Analysis

  • max time kernel
    1201s
  • max time network
    845s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2024 21:57

General

  • Target

    e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779 (copy 1).exe

  • Size

    1.5MB

  • MD5

    269d7e74e4b21a2fc0e66907c77fc0bc

  • SHA1

    fc09525a2f93bf089d0b02c5220e7ee452e64747

  • SHA256

    e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779

  • SHA512

    e0a257ed553383a06267c124b8d72215d6f155ae02ab6d327258c621835957c39e5567c012777fa80f087e578b9a2e1519ead076948b79b1145103826db4bdd0

  • SSDEEP

    24576:Eg5ks+W8y6AFZexyuCkfHGFV01gUSvriQMbOyK2jYR2J11RaLNBDj:EgrHa0ZAhIVQFSv2LtwRG11R+F

Malware Config

Extracted

Family

nullmixer

C2

http://wxkeww.xyz/

Extracted

Family

smokeloader

Botnet

pub6

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 32 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779 (copy 1).exe
    "C:\Users\Admin\AppData\Local\Temp\e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779 (copy 1).exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS038D4146\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c karotima_1.exe
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1040
          • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\karotima_1.exe
            karotima_1.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            PID:776
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c karotima_2.exe
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\karotima_2.exe
            karotima_2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 372
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1740
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5786B97B-A669-4B1E-A3EC-519B4C58CEA1} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Roaming\cviviei
      C:\Users\Admin\AppData\Roaming\cviviei
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 124
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\karotima_1.txt

    Filesize

    640KB

    MD5

    d8d302dc4a45234f4b52a6d804fa4887

    SHA1

    a8e320473f40770c57658cbb8dd82a1b6741d52b

    SHA256

    e52b10ad37e87a4b58dc4e67c9fa71514f60ad22b13eb004bc438172726a4932

    SHA512

    5a6f37ad6376269ac43b9358cdf179919a75219a33d0e6fb573046dbc5a2c6ec518d85da195355a7074b0b7017ffc66e6ff4da77cac6ab091976917faf71f29c

  • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\karotima_2.txt

    Filesize

    222KB

    MD5

    80e74cf9f38c5712c6c2432a509c8bc7

    SHA1

    62ccdca04b3685728ce7f1a785cc01f3a3f3b3dc

    SHA256

    9ff44c4da853cdbe606d2cfe4d04b410c3ae603acf0f1d3f75195b6236e0e123

    SHA512

    d602cd95ad38cacae41b4848e72ac54ad81d287e1c825d68a088009512b14b5290a5a6c3032ebb2c91fecb5f743d519e92f1ccb27f5fe2841094a693d2b8de49

  • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\libcurl.dll

    Filesize

    218KB

    MD5

    d09be1f47fd6b827c81a4812b4f7296f

    SHA1

    028ae3596c0790e6d7f9f2f3c8e9591527d267f7

    SHA256

    0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

    SHA512

    857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

  • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\libstdc++-6.dll

    Filesize

    64KB

    MD5

    ad1c548ca77cecc49364855223401511

    SHA1

    523a06384633aadeae0b25ad1a44aab62342c69a

    SHA256

    7d9113e74a2adf1c93adbe5c7936f2426d1bdacd21d8b724e83c23f6219d0064

    SHA512

    f8570fb383b7e045af093163feb6682ece6ecc8b5bc4c0441c25bd9d91ee9e34b99a685464d698d9e536293ec4525a5e1e6e729380e8364a300ad0cc2e9ddc77

  • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\libwinpthread-1.dll

    Filesize

    69KB

    MD5

    1e0d62c34ff2e649ebc5c372065732ee

    SHA1

    fcfaa36ba456159b26140a43e80fbd7e9d9af2de

    SHA256

    509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

    SHA512

    3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

  • C:\Users\Admin\AppData\Local\Temp\7zS038D4146\setup_install.exe

    Filesize

    290KB

    MD5

    118f130d93db3be4452ad8a0751509df

    SHA1

    4cac4b964784aadc7e6f41c21b854c668dca6981

    SHA256

    f7dec887c3345567ce86ce60cc8841a6a54eda35049811049debd1c5451656f4

    SHA512

    ec263d9cfc0a0324f8f79f6f6703f507d06f454cbc9964595a00d9606aae86c34920c8a10ef3d4413aceb85e33d731634200c0e7ee099b8a35baf8e69f46234f

  • C:\Users\Admin\AppData\Local\Temp\CC4F.tmp

    Filesize

    1.2MB

    MD5

    5a04bbebd5dc32540202effefd520442

    SHA1

    3374fe68c532f834ba849936851ec04d6262f895

    SHA256

    3d48e625938c6c5f97b084b123c2d9dce832ad14f762e81d91f7a335a01b98d0

    SHA512

    d831b0357f1f0d4484f0f54d7b098a25d4cb0a5b7b0dcadcfe58d6dc3a3cc5b8dabdf11192330c21ddd6f2aee4bcff65bd4db00a7e319e0a2b9f426b5907ab2b

  • C:\Users\Admin\AppData\Local\Temp\Tar7BAC.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\7zS038D4146\karotima_1.exe

    Filesize

    1.0MB

    MD5

    9108ad5775c76cccbb4eadf02de24f5d

    SHA1

    82996bc4f72b3234536d0b58630d5d26bcf904b0

    SHA256

    c9d5525b2f2b76087121039ee1c23ed35508e60f653479722ec64ea3a064878e

    SHA512

    19021a28555bba1fe1bdcdc8845f1bcadebd256c7db02b9329d6b44ae01a123a00e162cc34a97ba51f088cafa6f54ab1de8f82f771ac54b94a3a796f84f73362

  • \Users\Admin\AppData\Local\Temp\7zS038D4146\libcurlpp.dll

    Filesize

    54KB

    MD5

    e6e578373c2e416289a8da55f1dc5e8e

    SHA1

    b601a229b66ec3d19c2369b36216c6f6eb1c063e

    SHA256

    43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

    SHA512

    9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

  • \Users\Admin\AppData\Local\Temp\7zS038D4146\libgcc_s_dw2-1.dll

    Filesize

    113KB

    MD5

    9aec524b616618b0d3d00b27b6f51da1

    SHA1

    64264300801a353db324d11738ffed876550e1d3

    SHA256

    59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

    SHA512

    0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

  • \Users\Admin\AppData\Local\Temp\7zS038D4146\libstdc++-6.dll

    Filesize

    640KB

    MD5

    45d0ae2978a04a49481e29763a6cc5d3

    SHA1

    0a50edb632cb71e712bd47a38a97c4b581f3d1f3

    SHA256

    9c68c2b2d5cd1405b27a971d9137016d45a029339e39ccc06586b89f09254086

    SHA512

    bd592dbc1f543dbf8009ea71f429ab6600672f1cb7a4f36396224ec501acd8777f691e61c211e491545718eacc2e1b0657e40f529ecdcca40f12a53ea8fb3a82

  • \Users\Admin\AppData\Local\Temp\CC4F.tmp

    Filesize

    162KB

    MD5

    064abdceacd384571cd698bd2451529b

    SHA1

    d820445e8018865820bb25912bedb476928b4c50

    SHA256

    4ad79002d2dbeb306fdfa69ba73b7107cd1db8b52d4044d2f7ce6f94d0a03518

    SHA512

    eb976966f287a4c379c53ea77c76f5e2aebcb471b0d671e0307ba964ed63e9a08f2725da9c6ce13a014ee8ecb3d14360d78a9151a46c53f5a3c1327fb701fb8f

  • \Users\Admin\AppData\Local\Temp\setup_installer.exe

    Filesize

    1.5MB

    MD5

    78418bfb23c7adf70828f675e990de49

    SHA1

    534a26817c39972287abf166bb00c831440a1e57

    SHA256

    b14218cb639c6afa35a66cf418035ce10475b53f5386896a44327fd48d8447c8

    SHA512

    5df88e9bd4d241b69acba4499845e68286cd24fffed582864c24ad4c5d9bd47041c99ac32cc023c7a6dbe4cecaed39882274cbf4e12aedd5220c6e51075a8dd8

  • memory/524-136-0x0000000000400000-0x0000000002B7B000-memory.dmp

    Filesize

    39.5MB

  • memory/524-130-0x0000000000400000-0x0000000002B7B000-memory.dmp

    Filesize

    39.5MB

  • memory/524-127-0x0000000000240000-0x0000000000249000-memory.dmp

    Filesize

    36KB

  • memory/524-120-0x0000000002C70000-0x0000000002D70000-memory.dmp

    Filesize

    1024KB

  • memory/1196-135-0x0000000002C30000-0x0000000002C45000-memory.dmp

    Filesize

    84KB

  • memory/2096-268-0x0000000002900000-0x0000000002A1E000-memory.dmp

    Filesize

    1.1MB

  • memory/2096-38-0x0000000002900000-0x0000000002A1E000-memory.dmp

    Filesize

    1.1MB

  • memory/2096-31-0x0000000002900000-0x0000000002A1E000-memory.dmp

    Filesize

    1.1MB

  • memory/2104-164-0x0000000002CD0000-0x0000000002DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2104-170-0x0000000000400000-0x0000000002B7B000-memory.dmp

    Filesize

    39.5MB

  • memory/2692-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2692-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2692-74-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-75-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-70-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-72-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-71-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-68-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2692-67-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2692-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2692-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2692-62-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2692-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2692-73-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-60-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2692-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2692-139-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-140-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2692-141-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2692-142-0x000000006EB40000-0x000000006EB63000-memory.dmp

    Filesize

    140KB

  • memory/2692-143-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2692-144-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2692-59-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2692-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2692-46-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2692-43-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2692-276-0x0000000000A10000-0x0000000000B2E000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-278-0x0000000000A10000-0x0000000000B2E000-memory.dmp

    Filesize

    1.1MB