Analysis
-
max time kernel
0s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
af01213c6e231fc59e9518f831a30d36.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af01213c6e231fc59e9518f831a30d36.exe
Resource
win10v2004-20240226-en
General
-
Target
setup_installer.exe
-
Size
5.7MB
-
MD5
f520fbbc3c9dd2bab0c20cf9344c52de
-
SHA1
42d765e553ae1d1f77b3943c8393669d0df23399
-
SHA256
87f0504c6abf8b77d9106cc603f9b60ac7ae0f90e78876c727290ef7dbda2758
-
SHA512
3fc000fb0c1ebce51818bb308fd4a74079dd7fd6c689a94a778b7350ade27db9d4a6b528ef7f0ba1b5efe314f756ec816e4a3509606e27253d1b4b3786e898c8
-
SSDEEP
98304:xPCvLUBsgV+NRo3QLA8szhaxi6FBN/WuGNoKGvCQOIkV43AvSo3RcFi:x8LUCgDra4WBNmXALkVUAvSo3Rcw
Malware Config
Extracted
nullmixer
http://znegs.xyz/
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
pub6
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral4/memory/3640-101-0x0000000000FB0000-0x00000000017D6000-memory.dmp family_zgrat_v1 -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral4/memory/5012-115-0x0000000000400000-0x0000000002CC8000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000700000002320f-30.dat aspack_v212_v242 behavioral4/files/0x000700000002320d-23.dat aspack_v212_v242 behavioral4/files/0x0008000000023209-22.dat aspack_v212_v242 -
resource yara_rule behavioral4/files/0x000700000002321b-85.dat themida behavioral4/files/0x000700000002321b-79.dat themida behavioral4/memory/3640-101-0x0000000000FB0000-0x00000000017D6000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 37 iplogger.org 38 iplogger.org 39 iplogger.org -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ipinfo.io 29 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2112 3472 WerFault.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\setup_install.exe"2⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 824f4766e821701.exe3⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\824f4766e821701.exe824f4766e821701.exe4⤵PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 41e718b8b1c32.exe3⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\41e718b8b1c32.exe41e718b8b1c32.exe4⤵PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME44.exe3⤵PID:592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2424320fd3.exe3⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\2424320fd3.exe2424320fd3.exe4⤵PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c aea4d300485.exe3⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\aea4d300485.exeaea4d300485.exe4⤵PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 7529e76a5fb92d7.exe3⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\7529e76a5fb92d7.exe7529e76a5fb92d7.exe4⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 689f2a8e13ce6.exe3⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\689f2a8e13ce6.exe689f2a8e13ce6.exe4⤵PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bee7625d7f3708.exe3⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\bee7625d7f3708.exebee7625d7f3708.exe4⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 228d434d1f139.exe3⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\228d434d1f139.exe228d434d1f139.exe4⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\228d434d1f139.exe"C:\Users\Admin\AppData\Local\Temp\7zS41AAC877\228d434d1f139.exe" -a5⤵PID:4056
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 4963⤵
- Program crash
PID:2112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3472 -ip 34721⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD53263859df4866bf393d46f06f331a08f
SHA15b4665de13c9727a502f4d11afb800b075929d6c
SHA2569dcacda3913e30cafd92c909648b5bffde14b8e39e6adbfb15628006c0d4d3c2
SHA51258205110a017f5d73dd131fefb1e3bbbcc670ed0c645aeefebe5281579c7b1dceffa56671cd7b186554bdb81710e21018ed0d7088a27517dfc5e48d6d3578cf6
-
Filesize
3.5MB
MD501ad8becfa95a1b2b070c9ecb3598df3
SHA12881a224c3317670559f92e7bfc0f93d31a7b017
SHA2562e27cec2673587fc246fcfd971dcf6ba465dfad859fff5ee2e342d9d358958e6
SHA512c2b33b736788ba05ed7ce7e5c9b91aed7e0e8c4d2e01791ead1719396ca223da621a37d395cf4732f7e07289d4c75f6f26b27b6d41cacb5f7029465693c5c0db
-
Filesize
704KB
MD5a2b381367bf54d6c69e378212329044d
SHA1940cf36b7f692a95bad4082bb91a8b07e6e29ea5
SHA2569a6120c85717db10e87c79af6b75d51f5c6af8651b6910a64eeec9a5c3c84d1c
SHA512794417884c605bd9352f0b886e6a1beb8dcdcfc13f42721d5a5b5e3cddf61a59bfc564e2ef0d9e697a48bb64b343a0e695cb8340e2e4657542ee1ca5b4c44985
-
Filesize
582KB
MD5bc0b69ac287afeb066f391bb2f22baf5
SHA174048d15337376fbf7582126fc23f3bd54312564
SHA25643be5dd1f8f65066381f36b797f089ba7a81e49739a714d0895f42df71e2fad9
SHA5122f42d08716dcd597edd28c2af5a7eff3f594d004421545c1f5011f3dc869d15da432984f34fe3d723cae2e03fe120bdf2ae34618ac05e2ce5058863aa054c3da
-
Filesize
384KB
MD5b470e6ad9a94388496d6097d58d9aa31
SHA1911a40d2c1aa4a2d085bffd848e39d89b22e1bfb
SHA25689e01d1c0ec8131cc8906c72def48086d459ee96b1de4a624526d944ba859698
SHA512d07e9b48c49e328dcd647909abfe221391b7f9892ea2c5cbdb631253d7392245a3836e99ad446ab3da735dc5305ae1588ece940e6d39ab5e1a3b35afe69ff44b
-
Filesize
1.1MB
MD5a051738e14996c0262f274e4af07834c
SHA1d02385a4b11ee48c4ee841c88ebdd2bf844ceb2d
SHA2565c3b7252c6236eb362ac63a646fdf5a321937dd8a4efc60e9e256de318033d89
SHA5125ba0e8180462852c9c773861f9e69c30855089288690b8bf018dcc847dfe0e33de63701bcd01a74c0609327162f461424ec57cdd7acbe84bf38c1783a1539632
-
Filesize
215KB
MD54c8939a560e78c5c324126d9d8a14b57
SHA1ec1bee8aab430dc05576f7b3699dcc4860f8f53f
SHA2566044c7b278914379e2346af243e34af76ab3723916f8fa508f4d102effcaa626
SHA51228c2e0d8832d4a64b1a7245fd8c8d8248828c0a71f4d751fc4be4f6d2003a5b10c3240e037f8b3e6345bffe7702b7c6f5dc5cea91d37d69e758ba002bc9debab
-
Filesize
128KB
MD569bef7235e9fd6460bd1849cc51c8e37
SHA1c9340b6dd61a3f029b41f5674e3f0e778046d59b
SHA256424c078e45c3d1bb2c4127bc774da1a99f40ad43efc2123c7b3e43ecb51415ad
SHA5129bad7435787c1dd596fad600c1a6d87ba2317bc76ab05049817f713ab43b38ab67649867c051af6b91af25635fe4f0bce8e5ed4351f89064f6ed4b37f657d81b
-
Filesize
165KB
MD5181f1849ccb484af2eebb90894706150
SHA145dee946a7abc9c1c05d158a05e768e06a0d2cdc
SHA256aeb2d203b415b00e0a23aa026862cec8e11962fdb99c6dce38fb0b018b7d8409
SHA512a87485005ca80e145a7b734735184fa2d374a7f02e591eec9e51b77dc2a51be7f8198ce5abfceb9546c48bf235a555f19d6c57469975d0b4c786b0db16df930c
-
Filesize
8KB
MD583cc20c8d4dd098313434b405648ebfd
SHA159b99c73776d555a985b2f2dcc38b826933766b3
SHA256908b275d6fc2f20e9d04e8609a9d994f7e88a429c3eb0a55d99ca1c681e17ec8
SHA512e00009e1f322a1fe6e24f88a1cc722acf3094569174e7c58ebf06f75f50a7735dcebf3e493886bbdc87593345adc8bb7b6f2daca2e64618f276075a0bb46bb8c
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
5.7MB
MD523927e34f6addc488696423cfccc3373
SHA1a0be43ef34b8ba60b44b924c5af1b62f32272631
SHA256163a7bef8e04e3c8a82c5205ef6b3f1b80fa9220c8badf74815f531427ad750f
SHA512c093b584b03987f800dc28422f2966dd4f4f0a0170b7335c64816afcd41d02e6e2db9b8c5b01f0119b77fec4cdc2874bdba5120ab6796da1f5a15e89c6b0ee9f
-
Filesize
9.3MB
MD525f7e142f68ed8682eec42fc8f1fe888
SHA14a2fbd39b419b8976bb270790249e6f051929cb3
SHA256adf497bd338651110bc12fb49944da6da637f85fc490a2cfe35ed169880a4ff3
SHA5125a53f8a956242cb163629c0e90d208be5cb6ea42a9b89d8ec0f7d789828054e51cbd61304a552d52aaa28066bffec132769dd070e2b9adefb6984e18364e1df1
-
Filesize
9.0MB
MD50d05792cd05269f999f7d6240bc4ebb6
SHA13afa2939e5d00d15616471be507e7fb080cb7309
SHA2565161330c003aadcb0576b795e30165aba13667d591b101f6708208a577ca0ec1
SHA512ecda25a0bacc9843db60383c8a314302fac523b5a5649ed14cbc67e56b2a44faf0cbd291121bad787ed566e457327f2fa29745f2bcabea222d3875d9f88efbe3