Resubmissions
27-08-2020 15:47
200827-m1jren2nas 10Analysis
-
max time kernel
129s -
max time network
154s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
27-08-2020 15:47
Static task
static1
Behavioral task
behavioral1
Sample
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe
Resource
win10
General
-
Target
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe
-
Size
181KB
-
MD5
80d3605d4b180cdd2fef6cb6312942bd
-
SHA1
12386eee0db55c3c612c92b7912d6f5eceaaffdc
-
SHA256
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91
-
SHA512
cfb0f5785978586aeaec6a832f0dfae13039c07f977f0afb63fcdbb27981b7bc95ecaf202c7a5ddfec9b47bbf1c5c00c2cfdbc471035311b2458dec6a2e65fd9
Malware Config
Extracted
smokeloader
2020
http://rexstat35x.xyz/statweb955/
http://dexspot2x.xyz/statweb955/
http://atxspot20x.xyz/statweb955/
http://rexspot7x.xyz/statweb955/
http://fdmail85.club/statweb955/
http://servicem977x.xyz/statweb955/
http://advertxman7x.xyz/statweb955/
http://starxpush7x.xyz/statweb955/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 5 IoCs
Processes:
A248.exeA362.exeA778.exeAB11.exeACF6.exepid process 1548 A248.exe 1944 A362.exe 1196 A778.exe 932 AB11.exe 912 ACF6.exe -
Deletes itself 1 IoCs
Processes:
pid process 1236 -
Drops startup file 1 IoCs
Processes:
A248.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\A248.exe A248.exe -
Loads dropped DLL 2 IoCs
Processes:
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exepid process 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 1236 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
A248.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\A248.exe = "C:\\Windows\\System32\\A248.exe" A248.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
A248.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2090973689-680783404-4292415065-1000\desktop.ini A248.exe -
Drops file in System32 directory 1 IoCs
Processes:
A248.exedescription ioc process File created C:\Windows\System32\A248.exe A248.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exedescription pid process target process PID 1420 set thread context of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe -
Drops file in Program Files directory 256 IoCs
Processes:
A248.exedescription ioc process File opened for modification C:\Program Files\7-Zip\History.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll A248.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt A248.exe File created C:\Program Files\7-Zip\Lang\is.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\nb.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL A248.exe File created C:\Program Files\7-Zip\Lang\gu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt A248.exe File created C:\Program Files\7-Zip\Lang\ext.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ast.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\cs.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\descript.ion A248.exe File created C:\Program Files\7-Zip\Lang\fa.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt A248.exe File created C:\Program Files\7-Zip\Lang\be.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\bn.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt A248.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt A248.exe File created C:\Program Files\7-Zip\Lang\fr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ar.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\fur.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\msgfilt.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt A248.exe File opened for modification C:\Program Files\CheckpointFormat.M2TS.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\BackupCompress.reg A248.exe File created C:\Program Files\BackupCompress.reg.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\hr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\lv.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt A248.exe File created C:\Program Files\7-Zip\Lang\ka.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1868 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 636 IoCs
Processes:
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exepid process 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1236 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exepid process 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1236 Token: SeShutdownPrivilege 1236 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1236 1236 1236 1236 -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
pid process 1236 1236 1236 1236 1236 1236 1236 1236 -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exeA248.execmd.exedescription pid process target process PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe PID 1236 wrote to memory of 1548 1236 A248.exe PID 1236 wrote to memory of 1548 1236 A248.exe PID 1236 wrote to memory of 1548 1236 A248.exe PID 1236 wrote to memory of 1548 1236 A248.exe PID 1236 wrote to memory of 1944 1236 A362.exe PID 1236 wrote to memory of 1944 1236 A362.exe PID 1236 wrote to memory of 1944 1236 A362.exe PID 1236 wrote to memory of 1944 1236 A362.exe PID 1548 wrote to memory of 1912 1548 A248.exe cmd.exe PID 1548 wrote to memory of 1912 1548 A248.exe cmd.exe PID 1548 wrote to memory of 1912 1548 A248.exe cmd.exe PID 1548 wrote to memory of 1912 1548 A248.exe cmd.exe PID 1912 wrote to memory of 572 1912 cmd.exe mode.com PID 1912 wrote to memory of 572 1912 cmd.exe mode.com PID 1912 wrote to memory of 572 1912 cmd.exe mode.com PID 1236 wrote to memory of 1196 1236 A778.exe PID 1236 wrote to memory of 1196 1236 A778.exe PID 1236 wrote to memory of 1196 1236 A778.exe PID 1912 wrote to memory of 1868 1912 cmd.exe vssadmin.exe PID 1912 wrote to memory of 1868 1912 cmd.exe vssadmin.exe PID 1912 wrote to memory of 1868 1912 cmd.exe vssadmin.exe PID 1236 wrote to memory of 932 1236 AB11.exe PID 1236 wrote to memory of 932 1236 AB11.exe PID 1236 wrote to memory of 932 1236 AB11.exe PID 1236 wrote to memory of 932 1236 AB11.exe PID 1236 wrote to memory of 912 1236 ACF6.exe PID 1236 wrote to memory of 912 1236 ACF6.exe PID 1236 wrote to memory of 912 1236 ACF6.exe PID 1236 wrote to memory of 912 1236 ACF6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\A248.exeC:\Users\Admin\AppData\Local\Temp\A248.exe1⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:572
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\A362.exeC:\Users\Admin\AppData\Local\Temp\A362.exe1⤵
- Executes dropped EXE
PID:1944
-
C:\Users\Admin\AppData\Local\Temp\A778.exeC:\Users\Admin\AppData\Local\Temp\A778.exe1⤵
- Executes dropped EXE
PID:1196
-
C:\Users\Admin\AppData\Local\Temp\AB11.exeC:\Users\Admin\AppData\Local\Temp\AB11.exe1⤵
- Executes dropped EXE
PID:932
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\ACF6.exeC:\Users\Admin\AppData\Local\Temp\ACF6.exe1⤵
- Executes dropped EXE
PID:912