Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:42

General

  • Target

    e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b.exe

  • Size

    646KB

  • MD5

    6c89d3f6b678bc64af6da3c9cacac5eb

  • SHA1

    42da6d05e4fb3d6e51d47dee8f4a2c2c6cef04ae

  • SHA256

    e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b

  • SHA512

    168a384f58da9afbb13ea68ca814142ac573c2267eb9d846f5432e0340e3d9dbaa6bdf0f1cf44a1388050b736e28ef04d2a689136d86b2bcfd5c7ffa207e4130

  • SSDEEP

    12288:JMrqy90W9/nMPyouTEjheF02hAyGg7mLaf8T+XfvMVk1U8nz:vyNnMPxjmAmRihEz

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b.exe
    "C:\Users\Admin\AppData\Local\Temp\e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DX9ZM55.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DX9ZM55.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1hn16Rm3.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1hn16Rm3.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3160
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Sm8061.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Sm8061.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4644
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3BA66eq.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3BA66eq.exe
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:3876
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3744 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2124

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3BA66eq.exe

        Filesize

        30KB

        MD5

        3ff910311518e3e875c7c229d72afe62

        SHA1

        f6d0c0e047924f2476bcf572a2be6d3d0795c8d3

        SHA256

        1a0fd6808a5cd2a20eebac205a0178d3c517d176d1dc4db35edf987f20e3566b

        SHA512

        c5edd088a4301ee31a74e7d3230ad22d16aab691adf7a11eff1695732f8dceaab2a1598a153dcf88fff1ff256720f440ca90d18472982b3d3954f7f1e47b303d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DX9ZM55.exe

        Filesize

        522KB

        MD5

        b34b7345af28f59b2537dab5dcf2c534

        SHA1

        57d592de60e31b3a4412bb1ce78cb572601372ae

        SHA256

        5c8320c5403381448ec515cea696100a9bcbcfd93f37efa14fc283182be1fa91

        SHA512

        bbe2b2d7889ff0a1087f6b476c0f3a836aea304ae1233c29125ece388e34cc30e5c9f120620e710b0f6f5bf1549c0ea51e435124cc23c3445db8277568bbf821

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1hn16Rm3.exe

        Filesize

        878KB

        MD5

        8336929ebef057ab6938f8e343384040

        SHA1

        4ca9e0ccf7774eaa3670de838ac04984c73f4123

        SHA256

        ab20e8108ec095eff6ff90050b669b1aa089147af22f8a01d35d08416605b9c9

        SHA512

        c5e7087b787cadf7ce18597ab236efcacdbbd8e9c920e59b1daf4357c72aeed74103f17a3ac5cb4cfacd5d24022acd8f10e1056c0a9aabd5f221b6a4dafa8af1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Sm8061.exe

        Filesize

        1.1MB

        MD5

        89e50292a62aac1c99ae07f036736887

        SHA1

        f4e0c7068fcaaace5ed5d2d84ab1dd765efc8043

        SHA256

        4d4bf5447a65fb2fae6a4a40ea6aa3e86d750226fee06443d1c3039c3c9a3833

        SHA512

        adc8e74b1c1aba69b09dd8d775ae2cccfbc36b8f22a3bfc50cac0f183e1e814b59437acfda4885e7dc67b615ce1ae4a7b44f202bafa38caeb24dcb78f22e52b5

      • memory/3296-26-0x0000000003300000-0x0000000003316000-memory.dmp

        Filesize

        88KB

      • memory/3876-25-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/3876-29-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4016-14-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/4644-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4644-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4644-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB