory of 3440 4260 setup_installer.exe 94 PID 3440 wrote to memory of 1824 3440 setup_install.exe 97 PID 3440 wrote to memory of 1824 3440 setup_install.exe 97 PID 3440 wrote to memory of 1824 3440 setup_install.exe 97 PID 3440 wrote to memory of 4628 3440 setup_install.exe 100 PID 3440 wrote to memory of 4628 3440 setup_install.exe 100 PID 3440 wrote to memory of 4628 3440 setup_install.exe 100 PID 3440 wrote to memory of 656 3440 setup_install.exe 99 PID 3440 wrote to memory of 656 3440 setup_install.exe 99 PID 3440 wrote to memory of 656 3440 setup_install.exe 99 PID 3440 wrote to memory of 5008 3440 setup_install.exe 98 PID 3440 wrote to memory of 5008 3440 setup_install.exe 98 PID 3440 wrote to memory of 5008 3440 setup_install.exe 98 PID 3440 wrote to memory of 3652 3440 setup_install.exe 103 PID 3440 wrote to memory of 3652 3440 setup_install.exe 103 PID 3440 wrote to memory of 3652 3440 setup_install.exe 103 PID 3440 wrote to memory of 1352 3440 setup_install.exe 102 PID 3440 wrote to memory of 1352 3440 setup_install.exe 102 PID 3440 wrote to memory of 1352 3440 setup_install.exe 102 PID 3440 wrote to memory of 4852 3440 setup_install.exe 101 PID 3440 wrote to memory of 4852 3440 setup_install.exe 101 PID 3440 wrote to memory of 4852 3440 setup_install.exe 101 PID 4628 wrote to memory of 3320 4628 cmd.exe 104 PID 4628 wrote to memory of 3320 4628 cmd.exe 104 PID 4628 wrote to memory of 3320 4628 cmd.exe 104 PID 1824 wrote to memory of 876 1824 cmd.exe 105 PID 1824 wrote to memory of 876 1824 cmd.exe 105 PID 1824 wrote to memory of 876 1824 cmd.exe 105 PID 1352 wrote to memory of 4472 1352 cmd.exe 106 PID 1352 wrote to memory of 4472 1352 cmd.exe 106 PID 1352 wrote to memory of 4472 1352 cmd.exe 106 PID 4852 wrote to memory of 3716 4852 cmd.exe 110 PID 4852 wrote to memory of 3716 4852 cmd.exe 110 PID 656 wrote to memory of 2712 656 cmd.exe 109 PID 656 wrote to memory of 2712 656 cmd.exe 109 PID 656 wrote to memory of 2712 656 cmd.exe 109 PID 3652 wrote to memory of 796 3652 cmd.exe 108 PID 3652 wrote to memory of 796 3652 cmd.exe 108 PID 5008 wrote to memory of 5116 5008 cmd.exe 112 PID 5008 wrote to memory of 5116 5008 cmd.exe 112 PID 876 wrote to memory of 4336 876 8e122c389911.exe 114 PID 876 wrote to memory of 4336 876 8e122c389911.exe 114 PID 876 wrote to memory of 4336 876 8e122c389911.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa78c45f6e59bd71852b611786349324.exe"C:\Users\Admin\AppData\Local\Temp\aa78c45f6e59bd71852b611786349324.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4A016707\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 8e122c389911.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\8e122c389911.exe8e122c389911.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\8e122c389911.exe"C:\Users\Admin\AppData\Local\Temp\7zS4A016707\8e122c389911.exe" -a6⤵
- Executes dropped EXE
PID:4336
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 9264ee7753.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\9264ee7753.exe9264ee7753.exe5⤵
- Executes dropped EXE
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd9ed711254.exe4⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\cd9ed711254.execd9ed711254.exe5⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 16126⤵
- Program crash
PID:2680
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2eaca7cbe30dba52.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\2eaca7cbe30dba52.exe2eaca7cbe30dba52.exe5⤵
- Executes dropped EXE
PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 553fdd31f6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\553fdd31f6.exe553fdd31f6.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 944d670e7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\944d670e7.exe944d670e7.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bc0f7de460834e5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\7zS4A016707\bc0f7de460834e5.exebc0f7de460834e5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 5644⤵
- Program crash
PID:1892
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3440 -ip 34401⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2712 -ip 27121⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
630KB
MD5c465c7eb89a23837379e37046ec398e6
SHA100f6f8b48667dfe44d354953158c6915efd6d260
SHA256430ed661f3be61265c7b657a641032b28c5a38495e6b37149b93428b9efa48a9
SHA5129281e662c5612c104804c12ff79b0d953eb60d2d52103656bb9f9d0d523d12280a624f8199bae414c40481839e663dd399f5fbeed1489f70a81657324b536b97
-
Filesize
8KB
MD55b8639f453da7c204942d918b40181de
SHA12daed225238a9b1fe2359133e6d8e7e85e7d6995
SHA256d9008ee980c17de8330444223b212f1b6a441f217753471c76f5f6ed5857a7d6
SHA512cc517e18a5da375832890e61d30553c30e662426837b3e64328c529c594c5721d782f2b5fe2aa809dcd01621176845b61f9e9ba21ce12234a75872391d313205
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
312KB
MD54168326befe9ff224af10c2dd3adbb2c
SHA139b84077951312529796822e970fde442f10b2ed
SHA2566d5735bc40818aa5725dd06e8145f2d653c9bc64c89e6b1b3b3917f5b6b61770
SHA512494c9f647241d58c6da2a79ecc51ebf1cf6df00c78aa54481ec4f557e8f167304dd7872c96c0b0cd56805d224d286745db86e494091b224a288e05beae075ea5
-
Filesize
165KB
MD55f6f8e5a5e6ba53f8f785b575573451d
SHA197b99adefc3ecca6be60c882b563853091f586ef
SHA2566f8a7657b62f79b148d6b930641ef70eb0d8bc909377439819a0db601ca1c0d8
SHA512ff6491641fc985bd03421e8565b36322017da9a647015bcc399b3ca73c675749d3e22eee5e437283b22b6a05240f6bd1bf8eddc0ef3be233fd8c40fe82fead05
-
Filesize
649KB
MD5ae0c81e67caea27ab164697a6e82c4fe
SHA17478f88ae345623eb67792b9ea719e0ec6480bbf
SHA2560ee36078c94b22714e3e44b355e5e129e63bff8df02f0df13a2b1ff207f0f5f5
SHA51280cd1f932a946f6567debd0b1cbfad7214034da471f85609bc41a9fdc845417adca87261044ac2011279d69160f38d438e44336ae7447a7c7bc855a6de30d25b
-
Filesize
640KB
MD5ec51f7e0f1cf355ca6a88882d29c8532
SHA1ce18182b3d4fca80b900a9531036716f24759b24
SHA25612d8ebebf6ea21921790dfa416ecf1849c5787e799efff5edcac793ff61e44b5
SHA512a0653f7598cfe99c655d6f83c688ee116001cabbf8119ab7360a67207a3b5f0605c9a769ca8856b93df1fd859792da0dbd885d8a42cf8fc9fe9985f5ddfdb9ce
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
4.2MB
MD5512e7c6981a3c5a4fe65a4b2ae42cb75
SHA187bee758506ae4e22c221b65aaa47b697404a2c6
SHA25661a8b4929b9b61411b8af256cb4d1813ab80fca153e6edb18990959496c52a94
SHA512abd324760aecfac9decdd1883e75f4f22d9693e39d6a7dd395f64d12db2c8a6cf869574d7cd2848af02ad45269ba9c161dc99c4cbdf9ff0e430eeb435e925f52
-
Filesize
1.9MB
MD5057edd988ee61887698f274d2de99020
SHA1c42f125e133e8ad75dc22c42237445e18953e3a7
SHA2565ebf6ebb706d213d8db3236d32788c4609071c78b164255e61842c900e038073
SHA51288cdeb36294ca843634dd872f6f411744a1873123576315d0eb5e2db27675b95f63cbfd7d904b3e9d0b3013ce05172efede85080f102554df7565b5d781de72a