Analysis

  • max time kernel
    42s
  • max time network
    41s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-03-2021 17:05

Errors

Reason
Machine shutdown

General

  • Target

    E4B1.exe

  • Size

    167KB

  • MD5

    47838511727aae396e6269f03eca0166

  • SHA1

    cd9f435fa188377177f892de5b97f37149878009

  • SHA256

    a7a2a4f56a6eda5df0d82dc1cf60eee82d3a8d16f2d746df037cdeaafaebcd5d

  • SHA512

    463462a1972f5f4d9c1ba25ce5ef75f15ebaec2fc4b314d58bb155207899519caf3c5b49122ae1eca67d89a08b7a29d16ce17df2d64a6ed8539d416344ed18a5

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://4zavr.com/upload/

http://zynds.com/upload/

http://atvua.com/upload/

http://detse.net/upload/

http://dsdett.com/upload/

http://dtabasee.com/upload/

http://yeronogles.monster/upload/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\E4B1.exe
    "C:\Users\Admin\AppData\Local\Temp\E4B1.exe"
    1⤵
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1144
  • C:\Users\Admin\AppData\Local\Temp\ED25.exe
    C:\Users\Admin\AppData\Local\Temp\ED25.exe
    1⤵
    • Executes dropped EXE
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    PID:2768

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ED25.exe
    MD5

    4650e2d8019f6c388d2fc1b33964d423

    SHA1

    caad0ab0d25dc7b3b7cb815121a7f679e7e8fce4

    SHA256

    3697481365c7ab3f789488f443f27ddd8e63f605c3f8e202638665dfb583cda0

    SHA512

    bfd1ef24e073eeabe830a723797a2829effd54ab44dbfb39b493433fdeaed7c9a2a6191ba14c7cb4569c047588aa8e3049db641be0eab71f732d42f20388f44d

  • C:\Users\Admin\AppData\Local\Temp\ED25.exe
    MD5

    4650e2d8019f6c388d2fc1b33964d423

    SHA1

    caad0ab0d25dc7b3b7cb815121a7f679e7e8fce4

    SHA256

    3697481365c7ab3f789488f443f27ddd8e63f605c3f8e202638665dfb583cda0

    SHA512

    bfd1ef24e073eeabe830a723797a2829effd54ab44dbfb39b493433fdeaed7c9a2a6191ba14c7cb4569c047588aa8e3049db641be0eab71f732d42f20388f44d

  • \Users\Admin\AppData\Local\Temp\CC4F.tmp
    MD5

    50741b3f2d7debf5d2bed63d88404029

    SHA1

    56210388a627b926162b36967045be06ffb1aad3

    SHA256

    f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

    SHA512

    fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

  • memory/1144-2-0x00000000032D0000-0x00000000032D1000-memory.dmp
    Filesize

    4KB

  • memory/1144-5-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1144-4-0x0000000000030000-0x000000000003A000-memory.dmp
    Filesize

    40KB

  • memory/2768-7-0x0000000000000000-mapping.dmp
  • memory/2768-10-0x00000000030F0000-0x00000000030F1000-memory.dmp
    Filesize

    4KB

  • memory/2768-12-0x0000000000400000-0x000000000046F000-memory.dmp
    Filesize

    444KB

  • memory/2768-11-0x0000000002F60000-0x0000000002FCB000-memory.dmp
    Filesize

    428KB

  • memory/2984-6-0x0000000000E70000-0x0000000000E86000-memory.dmp
    Filesize

    88KB