Analysis

  • max time kernel
    276s
  • max time network
    1176s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-03-2024 21:57

General

  • Target

    e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779 (copy 1).exe

  • Size

    1.5MB

  • MD5

    269d7e74e4b21a2fc0e66907c77fc0bc

  • SHA1

    fc09525a2f93bf089d0b02c5220e7ee452e64747

  • SHA256

    e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779

  • SHA512

    e0a257ed553383a06267c124b8d72215d6f155ae02ab6d327258c621835957c39e5567c012777fa80f087e578b9a2e1519ead076948b79b1145103826db4bdd0

  • SSDEEP

    24576:Eg5ks+W8y6AFZexyuCkfHGFV01gUSvriQMbOyK2jYR2J11RaLNBDj:EgrHa0ZAhIVQFSv2LtwRG11R+F

Malware Config

Extracted

Family

nullmixer

C2

http://wxkeww.xyz/

Extracted

Family

smokeloader

Botnet

pub6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779 (copy 1).exe
    "C:\Users\Admin\AppData\Local\Temp\e6ea98b046b11a35efa0ac1243f6190ff4d4247a35784e65a9feaaf4918ae779 (copy 1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4120
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c karotima_1.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\karotima_1.exe
            karotima_1.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            PID:1784
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c karotima_2.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1560
          • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\karotima_2.exe
            karotima_2.exe
            5⤵
            • Executes dropped EXE
            PID:4564
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 304
              6⤵
              • Program crash
              PID:2912
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 540
          4⤵
          • Program crash
          PID:5072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4120 -ip 4120
    1⤵
      PID:1320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4564 -ip 4564
      1⤵
        PID:1580
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3704
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\CompressEnable.rm"
          1⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2728

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\karotima_1.txt

          Filesize

          1.0MB

          MD5

          9108ad5775c76cccbb4eadf02de24f5d

          SHA1

          82996bc4f72b3234536d0b58630d5d26bcf904b0

          SHA256

          c9d5525b2f2b76087121039ee1c23ed35508e60f653479722ec64ea3a064878e

          SHA512

          19021a28555bba1fe1bdcdc8845f1bcadebd256c7db02b9329d6b44ae01a123a00e162cc34a97ba51f088cafa6f54ab1de8f82f771ac54b94a3a796f84f73362

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\karotima_2.txt

          Filesize

          222KB

          MD5

          80e74cf9f38c5712c6c2432a509c8bc7

          SHA1

          62ccdca04b3685728ce7f1a785cc01f3a3f3b3dc

          SHA256

          9ff44c4da853cdbe606d2cfe4d04b410c3ae603acf0f1d3f75195b6236e0e123

          SHA512

          d602cd95ad38cacae41b4848e72ac54ad81d287e1c825d68a088009512b14b5290a5a6c3032ebb2c91fecb5f743d519e92f1ccb27f5fe2841094a693d2b8de49

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\libcurl.dll

          Filesize

          218KB

          MD5

          d09be1f47fd6b827c81a4812b4f7296f

          SHA1

          028ae3596c0790e6d7f9f2f3c8e9591527d267f7

          SHA256

          0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

          SHA512

          857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\libcurlpp.dll

          Filesize

          54KB

          MD5

          e6e578373c2e416289a8da55f1dc5e8e

          SHA1

          b601a229b66ec3d19c2369b36216c6f6eb1c063e

          SHA256

          43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

          SHA512

          9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\libgcc_s_dw2-1.dll

          Filesize

          113KB

          MD5

          9aec524b616618b0d3d00b27b6f51da1

          SHA1

          64264300801a353db324d11738ffed876550e1d3

          SHA256

          59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

          SHA512

          0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\libstdc++-6.dll

          Filesize

          647KB

          MD5

          5e279950775baae5fea04d2cc4526bcc

          SHA1

          8aef1e10031c3629512c43dd8b0b5d9060878453

          SHA256

          97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

          SHA512

          666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\libwinpthread-1.dll

          Filesize

          69KB

          MD5

          1e0d62c34ff2e649ebc5c372065732ee

          SHA1

          fcfaa36ba456159b26140a43e80fbd7e9d9af2de

          SHA256

          509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

          SHA512

          3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

        • C:\Users\Admin\AppData\Local\Temp\7zS4C43DAA7\setup_install.exe

          Filesize

          290KB

          MD5

          118f130d93db3be4452ad8a0751509df

          SHA1

          4cac4b964784aadc7e6f41c21b854c668dca6981

          SHA256

          f7dec887c3345567ce86ce60cc8841a6a54eda35049811049debd1c5451656f4

          SHA512

          ec263d9cfc0a0324f8f79f6f6703f507d06f454cbc9964595a00d9606aae86c34920c8a10ef3d4413aceb85e33d731634200c0e7ee099b8a35baf8e69f46234f

        • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

          Filesize

          64KB

          MD5

          4d2b68d677ac73dcb65ee825768911d5

          SHA1

          662ed4a8145efa1359dc1d4279f406d2cc394515

          SHA256

          5ee8d225fa0aba9acc29fa615cf1615072bf0e5e7ec8e9cedfcbeb57ec5caa49

          SHA512

          abbd76794f5e0916fb090d555f4d0f39a1ca7dff56590e505e1d1316e2aaaa530a50ca661da12166e151c15d42f7d56926fa0730c5ed68f71fc09483e9c93a08

        • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

          Filesize

          1.5MB

          MD5

          78418bfb23c7adf70828f675e990de49

          SHA1

          534a26817c39972287abf166bb00c831440a1e57

          SHA256

          b14218cb639c6afa35a66cf418035ce10475b53f5386896a44327fd48d8447c8

          SHA512

          5df88e9bd4d241b69acba4499845e68286cd24fffed582864c24ad4c5d9bd47041c99ac32cc023c7a6dbe4cecaed39882274cbf4e12aedd5220c6e51075a8dd8

        • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

          Filesize

          112KB

          MD5

          49359ff70a57cb30642f19081a825517

          SHA1

          e094c5f5f91c061f3670aa51ccbe0970830935b3

          SHA256

          ad816a23ead14eb21c323da6fdb5b1d98979398827a36e4b026627db38972f1d

          SHA512

          8844fd4b90b4cb820b07e900b72b321241b3e2285e783b4f12063c3515c90e2753fae7facfe144489bc39016191b317f344d43b28e63f7eb2d66ca322aecc51b

        • C:\Users\Admin\AppData\Roaming\vlc\vlcrc.2728

          Filesize

          93KB

          MD5

          478a4a09f4f74e97335cd4d5e9da7ab5

          SHA1

          3c4f1dc52a293f079095d0b0370428ec8e8f9315

          SHA256

          884b59950669842f3c45e6da3480cd9a553538b951fb155b435b48ff38683974

          SHA512

          e96719663cd264132a8e1ea8c3f8a148c778a0c68caa2468ba47629393605b197dd9e00efad91f389de9fcc77b04981a0cf87f785f3c645cdc9e4ebd98060ca1

        • memory/2728-107-0x00007FF852D90000-0x00007FF852DFF000-memory.dmp

          Filesize

          444KB

        • memory/2728-110-0x00007FF852CE0000-0x00007FF852D08000-memory.dmp

          Filesize

          160KB

        • memory/2728-126-0x00007FF852500000-0x00007FF852731000-memory.dmp

          Filesize

          2.2MB

        • memory/2728-125-0x00007FF852740000-0x00007FF852752000-memory.dmp

          Filesize

          72KB

        • memory/2728-123-0x0000015221050000-0x0000015221061000-memory.dmp

          Filesize

          68KB

        • memory/2728-124-0x0000015221DF0000-0x0000015221E87000-memory.dmp

          Filesize

          604KB

        • memory/2728-122-0x0000015220FF0000-0x000001522104C000-memory.dmp

          Filesize

          368KB

        • memory/2728-121-0x00007FF852880000-0x00007FF852A32000-memory.dmp

          Filesize

          1.7MB

        • memory/2728-120-0x00007FF852A40000-0x00007FF852A6C000-memory.dmp

          Filesize

          176KB

        • memory/2728-119-0x00007FF852A70000-0x00007FF852BAB000-memory.dmp

          Filesize

          1.2MB

        • memory/2728-118-0x00007FF852BB0000-0x00007FF852BC2000-memory.dmp

          Filesize

          72KB

        • memory/2728-117-0x00007FF852BD0000-0x00007FF852BE3000-memory.dmp

          Filesize

          76KB

        • memory/2728-112-0x00007FF852C90000-0x00007FF852CA7000-memory.dmp

          Filesize

          92KB

        • memory/2728-116-0x00007FF852BF0000-0x00007FF852C11000-memory.dmp

          Filesize

          132KB

        • memory/2728-115-0x00007FF852C20000-0x00007FF852C32000-memory.dmp

          Filesize

          72KB

        • memory/2728-114-0x00007FF852C40000-0x00007FF852C51000-memory.dmp

          Filesize

          68KB

        • memory/2728-113-0x00007FF852C60000-0x00007FF852C83000-memory.dmp

          Filesize

          140KB

        • memory/2728-111-0x00007FF852CB0000-0x00007FF852CD4000-memory.dmp

          Filesize

          144KB

        • memory/2728-108-0x00007FF852D70000-0x00007FF852D81000-memory.dmp

          Filesize

          68KB

        • memory/2728-109-0x00007FF852D10000-0x00007FF852D66000-memory.dmp

          Filesize

          344KB

        • memory/2728-104-0x00007FF852EA0000-0x00007FF852EB8000-memory.dmp

          Filesize

          96KB

        • memory/2728-106-0x00007FF852E00000-0x00007FF852E67000-memory.dmp

          Filesize

          412KB

        • memory/2728-105-0x00007FF852E70000-0x00007FF852EA0000-memory.dmp

          Filesize

          192KB

        • memory/2728-100-0x00007FF852F20000-0x00007FF852F31000-memory.dmp

          Filesize

          68KB

        • memory/2728-101-0x00007FF852F00000-0x00007FF852F11000-memory.dmp

          Filesize

          68KB

        • memory/2728-103-0x00007FF852EC0000-0x00007FF852ED1000-memory.dmp

          Filesize

          68KB

        • memory/2728-84-0x00007FF705090000-0x00007FF705188000-memory.dmp

          Filesize

          992KB

        • memory/2728-85-0x00007FF85B4E0000-0x00007FF85B514000-memory.dmp

          Filesize

          208KB

        • memory/2728-86-0x00007FF854A50000-0x00007FF854D04000-memory.dmp

          Filesize

          2.7MB

        • memory/2728-88-0x00007FF869EA0000-0x00007FF869EB7000-memory.dmp

          Filesize

          92KB

        • memory/2728-87-0x00007FF869F40000-0x00007FF869F58000-memory.dmp

          Filesize

          96KB

        • memory/2728-89-0x00007FF866D70000-0x00007FF866D81000-memory.dmp

          Filesize

          68KB

        • memory/2728-90-0x00007FF866100000-0x00007FF866117000-memory.dmp

          Filesize

          92KB

        • memory/2728-91-0x00007FF865760000-0x00007FF865771000-memory.dmp

          Filesize

          68KB

        • memory/2728-93-0x00007FF85B5D0000-0x00007FF85B5E1000-memory.dmp

          Filesize

          68KB

        • memory/2728-92-0x00007FF85C730000-0x00007FF85C74D000-memory.dmp

          Filesize

          116KB

        • memory/2728-94-0x00007FF854040000-0x00007FF854240000-memory.dmp

          Filesize

          2.0MB

        • memory/2728-95-0x00007FF852F90000-0x00007FF85403B000-memory.dmp

          Filesize

          16.7MB

        • memory/2728-96-0x00007FF855960000-0x00007FF85599F000-memory.dmp

          Filesize

          252KB

        • memory/2728-97-0x00007FF852F60000-0x00007FF852F81000-memory.dmp

          Filesize

          132KB

        • memory/2728-98-0x00007FF85B4C0000-0x00007FF85B4D8000-memory.dmp

          Filesize

          96KB

        • memory/2728-99-0x00007FF852F40000-0x00007FF852F51000-memory.dmp

          Filesize

          68KB

        • memory/2728-102-0x00007FF852EE0000-0x00007FF852EFB000-memory.dmp

          Filesize

          108KB

        • memory/4120-65-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-34-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-63-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-75-0x0000000064940000-0x0000000064959000-memory.dmp

          Filesize

          100KB

        • memory/4120-74-0x000000006EB40000-0x000000006EB63000-memory.dmp

          Filesize

          140KB

        • memory/4120-49-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4120-73-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4120-72-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4120-71-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-54-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4120-51-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4120-53-0x0000000064940000-0x0000000064959000-memory.dmp

          Filesize

          100KB

        • memory/4120-76-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4120-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4120-52-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4120-62-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-42-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4120-50-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4120-59-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4120-61-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-60-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-64-0x0000000000400000-0x000000000051E000-memory.dmp

          Filesize

          1.1MB

        • memory/4120-58-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4120-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4120-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4564-77-0x0000000002C40000-0x0000000002D40000-memory.dmp

          Filesize

          1024KB

        • memory/4564-78-0x0000000004740000-0x0000000004749000-memory.dmp

          Filesize

          36KB