Analysis
-
max time kernel
1s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
cceff411feab78a02a22744e2eae9ab8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cceff411feab78a02a22744e2eae9ab8.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
General
-
Target
setup_installer.exe
-
Size
3.9MB
-
MD5
3394285ab7e1ef48bc775f71ed7b0a76
-
SHA1
646fadf1a0a0dafe07319c86de0587ed96a0fc2b
-
SHA256
732b086183981289f4dff07f2054fa1356bba8d975359e2f40b6f1adae084467
-
SHA512
31d754a5f0f005eaf18eed0bd021e2c3698935dd51b10e7c21d4236abe875faf9945aad12e8711da9e42952ab586adf4c98f4a3d6db48e00ab53bb02b7258dc8
-
SSDEEP
98304:xWCvLUBsgUhDskhlxVOIRNa28BBF4VQMGXB9UpWib:xfLUCgUhDskhlDO28fTAtb
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral4/memory/1172-154-0x0000000004FD0000-0x000000000506D000-memory.dmp family_vidar behavioral4/memory/1172-169-0x0000000000400000-0x0000000003346000-memory.dmp family_vidar behavioral4/memory/1172-181-0x0000000004FD0000-0x000000000506D000-memory.dmp family_vidar behavioral4/memory/1172-180-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x0007000000023207-24.dat aspack_v212_v242 behavioral4/files/0x000700000002320b-29.dat aspack_v212_v242 behavioral4/files/0x0009000000023200-23.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation setup_installer.exe -
Executes dropped EXE 1 IoCs
pid Process 4124 setup_install.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 17 iplogger.org 20 iplogger.org 16 iplogger.org -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipinfo.io 9 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2092 4124 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 4124 3956 setup_installer.exe 85 PID 3956 wrote to memory of 4124 3956 setup_installer.exe 85 PID 3956 wrote to memory of 4124 3956 setup_installer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\setup_install.exe"2⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6f1aa71747b4a291.exe3⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\6f1aa71747b4a291.exe6f1aa71747b4a291.exe4⤵PID:4904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c0f099be1ace2.exe3⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\c0f099be1ace2.exec0f099be1ace2.exe4⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"5⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"5⤵PID:2836
-
C:\Windows\winnetdriv.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" 1710558073 06⤵PID:2212
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c caa4baaf544.exe3⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\caa4baaf544.execaa4baaf544.exe4⤵PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 24ebc9ce784c63.exe3⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\24ebc9ce784c63.exe24ebc9ce784c63.exe4⤵PID:3328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c d55cc0d45c3a05.exe3⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\d55cc0d45c3a05.exed55cc0d45c3a05.exe4⤵PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 621c13b77.exe3⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\621c13b77.exe621c13b77.exe4⤵PID:1172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 3d1f9c2a6.exe3⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\3d1f9c2a6.exe3d1f9c2a6.exe4⤵PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c e4f0738cc5646a38.exe3⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\e4f0738cc5646a38.exee4f0738cc5646a38.exe4⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe5⤵PID:3668
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 09b9624c6ac9.exe3⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\09b9624c6ac9.exe09b9624c6ac9.exe4⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\09b9624c6ac9.exe"C:\Users\Admin\AppData\Local\Temp\7zS47F4E757\09b9624c6ac9.exe" -a5⤵PID:2792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 4883⤵
- Program crash
PID:2092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4124 -ip 41241⤵PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
345KB
MD5079d742f6fc3fcc2eca352a1537e5103
SHA1d904d7432a367ad078c99c281b67705e7332496a
SHA2564e3b1d612eac7d9177e63042118ef6171a4cb074abcd2dd34704a96a47e27f39
SHA5124e27380efcf33a467f2b9fe14b147d0290488bb55d7f637654b6c8c52b50a7046828c8b3fc10049e6b0b5e0f8557aa4a5209981218f1b0008eb266d62483a27b
-
Filesize
680KB
MD580cf471e52dcc848d81092439489f12f
SHA15fc33906263bbb3cbf306e69b9c5ef2260ace7e5
SHA25669e562f8d0968dd248d2d9dc5de0cc42495e06f8b8563b10425bd8064033be1f
SHA512958752f053887bd2f9fbd03cd345585deded65228d093499a3d4e94071b0d9073b0ba7924c2d83bb0fe4f7f4d2274a53416fabfcc0bf45892d23eb29d4162131
-
Filesize
155KB
MD52b32e3fb6d4deb5e9f825f9c9f0c75a6
SHA12049fdbbe5b72ff06a7746b57582c9faa6186146
SHA2568bd8f7a32de3d979cae2f487ad2cc5a495afa1bfb1c740e337c47d1e2196e1f2
SHA512ad811d1882aa33cce0ebbab82e3f2db7596f88392cd9c142aef0b0caa4004afcf0253f25e7a8f228778dd3a2ec43d2028985a3e85807438c5bed3ae4709f9cfa
-
Filesize
480KB
MD5a570b0e1f2d113f0e4038f9236124d77
SHA10665d69540e67c7ef4d4e6dcff42aada291a42bd
SHA2566335fbb96909c607132546c5b3abe102dcb0286afb2b51ed2e59a71840163307
SHA5125376c7bce1499fefabbb89acdca1fd1c0a9a101f3af0af1d6231a7fc28fda848b2577609f8ecdd69b34d3487f53a82c865ceb0d1fea16f5fb442c4789ac55d3f
-
Filesize
923KB
MD513a289feeb15827860a55bbc5e5d498f
SHA1e1f0a544fcc5b3bc0ab6a788343185ad1ad077ad
SHA256c5483b2acbb352dc5c9a811d9616c4519f0e07c13905552be5ec869613ada775
SHA51200c225fb1d88920c5df7bb853d32213a91254fb8c57169c58c8b0ffab4501486e24d87e3d8f5665b16e366362cb81deec535d833ed42434fdc31f0400ee7ffa7
-
Filesize
8KB
MD53f9f7dfccefb41726d6b99e434155467
SHA1f5a7b26fb2aa6ebb7177b30b24a7fdbc067de8f1
SHA25637342babfd23ab30837a55886012a5125c69d2e5f883dadfc06a42cfb28e5b34
SHA512e0ac41a8c91e8521c8ce46444299c892335af5bfce7683abb915d8ede4f7638e9e76bbd9474fffa3f12cbc11725790b4be82d856aadd55027e8186bc1b6c1762
-
Filesize
772KB
MD50ed97381a261c56e5a8985db10e4b98a
SHA1661ff0f5d0c821636491781668c354f158edecb3
SHA256441b8bc2b3ab15ceeec273980e06a808b5cf686ee5e0f45c6cee271e1b609508
SHA512c07722078a59ba589811ec8dc7d0aac70f4e5b82e8ec5fe3609e67509f212d4403d70ef2c3df4a5576cead004e65f6d0b5be2958ec3cf9d53683ad0726b5ca7e
-
Filesize
674KB
MD5ed24678617fa093e5881f8a527c206d7
SHA120b84a764db634e111345d9bd9744dbb4d84a506
SHA2561aae1d0e5460385412a58416d81e57b319e7f972c88943fe70dfaa688dadd3c2
SHA51267a11c4ec027fc060c17bd75c4bf2f42d24441385f874a987a3fa4f20a50f983ea1fe63ed36abe0ad17f0e84e883eb397c17e68578a949893ab06ba4bc9c4564
-
Filesize
1009KB
MD57e06ee9bf79e2861433d6d2b8ff4694d
SHA128de30147de38f968958e91770e69ceb33e35eb5
SHA256e254914f5f7feb6bf10041e2c705d469bc2b292d709dc944381db5911beb1d9f
SHA512225cd5e37dbc29aad1d242582748457112b0adb626541a6876c2c6a0e6a27d986791654fd94458e557c628dc16db17f22db037853fae7c41dde34ba4e7245081
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
4.9MB
MD52560c441b8a6db472d079728e5dc0694
SHA128826b1ea8c0b04f39ebf35bc92bb99ba02aaf50
SHA256c8c6bd740dc24486d02c8f504453c7a4cba39eadc554188ee82b872023f7fd6a
SHA512a856ed68ab943eebcc5718dbb5baec08f8d02d333ca46046a533cb5a2848e54d1c366f102666313bbe3862fb38b797a5c370314801bf4bc9fc51063ef336a222
-
Filesize
2.6MB
MD5821b8c8c2b2da44c648deee34446499e
SHA1b07ce5b436f62ed0ea0f089a2f789f3d76f9e92e
SHA256ba5c8e29f2800f1ea19d21fb894d6b602a8775ec5ef0ab124de5a2098450d6e7
SHA512999c0a2fda72771ee660d6068d66be8666e6e3b4643cf3864fc69e8236073080e04e340d6493852dbb9f6ba5660230dd3c5ea58e7cc16f06ef8bee700e6fa16c
-
Filesize
1.6MB
MD55586cbca0c37b937f36a315e086b341e
SHA1b8cc277edc71c211316a73a233785e69dfe7d43a
SHA25646d22cc7ed9d7c9457510dd484993a08cbccfcfcc04bdf85993f6a0c414b95bc
SHA5129d933612ef0d8d4aa804c23a2c4b54b47124324cf84bb660dcfeade565b2b28aedf38120deb2099c0d2482f834830477bb24b53d90c3d1e7b6e44b0cecb2eb56
-
Filesize
1.2MB
MD5ef5fa848e94c287b76178579cf9b4ad0
SHA1560215a7c4c3f1095f0a9fb24e2df52d50de0237
SHA256949eec48613bd1ce5dd05631602e1e1571fa9d6b0034ab1bffe313e923aff29c
SHA5127d4184aa762f3db66cf36955f20374bf55f4c5dbe60130deaeade392296a4124867c141f1d5e7fbf60b640ef09cce8fb04b76b7dd20cbac2ce4033f9882a1071
-
Filesize
43KB
MD5ad0aca1934f02768fd5fedaf4d9762a3
SHA10e5b8372015d81200c4eff22823e854d0030f305
SHA256dc10f50f9761f6fbafe665e75a331b2048a285b1857ad95e0611ace825cba388
SHA5122fba342010ba85440784190245f74ea9e7c70974df12c241ccb6b72a6e1006a72bd1fa2e657f434d7479758f9508edb315398f6e95d167a78b788cea732be3b7
-
Filesize
640KB
MD5d93d6e028a5f5c4ed5c72eb6ac55a7ea
SHA1c76395bfc8ecd7c1d1b46a9904491ba1154c2f22
SHA25613477eac4f353e4af1c994f5aa7ff9018b000482bb3068f5d664d55befb52840
SHA512b6b644d43d5d099621f59e0b3a7656089bd84a7dccd6f80f414d35268d47c60a9deaf4d4cfb18de990f5470988f4c824ba1cf346b172800d3c73b188c8b04496
-
Filesize
320KB
MD5387c09a66dacbba782c5449c03529836
SHA163b650b0c5cd93d1a6ae3fdd45420a6cdcdda924
SHA256c7565c4087d42f8ce4dd2fa3787a139bd6ea520358a2c5f7d2215c4c959e5ab2
SHA5127d00cf93a4020d7e6cfefef9df98f1d2d68b1c08ab003e634e0ec451d65f17966d31a75b0900a740a4ffd2862033561a378f07345db8608e7400c8c708abfa59
-
Filesize
256KB
MD539d660ebc9d84a0d630aa90da7edf391
SHA19e10dd4028531dcfedd7c7725ed1b1907792784e
SHA2561e394f30ae232a9eb88cc23016ab1247b8aa6bbe4a39ab6e60b8b7a36fa67eab
SHA512f6fb1fbd7d2689416ea4ea0f7fdff217bda442975c2f3d81788088bbe160683b7fb17c113704d04675dcb36851cfc9517a2d74b6e41d24886a8cabf2e488b4e2
-
Filesize
335KB
MD55ca0297f81943abdd49a82fad8338442
SHA1dc15eef4cbb45b62bd03b8ddd3442f337f985c04
SHA2565c04ff121d232422b234b3f98d0748484d23d4cef6d2f6c575b2d583751ea8c0
SHA512b649abae746fdcbfb2d7a19914c9ed02d4d3df01d33f909cfbdc06376c8e3b26ed29615f4848df51789b628daeea0c293bd47be4f9b463c51b6d0576c592d706
-
Filesize
869KB
MD501ad10e59fa396af2d5443c5a14c1b21
SHA1f209a4f0bb2a96e3ee6a55689e7f00e79c04f722
SHA256bef1cffaba8186ce62265e0b322ca9fd9326a8929591df569a4953456c752137
SHA5121e067ade999ff933a644fde66c6ab9abb8a960ce1c8064368adcde4c09d924bd22d1b43c68b7c968e982fc75937969a2876e9e2a024f72e693f9ba397d449e02