Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
aa78c45f6e59bd71852b611786349324.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa78c45f6e59bd71852b611786349324.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
General
-
Target
setup_installer.exe
-
Size
1.9MB
-
MD5
057edd988ee61887698f274d2de99020
-
SHA1
c42f125e133e8ad75dc22c42237445e18953e3a7
-
SHA256
5ebf6ebb706d213d8db3236d32788c4609071c78b164255e61842c900e038073
-
SHA512
88cdeb36294ca843634dd872f6f411744a1873123576315d0eb5e2db27675b95f63cbfd7d904b3e9d0b3013ce05172efede85080f102554df7565b5d781de72a
-
SSDEEP
49152:xcBtEwJ84vLRaBtIl9mVBAO6yQgaPlTWpsCwFJuFIiNktw0Ub91gpCh1O8QM:xTCvLUBsg6DWyvPtaLgwO8QM
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral4/memory/1208-90-0x0000000000BB0000-0x0000000000C4D000-memory.dmp family_vidar behavioral4/memory/1208-93-0x0000000000400000-0x0000000000959000-memory.dmp family_vidar behavioral4/memory/1208-111-0x0000000000400000-0x0000000000959000-memory.dmp family_vidar behavioral4/memory/1208-112-0x0000000000BB0000-0x0000000000C4D000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000700000002322f-21.dat aspack_v212_v242 behavioral4/files/0x0007000000023230-26.dat aspack_v212_v242 behavioral4/files/0x0007000000023232-27.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 8e122c389911.exe -
Executes dropped EXE 9 IoCs
pid Process 4604 setup_install.exe 2456 bc0f7de460834e5.exe 4004 8e122c389911.exe 2612 553fdd31f6.exe 4184 9264ee7753.exe 1208 cd9ed711254.exe 808 2eaca7cbe30dba52.exe 1496 944d670e7.exe 460 8e122c389911.exe -
Loads dropped DLL 5 IoCs
pid Process 4604 setup_install.exe 4604 setup_install.exe 4604 setup_install.exe 4604 setup_install.exe 4604 setup_install.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 35 iplogger.org 36 iplogger.org 40 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3980 4604 WerFault.exe 90 416 1208 WerFault.exe 107 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 944d670e7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 944d670e7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 944d670e7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 944d670e7.exe 1496 944d670e7.exe 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found 3372 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1496 944d670e7.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2612 553fdd31f6.exe Token: SeDebugPrivilege 2456 bc0f7de460834e5.exe Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found Token: SeShutdownPrivilege 3372 Process not Found Token: SeCreatePagefilePrivilege 3372 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3372 Process not Found -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4604 2896 setup_installer.exe 90 PID 2896 wrote to memory of 4604 2896 setup_installer.exe 90 PID 2896 wrote to memory of 4604 2896 setup_installer.exe 90 PID 4604 wrote to memory of 5084 4604 setup_install.exe 94 PID 4604 wrote to memory of 5084 4604 setup_install.exe 94 PID 4604 wrote to memory of 5084 4604 setup_install.exe 94 PID 4604 wrote to memory of 1368 4604 setup_install.exe 102 PID 4604 wrote to memory of 1368 4604 setup_install.exe 102 PID 4604 wrote to memory of 1368 4604 setup_install.exe 102 PID 4604 wrote to memory of 2368 4604 setup_install.exe 101 PID 4604 wrote to memory of 2368 4604 setup_install.exe 101 PID 4604 wrote to memory of 2368 4604 setup_install.exe 101 PID 4604 wrote to memory of 1932 4604 setup_install.exe 98 PID 4604 wrote to memory of 1932 4604 setup_install.exe 98 PID 4604 wrote to memory of 1932 4604 setup_install.exe 98 PID 4604 wrote to memory of 1436 4604 setup_install.exe 97 PID 4604 wrote to memory of 1436 4604 setup_install.exe 97 PID 4604 wrote to memory of 1436 4604 setup_install.exe 97 PID 4604 wrote to memory of 2608 4604 setup_install.exe 96 PID 4604 wrote to memory of 2608 4604 setup_install.exe 96 PID 4604 wrote to memory of 2608 4604 setup_install.exe 96 PID 4604 wrote to memory of 4036 4604 setup_install.exe 95 PID 4604 wrote to memory of 4036 4604 setup_install.exe 95 PID 4604 wrote to memory of 4036 4604 setup_install.exe 95 PID 1436 wrote to memory of 2456 1436 cmd.exe 100 PID 1436 wrote to memory of 2456 1436 cmd.exe 100 PID 5084 wrote to memory of 4004 5084 cmd.exe 99 PID 5084 wrote to memory of 4004 5084 cmd.exe 99 PID 5084 wrote to memory of 4004 5084 cmd.exe 99 PID 4036 wrote to memory of 2612 4036 cmd.exe 104 PID 4036 wrote to memory of 2612 4036 cmd.exe 104 PID 1932 wrote to memory of 4184 1932 cmd.exe 105 PID 1932 wrote to memory of 4184 1932 cmd.exe 105 PID 2368 wrote to memory of 1208 2368 cmd.exe 107 PID 2368 wrote to memory of 1208 2368 cmd.exe 107 PID 2368 wrote to memory of 1208 2368 cmd.exe 107 PID 1368 wrote to memory of 808 1368 cmd.exe 108 PID 1368 wrote to memory of 808 1368 cmd.exe 108 PID 1368 wrote to memory of 808 1368 cmd.exe 108 PID 2608 wrote to memory of 1496 2608 cmd.exe 109 PID 2608 wrote to memory of 1496 2608 cmd.exe 109 PID 2608 wrote to memory of 1496 2608 cmd.exe 109 PID 4004 wrote to memory of 460 4004 8e122c389911.exe 111 PID 4004 wrote to memory of 460 4004 8e122c389911.exe 111 PID 4004 wrote to memory of 460 4004 8e122c389911.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS05B45497\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 8e122c389911.exe3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\8e122c389911.exe8e122c389911.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\8e122c389911.exe"C:\Users\Admin\AppData\Local\Temp\7zS05B45497\8e122c389911.exe" -a5⤵
- Executes dropped EXE
PID:460
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 553fdd31f6.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\553fdd31f6.exe553fdd31f6.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 944d670e7.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\944d670e7.exe944d670e7.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bc0f7de460834e5.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\bc0f7de460834e5.exebc0f7de460834e5.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 9264ee7753.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\9264ee7753.exe9264ee7753.exe4⤵
- Executes dropped EXE
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd9ed711254.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\cd9ed711254.execd9ed711254.exe4⤵
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 10445⤵
- Program crash
PID:416
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2eaca7cbe30dba52.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\7zS05B45497\2eaca7cbe30dba52.exe2eaca7cbe30dba52.exe4⤵
- Executes dropped EXE
PID:808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 5523⤵
- Program crash
PID:3980
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4604 -ip 46041⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1208 -ip 12081⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5450ab89d6718078dd74dc0285463ff93
SHA13e02a44ca9f39868a2c04b7d022159aa55753343
SHA256875a1e9b5b1371f70bcce8880809c942d1ca4ecbe933b7cb4eab213bfbe05c07
SHA5121a67e5cd9ef31c188c492e17147860255d9fe65dda4548c7ccab267e8905430658e8aa15659267a6813f3fe34ec0121547e753e08cba1c44f980b6e95a5b98a1
-
Filesize
8KB
MD55b8639f453da7c204942d918b40181de
SHA12daed225238a9b1fe2359133e6d8e7e85e7d6995
SHA256d9008ee980c17de8330444223b212f1b6a441f217753471c76f5f6ed5857a7d6
SHA512cc517e18a5da375832890e61d30553c30e662426837b3e64328c529c594c5721d782f2b5fe2aa809dcd01621176845b61f9e9ba21ce12234a75872391d313205
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
312KB
MD54168326befe9ff224af10c2dd3adbb2c
SHA139b84077951312529796822e970fde442f10b2ed
SHA2566d5735bc40818aa5725dd06e8145f2d653c9bc64c89e6b1b3b3917f5b6b61770
SHA512494c9f647241d58c6da2a79ecc51ebf1cf6df00c78aa54481ec4f557e8f167304dd7872c96c0b0cd56805d224d286745db86e494091b224a288e05beae075ea5
-
Filesize
165KB
MD55f6f8e5a5e6ba53f8f785b575573451d
SHA197b99adefc3ecca6be60c882b563853091f586ef
SHA2566f8a7657b62f79b148d6b930641ef70eb0d8bc909377439819a0db601ca1c0d8
SHA512ff6491641fc985bd03421e8565b36322017da9a647015bcc399b3ca73c675749d3e22eee5e437283b22b6a05240f6bd1bf8eddc0ef3be233fd8c40fe82fead05
-
Filesize
649KB
MD5ae0c81e67caea27ab164697a6e82c4fe
SHA17478f88ae345623eb67792b9ea719e0ec6480bbf
SHA2560ee36078c94b22714e3e44b355e5e129e63bff8df02f0df13a2b1ff207f0f5f5
SHA51280cd1f932a946f6567debd0b1cbfad7214034da471f85609bc41a9fdc845417adca87261044ac2011279d69160f38d438e44336ae7447a7c7bc855a6de30d25b
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
4.2MB
MD5512e7c6981a3c5a4fe65a4b2ae42cb75
SHA187bee758506ae4e22c221b65aaa47b697404a2c6
SHA25661a8b4929b9b61411b8af256cb4d1813ab80fca153e6edb18990959496c52a94
SHA512abd324760aecfac9decdd1883e75f4f22d9693e39d6a7dd395f64d12db2c8a6cf869574d7cd2848af02ad45269ba9c161dc99c4cbdf9ff0e430eeb435e925f52
-
Filesize
2.5MB
MD5f90360d79f05a2bce3ff30decdc7ab8a
SHA1642ce3f162cfd831ae441e1c7008a85156e4bfc7
SHA2563d077f8f9e465b096f0d119ac1b03660a4b71a6cbc030f6ae3a699f4e76ffcfb
SHA512686ef2cde3300d845ae64a4a6c85dc8b532d9cf33e47ee4421671d49a8eefc5d6bfb18a9635c772cf8203e260f138e0061d0cdf896c2d58d37949d0f1dedcf4a