Analysis
-
max time kernel
300s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe
Resource
win7-20240221-en
General
-
Target
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe
-
Size
1.6MB
-
MD5
7a1a1ef5364d1de84ccda20479a6be66
-
SHA1
4141826fdaf7c15e6ee2f23ea0bdc2c5ef1e09ae
-
SHA256
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d
-
SHA512
7d2cf5b4894af33c56497883b6dc9d0d69ce6beb7bc6615ee2ad0b3bf1467b4e6080ca570cacd112dd011e2764b0bd663a3d05d0a72462cbbbbf49a05a7cca36
-
SSDEEP
24576:kmZ+I9s6x+YxgS7WvwCB06006XU6DixBQuGmTm:kmZ+Iqyri2NCBL6XU6mbQrm
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
Detect ZGRat V1 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2976-29-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-31-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-38-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-41-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-44-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exedescription pid process target process PID 2400 set thread context of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 set thread context of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2580 set thread context of 2976 2580 AddInProcess32.exe InstallUtil.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AddInProcess32.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AddInProcess32.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exeAddInProcess32.exeInstallUtil.exepid process 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe 2580 AddInProcess32.exe 2580 AddInProcess32.exe 2500 AddInProcess32.exe 2500 AddInProcess32.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 2976 InstallUtil.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AddInProcess32.exepid process 2500 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe Token: SeDebugPrivilege 2580 AddInProcess32.exe Token: SeDebugPrivilege 2976 InstallUtil.exe Token: SeBackupPrivilege 2976 InstallUtil.exe Token: SeSecurityPrivilege 2976 InstallUtil.exe Token: SeSecurityPrivilege 2976 InstallUtil.exe Token: SeSecurityPrivilege 2976 InstallUtil.exe Token: SeSecurityPrivilege 2976 InstallUtil.exe Token: SeShutdownPrivilege 1256 -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exedescription pid process target process PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2580 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2400 wrote to memory of 2500 2400 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe PID 2580 wrote to memory of 2976 2580 AddInProcess32.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe"C:\Users\Admin\AppData\Local\Temp\4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2500