Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
15-10-2020 18:27
Static task
static1
Behavioral task
behavioral1
Sample
bemaji.exe
Resource
win7v200722
General
-
Target
bemaji.exe
-
Size
135KB
-
MD5
6cc41d1ccd61ccdb3857703f83959aca
-
SHA1
caf89ae09f7435dcef4e886b056d020ee34925cf
-
SHA256
91647ac947d5d5d3a0dc69e98070bfc2f9841d7839b579d69c524b02869a497f
-
SHA512
4adde26f8e13509a6ead86ebe23b7b45742e4dea5faf364b0559f0b5142b8faa2e8331e79528e60af1e290804e9ebbc29cba94833cede3e723b83b55fd7bcc8e
Malware Config
Extracted
smokeloader
2020
http://sm15sdsd.xyz/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
7B96.exe8086.exe8086.exensxd.exeeuehuo.exeeuehuo.exepid process 1584 7B96.exe 1640 8086.exe 1680 8086.exe 1460 nsxd.exe 1736 euehuo.exe 744 euehuo.exe -
Deletes itself 1 IoCs
Processes:
pid process 1224 -
Loads dropped DLL 4 IoCs
Processes:
bemaji.exe8086.exepid process 1504 bemaji.exe 1640 8086.exe 1640 8086.exe 1640 8086.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
Processes:
7B96.exedescription ioc process File created C:\Windows\Tasks\nsxd.job 7B96.exe File opened for modification C:\Windows\Tasks\nsxd.job 7B96.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bemaji.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bemaji.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bemaji.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bemaji.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 783 IoCs
Processes:
bemaji.exepid process 1504 bemaji.exe 1504 bemaji.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious behavior: MapViewOfSection 23 IoCs
Processes:
bemaji.exepid process 1504 bemaji.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1224 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1224 1224 1224 1224 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1224 1224 1224 1224 -
Suspicious use of WriteProcessMemory 79 IoCs
Processes:
8086.exetaskeng.exedescription pid process target process PID 1224 wrote to memory of 1584 1224 7B96.exe PID 1224 wrote to memory of 1584 1224 7B96.exe PID 1224 wrote to memory of 1584 1224 7B96.exe PID 1224 wrote to memory of 1584 1224 7B96.exe PID 1224 wrote to memory of 1640 1224 8086.exe PID 1224 wrote to memory of 1640 1224 8086.exe PID 1224 wrote to memory of 1640 1224 8086.exe PID 1224 wrote to memory of 1640 1224 8086.exe PID 1224 wrote to memory of 1548 1224 explorer.exe PID 1224 wrote to memory of 1548 1224 explorer.exe PID 1224 wrote to memory of 1548 1224 explorer.exe PID 1224 wrote to memory of 1548 1224 explorer.exe PID 1224 wrote to memory of 1548 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 1112 1224 explorer.exe PID 1224 wrote to memory of 1112 1224 explorer.exe PID 1224 wrote to memory of 1112 1224 explorer.exe PID 1224 wrote to memory of 1112 1224 explorer.exe PID 1224 wrote to memory of 1112 1224 explorer.exe PID 1224 wrote to memory of 828 1224 explorer.exe PID 1224 wrote to memory of 828 1224 explorer.exe PID 1224 wrote to memory of 828 1224 explorer.exe PID 1224 wrote to memory of 828 1224 explorer.exe PID 1224 wrote to memory of 828 1224 explorer.exe PID 1224 wrote to memory of 1260 1224 explorer.exe PID 1224 wrote to memory of 1260 1224 explorer.exe PID 1224 wrote to memory of 1260 1224 explorer.exe PID 1224 wrote to memory of 1260 1224 explorer.exe PID 1224 wrote to memory of 1260 1224 explorer.exe PID 1640 wrote to memory of 1680 1640 8086.exe 8086.exe PID 1640 wrote to memory of 1680 1640 8086.exe 8086.exe PID 1640 wrote to memory of 1680 1640 8086.exe 8086.exe PID 1640 wrote to memory of 1680 1640 8086.exe 8086.exe PID 1224 wrote to memory of 1992 1224 explorer.exe PID 1224 wrote to memory of 1992 1224 explorer.exe PID 1224 wrote to memory of 1992 1224 explorer.exe PID 1224 wrote to memory of 1992 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 736 1224 explorer.exe PID 1224 wrote to memory of 1508 1224 explorer.exe PID 1224 wrote to memory of 1508 1224 explorer.exe PID 1224 wrote to memory of 1508 1224 explorer.exe PID 1224 wrote to memory of 1508 1224 explorer.exe PID 1224 wrote to memory of 1976 1224 explorer.exe PID 1224 wrote to memory of 1976 1224 explorer.exe PID 1224 wrote to memory of 1976 1224 explorer.exe PID 1224 wrote to memory of 1976 1224 explorer.exe PID 1224 wrote to memory of 1976 1224 explorer.exe PID 1588 wrote to memory of 1460 1588 taskeng.exe nsxd.exe PID 1588 wrote to memory of 1460 1588 taskeng.exe nsxd.exe PID 1588 wrote to memory of 1460 1588 taskeng.exe nsxd.exe PID 1588 wrote to memory of 1460 1588 taskeng.exe nsxd.exe PID 1640 wrote to memory of 1736 1640 8086.exe euehuo.exe PID 1640 wrote to memory of 1736 1640 8086.exe euehuo.exe PID 1640 wrote to memory of 1736 1640 8086.exe euehuo.exe PID 1640 wrote to memory of 1736 1640 8086.exe euehuo.exe PID 1640 wrote to memory of 1028 1640 8086.exe schtasks.exe PID 1640 wrote to memory of 1028 1640 8086.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bemaji.exe"C:\Users\Admin\AppData\Local\Temp\bemaji.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1504
-
C:\Users\Admin\AppData\Local\Temp\7B96.exeC:\Users\Admin\AppData\Local\Temp\7B96.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1584
-
C:\Users\Admin\AppData\Local\Temp\8086.exeC:\Users\Admin\AppData\Local\Temp\8086.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\8086.exeC:\Users\Admin\AppData\Local\Temp\8086.exe /C2⤵
- Executes dropped EXE
PID:1680
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Jblqaew\euehuo.exeC:\Users\Admin\AppData\Roaming\Microsoft\Jblqaew\euehuo.exe2⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Roaming\Microsoft\Jblqaew\euehuo.exeC:\Users\Admin\AppData\Roaming\Microsoft\Jblqaew\euehuo.exe /C3⤵
- Executes dropped EXE
PID:744
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn wdvkblrxzf /tr "\"C:\Users\Admin\AppData\Local\Temp\8086.exe\" /I wdvkblrxzf" /SC ONCE /Z /ST 20:27 /ET 20:392⤵
- Creates scheduled task(s)
PID:1028
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1548
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:736
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1112
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:828
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1260
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1992
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:736
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1508
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1976
-
C:\Windows\system32\taskeng.exetaskeng.exe {70BFB650-2C45-4C31-B514-653E86E0A8BE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\ProgramData\kjqipi\nsxd.exeC:\ProgramData\kjqipi\nsxd.exe start2⤵
- Executes dropped EXE
PID:1460
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1936
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0e23988a7ad64e9f03a2a7c3e9637330
SHA18a7827bb2ecc1a57f23a489f034d7c9629523eaf
SHA25663e7464225916f05a6dc4576721fae7a3a449fdab81072f28ba9a4bf5e9a54f9
SHA512046f6813425def94526334eb1adbf9a06af1a32b3d0ea921813c977e084dfea31b294014876bad47d911d9c66d7e67cba5d9caa21e9856a00c4a2b895d3d1b48
-
MD5
0e23988a7ad64e9f03a2a7c3e9637330
SHA18a7827bb2ecc1a57f23a489f034d7c9629523eaf
SHA25663e7464225916f05a6dc4576721fae7a3a449fdab81072f28ba9a4bf5e9a54f9
SHA512046f6813425def94526334eb1adbf9a06af1a32b3d0ea921813c977e084dfea31b294014876bad47d911d9c66d7e67cba5d9caa21e9856a00c4a2b895d3d1b48
-
MD5
0e23988a7ad64e9f03a2a7c3e9637330
SHA18a7827bb2ecc1a57f23a489f034d7c9629523eaf
SHA25663e7464225916f05a6dc4576721fae7a3a449fdab81072f28ba9a4bf5e9a54f9
SHA512046f6813425def94526334eb1adbf9a06af1a32b3d0ea921813c977e084dfea31b294014876bad47d911d9c66d7e67cba5d9caa21e9856a00c4a2b895d3d1b48
-
MD5
0e23988a7ad64e9f03a2a7c3e9637330
SHA18a7827bb2ecc1a57f23a489f034d7c9629523eaf
SHA25663e7464225916f05a6dc4576721fae7a3a449fdab81072f28ba9a4bf5e9a54f9
SHA512046f6813425def94526334eb1adbf9a06af1a32b3d0ea921813c977e084dfea31b294014876bad47d911d9c66d7e67cba5d9caa21e9856a00c4a2b895d3d1b48
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76
-
MD5
7bfc9747a217ec58395bd59f876e389f
SHA12c4b1d4a484e193e26327339ed38a4f05fd637dd
SHA256f2704a029672c04f28e738da8d859163ac807b158261e6a48edb279a132743ff
SHA51222959911f63bc551ee26aba716c0f2e6bd5ccc55c610fdf7474cd687886e74fcd4b6ca0158694f31961ee9692fbcf00003995444cd97551f6ed34d71e6340b76