Overview
overview
10Static
static
80x00010000...55.exe
windows7_x64
10x00010000...55.exe
windows10_x64
10x00010000...47.exe
windows7_x64
10x00010000...47.exe
windows10_x64
10x00010000...70.exe
windows7_x64
80x00010000...70.exe
windows10_x64
80x00010000...13.exe
windows7_x64
80x00010000...13.exe
windows10_x64
80x00020000...73.exe
windows7_x64
10x00020000...73.exe
windows10_x64
10x00020000...83.exe
windows7_x64
100x00020000...83.exe
windows10_x64
100x00020000...36.exe
windows7_x64
80x00020000...36.exe
windows10_x64
80x00020000...40.exe
windows7_x64
70x00020000...40.exe
windows10_x64
70x00030000...09.exe
windows7_x64
100x00030000...09.exe
windows10_x64
100x00030000...22.exe
windows7_x64
100x00030000...22.exe
windows10_x64
100x00030000...26.exe
windows7_x64
100x00030000...26.exe
windows10_x64
0x00030000...34.exe
windows7_x64
100x00030000...34.exe
windows10_x64
100x00030000...06.exe
windows7_x64
100x00030000...06.exe
windows10_x64
100x00030000...41.exe
windows7_x64
100x00030000...41.exe
windows10_x64
100x00030000...45.exe
windows7_x64
10x00030000...45.exe
windows10_x64
10x00030000...48.exe
windows7_x64
80x00030000...48.exe
windows10_x64
8Analysis
-
max time kernel
67s -
max time network
72s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-11-2020 10:45
Behavioral task
behavioral1
Sample
0x000100000001ab86-55.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0x000100000001ab86-55.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
0x000100000001ab87-47.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
0x000100000001ab87-47.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
0x000100000001ab9c-70.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
0x000100000001ab9c-70.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
0x000100000001ad02-313.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
0x000100000001ad02-313.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
0x000200000001aca8-173.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
0x000200000001aca8-173.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
0x000200000001acb5-183.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
0x000200000001acb5-183.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
0x000200000001acdf-236.exe
Resource
win7v20201028
Behavioral task
behavioral14
Sample
0x000200000001acdf-236.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
0x000200000001ace9-240.exe
Resource
win7v20201028
Behavioral task
behavioral16
Sample
0x000200000001ace9-240.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
0x000300000001a5a2-209.exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
0x000300000001a5a2-209.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
0x000300000001ac90-122.exe
Resource
win7v20201028
Behavioral task
behavioral20
Sample
0x000300000001ac90-122.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
0x000300000001ac99-126.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
0x000300000001ac99-126.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
0x000300000001ac9e-134.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
0x000300000001ac9e-134.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
0x000300000001ac9e-206.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
0x000300000001ac9e-206.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
0x000300000001ac9f-141.exe
Resource
win7v20201028
Behavioral task
behavioral28
Sample
0x000300000001ac9f-141.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
0x000300000001acec-245.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
0x000300000001acec-245.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
0x000300000001aced-248.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
0x000300000001aced-248.exe
Resource
win10v20201028
Errors
General
-
Target
0x000300000001ac99-126.exe
-
Size
300KB
-
MD5
ca58d4cf4a5e0725f844c8eae3f8ae67
-
SHA1
fbce92619ce23f4594846f2f789e513dab9f3239
-
SHA256
0e3774d65577253a820f1ee272d7a0c96e4c6a869ef8f749fe7f83d2fc49f054
-
SHA512
32bdfc2e72fff79c075d5f9ead8268f1e9e0648635fd977f6d8db62358c48d5451b64e639b1853bd87220a1157e74754e1109b3f1797f98ef02d5151fb09f4a9
Malware Config
Extracted
smokeloader
2020
http://vintrsi.com/upload/
http://woatdert.com/upload/
http://waruse.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 3 IoCs
Processes:
E881.exeF19A.exeF8FE.exepid process 4208 E881.exe 3860 F19A.exe 1736 F8FE.exe -
Deletes itself 1 IoCs
Processes:
pid process 2300 -
Loads dropped DLL 1 IoCs
Processes:
0x000300000001ac99-126.exepid process 4692 0x000300000001ac99-126.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
E881.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 E881.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
0x000300000001ac99-126.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x000300000001ac99-126.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x000300000001ac99-126.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x000300000001ac99-126.exe -
Suspicious behavior: EnumeratesProcesses 782 IoCs
Processes:
0x000300000001ac99-126.exepid process 4692 0x000300000001ac99-126.exe 4692 0x000300000001ac99-126.exe 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 2300 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0x000300000001ac99-126.exepid process 4692 0x000300000001ac99-126.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
E881.exedescription pid process Token: SeShutdownPrivilege 4208 E881.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 2300 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
description pid process target process PID 2300 wrote to memory of 4208 2300 E881.exe PID 2300 wrote to memory of 4208 2300 E881.exe PID 2300 wrote to memory of 4208 2300 E881.exe PID 2300 wrote to memory of 3860 2300 F19A.exe PID 2300 wrote to memory of 3860 2300 F19A.exe PID 2300 wrote to memory of 3860 2300 F19A.exe PID 2300 wrote to memory of 1736 2300 F8FE.exe PID 2300 wrote to memory of 1736 2300 F8FE.exe PID 2300 wrote to memory of 1736 2300 F8FE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000300000001ac99-126.exe"C:\Users\Admin\AppData\Local\Temp\0x000300000001ac99-126.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E881.exeC:\Users\Admin\AppData\Local\Temp\E881.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\F19A.exeC:\Users\Admin\AppData\Local\Temp\F19A.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\F8FE.exeC:\Users\Admin\AppData\Local\Temp\F8FE.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\E881.exeMD5
dd82df483ab0a2875831209f12c4e978
SHA142b7715d00487578f228ae391c72edada07767d9
SHA2565882c641289a6ea69516167a057dc7099d7dc17a00b78c0afaee9b2133e30d9f
SHA512b66c288c073e85072adbcaac0b284ce4f2b307ca8729aef3c1b8a94c2c28b900018cddc5a6971f89a5ae70caa4d146369d7dbc41f89157be356a8f900b6eeacc
-
C:\Users\Admin\AppData\Local\Temp\E881.exeMD5
dd82df483ab0a2875831209f12c4e978
SHA142b7715d00487578f228ae391c72edada07767d9
SHA2565882c641289a6ea69516167a057dc7099d7dc17a00b78c0afaee9b2133e30d9f
SHA512b66c288c073e85072adbcaac0b284ce4f2b307ca8729aef3c1b8a94c2c28b900018cddc5a6971f89a5ae70caa4d146369d7dbc41f89157be356a8f900b6eeacc
-
C:\Users\Admin\AppData\Local\Temp\F19A.exeMD5
801a4e85faeb41919a0da6fa174ada04
SHA1cf6a3be6cf3130a0d2a92ac9eec392e43029a06c
SHA25623a96527c86ed75232f146343a612a96b8a6e70433cbdf39c9a611aeb3191ddd
SHA512319b835e51c98e710a9bea852b79796f1516a5f38b092a2319e65cf21ca63be25621a8a89bd33fe32bc75fde5e115597d141fb68897738daccf476e9576dd54b
-
C:\Users\Admin\AppData\Local\Temp\F19A.exeMD5
801a4e85faeb41919a0da6fa174ada04
SHA1cf6a3be6cf3130a0d2a92ac9eec392e43029a06c
SHA25623a96527c86ed75232f146343a612a96b8a6e70433cbdf39c9a611aeb3191ddd
SHA512319b835e51c98e710a9bea852b79796f1516a5f38b092a2319e65cf21ca63be25621a8a89bd33fe32bc75fde5e115597d141fb68897738daccf476e9576dd54b
-
C:\Users\Admin\AppData\Local\Temp\F8FE.exeMD5
7f1c0fe70e588f3bead08b64910b455e
SHA1b0d78d67ee8a703e2c5dff5f50b34c504a91cfee
SHA2564788a1207c8a83d6051a12d1bbc63e889fbf142e9479c8d2919e8dcb0e4a6cc4
SHA512e5c5227943683851d393328d41c86066ece40f6813533f010963f5515d369d3aa57175f169aef9f428deca38810be75ee8d40b735a0af8826fd7c1bb444b1a84
-
C:\Users\Admin\AppData\Local\Temp\F8FE.exeMD5
7f1c0fe70e588f3bead08b64910b455e
SHA1b0d78d67ee8a703e2c5dff5f50b34c504a91cfee
SHA2564788a1207c8a83d6051a12d1bbc63e889fbf142e9479c8d2919e8dcb0e4a6cc4
SHA512e5c5227943683851d393328d41c86066ece40f6813533f010963f5515d369d3aa57175f169aef9f428deca38810be75ee8d40b735a0af8826fd7c1bb444b1a84
-
\Users\Admin\AppData\Local\Temp\CC4F.tmpMD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
memory/1736-9-0x0000000000000000-mapping.dmp
-
memory/2300-2-0x0000000000890000-0x00000000008A6000-memory.dmpFilesize
88KB
-
memory/3860-6-0x0000000000000000-mapping.dmp
-
memory/3860-13-0x0000000006440000-0x0000000006441000-memory.dmpFilesize
4KB
-
memory/4208-3-0x0000000000000000-mapping.dmp
-
memory/4208-12-0x0000000006530000-0x0000000006531000-memory.dmpFilesize
4KB
-
memory/4692-0-0x0000000006490000-0x0000000006491000-memory.dmpFilesize
4KB