Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-03-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
874bcf36482b83f3df470655e985e29b.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
874bcf36482b83f3df470655e985e29b.exe
Resource
win10v20201028
General
-
Target
874bcf36482b83f3df470655e985e29b.exe
-
Size
162KB
-
MD5
874bcf36482b83f3df470655e985e29b
-
SHA1
bbcfeea3e3b437680cbf14c8016b3954cac1398a
-
SHA256
1c259208bdea5d896335c7a22d7a3048e4cfe0c7578a466f8faad880446f4e02
-
SHA512
688cd7b19786c7c41079a1867a394ade9ed1201f10f38c408d52bae8da9edcd42b433ae979de6b68ed4bbf628201228c45ec4d9a03987851782265c19b0da8c6
Malware Config
Extracted
smokeloader
2020
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Taurus Stealer
Taurus is an infostealer first seen in June 2020.
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 8 IoCs
pid Process 1532 FFF1.exe 1228 119E.exe 1744 FFF1.exe 1940 updatewin.exe 1656 5.exe 652 40F8.exe 1568 oqlrkxh.exe 2044 5B7B.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
pid Process 1264 Process not Found -
Loads dropped DLL 9 IoCs
pid Process 644 874bcf36482b83f3df470655e985e29b.exe 1532 FFF1.exe 1532 FFF1.exe 1744 FFF1.exe 1940 updatewin.exe 1940 updatewin.exe 1940 updatewin.exe 1744 FFF1.exe 1744 FFF1.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 288 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\0e20c117-82cc-4bda-95fa-b490e6f5bd84\\FFF1.exe\" --AutoStart" FFF1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 api.2ip.ua 24 api.2ip.ua 44 api.2ip.ua -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1568 set thread context of 460 1568 oqlrkxh.exe 57 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 874bcf36482b83f3df470655e985e29b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 874bcf36482b83f3df470655e985e29b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 874bcf36482b83f3df470655e985e29b.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1704 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 119E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 FFF1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 FFF1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 FFF1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 FFF1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 FFF1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 119E.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 874bcf36482b83f3df470655e985e29b.exe 644 874bcf36482b83f3df470655e985e29b.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 644 874bcf36482b83f3df470655e985e29b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1940 updatewin.exe Token: SeBackupPrivilege 1940 updatewin.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1532 1264 Process not Found 29 PID 1264 wrote to memory of 1532 1264 Process not Found 29 PID 1264 wrote to memory of 1532 1264 Process not Found 29 PID 1264 wrote to memory of 1532 1264 Process not Found 29 PID 1264 wrote to memory of 1228 1264 Process not Found 32 PID 1264 wrote to memory of 1228 1264 Process not Found 32 PID 1264 wrote to memory of 1228 1264 Process not Found 32 PID 1264 wrote to memory of 1228 1264 Process not Found 32 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 288 1532 FFF1.exe 33 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1532 wrote to memory of 1744 1532 FFF1.exe 34 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1940 1744 FFF1.exe 35 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1744 wrote to memory of 1656 1744 FFF1.exe 36 PID 1264 wrote to memory of 652 1264 Process not Found 38 PID 1264 wrote to memory of 652 1264 Process not Found 38 PID 1264 wrote to memory of 652 1264 Process not Found 38 PID 1264 wrote to memory of 652 1264 Process not Found 38 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 1940 wrote to memory of 616 1940 updatewin.exe 39 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 616 wrote to memory of 1704 616 cmd.exe 41 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 2040 652 40F8.exe 42 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 460 652 40F8.exe 44 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1076 652 40F8.exe 46 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 1984 652 40F8.exe 48 PID 652 wrote to memory of 780 652 40F8.exe 51 PID 652 wrote to memory of 780 652 40F8.exe 51 PID 652 wrote to memory of 780 652 40F8.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\874bcf36482b83f3df470655e985e29b.exe"C:\Users\Admin\AppData\Local\Temp\874bcf36482b83f3df470655e985e29b.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:644
-
C:\Users\Admin\AppData\Local\Temp\FFF1.exeC:\Users\Admin\AppData\Local\Temp\FFF1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\0e20c117-82cc-4bda-95fa-b490e6f5bd84" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\FFF1.exe"C:\Users\Admin\AppData\Local\Temp\FFF1.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\updatewin.exe"C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\updatewin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:1704
-
-
-
-
C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\5.exe"C:\Users\Admin\AppData\Local\ad7fe939-eecd-4428-9a01-20f3e59645f1\5.exe"3⤵
- Executes dropped EXE
PID:1656
-
-
-
C:\Users\Admin\AppData\Local\Temp\119E.exeC:\Users\Admin\AppData\Local\Temp\119E.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
PID:1228
-
C:\Users\Admin\AppData\Local\Temp\40F8.exeC:\Users\Admin\AppData\Local\Temp\40F8.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hvfmkgob\2⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\oqlrkxh.exe" C:\Windows\SysWOW64\hvfmkgob\2⤵PID:460
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hvfmkgob binPath= "C:\Windows\SysWOW64\hvfmkgob\oqlrkxh.exe /d\"C:\Users\Admin\AppData\Local\Temp\40F8.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1076
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hvfmkgob "wifi internet conection"2⤵PID:1984
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hvfmkgob2⤵PID:780
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1012
-
-
C:\Windows\SysWOW64\hvfmkgob\oqlrkxh.exeC:\Windows\SysWOW64\hvfmkgob\oqlrkxh.exe /d"C:\Users\Admin\AppData\Local\Temp\40F8.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1568 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\5B7B.exeC:\Users\Admin\AppData\Local\Temp\5B7B.exe1⤵
- Executes dropped EXE
PID:2044
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
3