Overview
overview
10Static
static
100di3x.exe
windows7-x64
100di3x.exe
windows10-2004-x64
10HYDRA.exe
windows7-x64
10HYDRA.exe
windows10-2004-x64
10Lonelyscre...ox.exe
windows7-x64
3Lonelyscre...ox.exe
windows10-2004-x64
3Malware
windows7-x64
1Malware
windows10-2004-x64
1REVENGE-RAT.js.zip
windows7-x64
1REVENGE-RAT.js.zip
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
0di3x.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0di3x.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HYDRA.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
HYDRA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Lonelyscreen.1.2.9.keygen.by.Paradox.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Lonelyscreen.1.2.9.keygen.by.Paradox.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Malware
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Malware
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
REVENGE-RAT.js.zip
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
REVENGE-RAT.js.zip
Resource
win10v2004-20241007-en
General
-
Target
HYDRA.exe
-
Size
2.6MB
-
MD5
c52bc39684c52886712971a92f339b23
-
SHA1
c5cb39850affb7ed322bfb0a4900e17c54f95a11
-
SHA256
f8c17cb375e8ccad5b0e33dae65694a1bd628f91cac6cf65dd11f50e91130c2d
-
SHA512
2d50c1aa6ca237b9dbe97f000a082a223618f2164c8ab42ace9f4e142c318b2fc53e91a476dbe9c2dd459942b61507df5c551bd5c692a2b2a2037e4f6bd2a12b
-
SSDEEP
49152:HnUXzRe4cjAx+L/G/3JHQZutOnmSzZniyui0EJHezdcc/DK9kTO1S:HUD8djA0LOvJdtOmSlniyuiPFePmS61S
Malware Config
Extracted
smokeloader
2017
http://92.53.105.14/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ufx.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation yaya.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation power.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HDAudo.vbs va.exe -
Executes dropped EXE 7 IoCs
pid Process 1704 yaya.exe 4340 va.exe 2208 ufx.exe 3552 sant.exe 3928 power.exe 3236 starter.exe 868 usc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netscape = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\sswgiggh\\suasjrgr.exe" explorer.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum sant.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 sant.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yaya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sant.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HYDRA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language power.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language va.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1376 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe 3552 sant.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3552 sant.exe 3552 sant.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 868 usc.exe Token: SeDebugPrivilege 3236 starter.exe Token: SeDebugPrivilege 3440 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1704 1440 HYDRA.exe 81 PID 1440 wrote to memory of 1704 1440 HYDRA.exe 81 PID 1440 wrote to memory of 1704 1440 HYDRA.exe 81 PID 1440 wrote to memory of 4340 1440 HYDRA.exe 82 PID 1440 wrote to memory of 4340 1440 HYDRA.exe 82 PID 1440 wrote to memory of 4340 1440 HYDRA.exe 82 PID 1440 wrote to memory of 2208 1440 HYDRA.exe 83 PID 1440 wrote to memory of 2208 1440 HYDRA.exe 83 PID 1440 wrote to memory of 2208 1440 HYDRA.exe 83 PID 1440 wrote to memory of 3552 1440 HYDRA.exe 84 PID 1440 wrote to memory of 3552 1440 HYDRA.exe 84 PID 1440 wrote to memory of 3552 1440 HYDRA.exe 84 PID 1440 wrote to memory of 3928 1440 HYDRA.exe 85 PID 1440 wrote to memory of 3928 1440 HYDRA.exe 85 PID 1440 wrote to memory of 3928 1440 HYDRA.exe 85 PID 1704 wrote to memory of 3236 1704 yaya.exe 88 PID 1704 wrote to memory of 3236 1704 yaya.exe 88 PID 2208 wrote to memory of 868 2208 ufx.exe 87 PID 2208 wrote to memory of 868 2208 ufx.exe 87 PID 2208 wrote to memory of 868 2208 ufx.exe 87 PID 868 wrote to memory of 1376 868 usc.exe 90 PID 868 wrote to memory of 1376 868 usc.exe 90 PID 868 wrote to memory of 1376 868 usc.exe 90 PID 3236 wrote to memory of 2296 3236 starter.exe 92 PID 3236 wrote to memory of 2296 3236 starter.exe 92 PID 2296 wrote to memory of 1612 2296 csc.exe 94 PID 2296 wrote to memory of 1612 2296 csc.exe 94 PID 3552 wrote to memory of 4752 3552 sant.exe 96 PID 3552 wrote to memory of 4752 3552 sant.exe 96 PID 3552 wrote to memory of 4752 3552 sant.exe 96 PID 3928 wrote to memory of 3440 3928 power.exe 105 PID 3928 wrote to memory of 3440 3928 power.exe 105 PID 3928 wrote to memory of 3440 3928 power.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\yaya.exeC:\Users\Admin\AppData\Roaming\yaya.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\luxedrav.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC45.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEC35.tmp"5⤵PID:1612
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\va.exeC:\Users\Admin\AppData\Roaming\va.exe2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Users\Admin\AppData\Roaming\ufx.exeC:\Users\Admin\AppData\Roaming\ufx.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\ProgramData\ucp\usc.exe"C:\ProgramData\ucp\usc.exe" /ucp/usc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1376
-
-
-
-
C:\Users\Admin\AppData\Roaming\sant.exeC:\Users\Admin\AppData\Roaming\sant.exe2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4752
-
-
-
C:\Users\Admin\AppData\Roaming\power.exeC:\Users\Admin\AppData\Roaming\power.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5b100b373d645bf59b0487dbbda6c426d
SHA144a4ad2913f5f35408b8c16459dcce3f101bdcc7
SHA25684d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7
SHA51269483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b
-
Filesize
1KB
MD53297daa79fc486f368fb89912a1e86f5
SHA166a00e3171ed65d26a05a27e7aa34550687003e6
SHA256699a778cb099e0231a9542a2378aa8f319d59568054dcaf2c56f539df5631fec
SHA512cec993e2313488b73696bb20eb26e4e3b0b79a2e291726a729162e7f24bad3985a2aa4c0a60c59be1681bfc0388b8d38fc24b73cda810ba73556c5a3698e7b51
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5KB
MD5b76f2eb770519b2b1c90d3b3c768a678
SHA10f54359c2f074040a280d29c42007ebb6a0d8962
SHA256ed11144e23975ec9041502332ae856d407cfde169620cbd40f8ae787c0fff61a
SHA5121c1f80d4d794dd7df099f3af1bd2db1387786bee7f44b8ef7ef42c10ba5c7e98465aebd135a1320ae53c0bc5b06eb28c6de344c00c2682f81c34cc3717cdbf43
-
Filesize
7KB
MD581697e3e698ceac6cce9bf36999019b6
SHA1010e61ad4d5f0ab24eafb3441ec4904dc9d58bc2
SHA2565f91f712426fe592d4e3155fb8dc04057da3a0726ea7f535b44b758aa951fdc1
SHA512ad2221f99054003fe3f0774e0bfee3f6c1a400fdec38a34cd7b357b6a5cc14b624f98164d2da862bfde07f75a8f106393cbc56bd7c581cfe1bae2fc995771324
-
Filesize
507KB
MD5743f47ae7d09fce22d0a7c724461f7e3
SHA18e98dd1efb70749af72c57344aab409fb927394e
SHA2561bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465
SHA512567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf
-
Filesize
12KB
MD55effca91c3f1e9c87d364460097f8048
SHA128387c043ab6857aaa51865346046cf5dc4c7b49
SHA2563fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907
SHA512b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0
-
Filesize
960KB
MD522e088012519e1013c39a3828bda7498
SHA13a8a87cce3f6aff415ee39cf21738663c0610016
SHA2569e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973
SHA5125559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8
-
Filesize
88KB
MD5c084e736931c9e6656362b0ba971a628
SHA1ef83b95fc645ad3a161a19ccef3224c72e5472bd
SHA2563139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1
SHA512cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f
-
Filesize
1.7MB
MD57d05ab95cfe93d84bc5db006c789a47f
SHA1aa4aa0189140670c618348f1baad877b8eca04a4
SHA2565c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f
SHA51240d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84
-
Filesize
80KB
MD551bf85f3bf56e628b52d61614192359d
SHA1c1bc90be6a4beb67fb7b195707798106114ec332
SHA256990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446
SHA512131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474
-
Filesize
652B
MD5131813a4fe5b9b26b1e3f1aff6e92266
SHA161319d8be507b5d4049c8015a66fe8ede9ee1504
SHA2562edfe781d37ef0fc39fe746e9a2aed716782ac3e5f35af49be1a135286e604ff
SHA512bb6dff7aaa01400101622c15360405840acc3b60add495e7d74d83915f5b366c78c6048e790820a91adb5369f909543aae143cc391daf105d7580950a058654e
-
Filesize
4KB
MD5a0d1b6f34f315b4d81d384b8ebcdeaa5
SHA1794c1ff4f2a28e0c631a783846ecfffdd4c7ae09
SHA2560b3a3f8f11eb6f50fe67943f2b73c5824614f31c2e0352cc234927d7cb1a52e0
SHA5120a89293d731c5bca05e73148f85a740b324fc877f2fb05cde1f68e2098329fbca552d78249a46f4a1da15a450c8e754c73be20c652f7089d5cfec445ce950a0e
-
Filesize
309B
MD5eada88fecaa89339e2798d661fd86374
SHA196d3757f11c6e0e8dc97aacdb71c1e1a541e027a
SHA256fe1af86aee5498b90fb5f7c9980f109866e5c51fb02bf425977f0ba25820c59f
SHA51227e3024098f0596272e0a46d3250a2cdf741b8562ed3492ada99aad0402175f2831e1e78ae6310b5ea34acf4ef177b5bfce92149332f2b611949830a5199e473