Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
31-05-2021 18:16
Static task
static1
Behavioral task
behavioral1
Sample
51D8ECF0ED7ECB364FD78F3FC53F871F.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
51D8ECF0ED7ECB364FD78F3FC53F871F.exe
Resource
win10v20210410
General
-
Target
51D8ECF0ED7ECB364FD78F3FC53F871F.exe
-
Size
3.1MB
-
MD5
51d8ecf0ed7ecb364fd78f3fc53f871f
-
SHA1
03a0a32d8c9dd0f4a97eacde1f010ee5665d2b8a
-
SHA256
6a966d8a8bc18b016f35a159c110eb8dd5527b83e39db5fa7300e4634c9cb096
-
SHA512
6baf4d67d6dc5ad47658b48e83b1a9d9cb4d49e5f615439232b3817d01a9c7d847e2ac2b280eae8a4b757599462e4fb2ea39e217ec46b6c54b23a18f201f4aff
Malware Config
Extracted
smokeloader
2020
http://20xbtc.com/upload/
http://yzsnw.com/upload/
http://kaledebiyat.com/upload/
http://expertizizmir.com/upload/
http://dedkndy.com/upload/
http://theuncu.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 10 IoCs
pid Process 1128 jg3_3uag.exe 1324 KRSetp.exe 564 Files.exe 576 jg3_3uag.exe 624 Folder.exe 1124 pzyh.exe 764 pub2.exe 1044 File.exe 1656 jfiag3g_gg.exe 1672 jfiag3g_gg.exe -
resource yara_rule behavioral1/files/0x00030000000130c6-128.dat upx behavioral1/files/0x00030000000130c6-127.dat upx behavioral1/files/0x00030000000130c6-130.dat upx behavioral1/files/0x00030000000130ce-147.dat upx behavioral1/files/0x00030000000130ce-145.dat upx behavioral1/files/0x00030000000130ce-144.dat upx behavioral1/files/0x00030000000130ce-149.dat upx -
resource yara_rule behavioral1/files/0x00040000000130be-82.dat vmprotect behavioral1/files/0x00040000000130be-83.dat vmprotect behavioral1/files/0x00040000000130be-85.dat vmprotect behavioral1/files/0x00040000000130be-84.dat vmprotect behavioral1/files/0x00040000000130be-89.dat vmprotect behavioral1/memory/576-136-0x0000000000400000-0x00000000005DE000-memory.dmp vmprotect behavioral1/files/0x00040000000130be-138.dat vmprotect behavioral1/files/0x00040000000130be-139.dat vmprotect behavioral1/files/0x00040000000130be-140.dat vmprotect behavioral1/files/0x00040000000130be-141.dat vmprotect behavioral1/files/0x00040000000130be-142.dat vmprotect -
Loads dropped DLL 38 IoCs
pid Process 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 1128 jg3_3uag.exe 1128 jg3_3uag.exe 1128 jg3_3uag.exe 1128 jg3_3uag.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 564 Files.exe 564 Files.exe 564 Files.exe 564 Files.exe 764 pub2.exe 1124 pzyh.exe 1124 pzyh.exe 112 WerFault.exe 112 WerFault.exe 112 WerFault.exe 112 WerFault.exe 1124 pzyh.exe 1124 pzyh.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Files.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
autoit_exe 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00040000000130c1-116.dat autoit_exe behavioral1/files/0x00040000000130c1-118.dat autoit_exe behavioral1/files/0x00040000000130c1-115.dat autoit_exe behavioral1/files/0x00040000000130c1-114.dat autoit_exe behavioral1/files/0x00040000000130c1-113.dat autoit_exe behavioral1/files/0x00040000000130c1-121.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 112 576 WerFault.exe 32 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub2.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000529101d5c9814b4eb0f580b37542e45000000000020000000000106600000001000020000000c547bf7d0679fe0d13f00c07d4908565f2b96aebb7690336b3e7468fbcf8861d000000000e800000000200002000000015174acc6da9c2f7052ffa230fa68038d347f27cbcf09be896391d8131c5f5c720000000c6a1706755ef93ec4e27d4ac67c5e9f72ebaa37379502992c7f244502035cff64000000052ce83d99b86bc4e2cdacafd7143f00da7a97e98518358b09ca639b95eaca79ded41f7ee2c308c204236f72e4a1bea17ea617655b60d39437057a6f395cfcb03 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C34ECFA1-C24C-11EB-BDFA-E2B03292F00A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08b20b05956d701 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 764 pub2.exe 764 pub2.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 764 pub2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1324 KRSetp.exe Token: SeShutdownPrivilege 1200 Process not Found Token: SeShutdownPrivilege 1200 Process not Found Token: SeDebugPrivilege 112 WerFault.exe Token: SeShutdownPrivilege 1200 Process not Found -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1044 File.exe 1044 File.exe 1200 Process not Found 1200 Process not Found 1044 File.exe 1044 File.exe 1044 File.exe 1044 File.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1044 File.exe 1044 File.exe 1044 File.exe 1044 File.exe 1200 Process not Found 1200 Process not Found 732 iexplore.exe 1200 Process not Found 1200 Process not Found -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 1044 File.exe 1044 File.exe 1044 File.exe 1044 File.exe 1044 File.exe 1044 File.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1044 File.exe 1044 File.exe 1044 File.exe 1044 File.exe 1200 Process not Found -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 732 iexplore.exe 732 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 748 wrote to memory of 1128 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 29 PID 748 wrote to memory of 1128 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 29 PID 748 wrote to memory of 1128 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 29 PID 748 wrote to memory of 1128 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 29 PID 748 wrote to memory of 1324 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 30 PID 748 wrote to memory of 1324 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 30 PID 748 wrote to memory of 1324 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 30 PID 748 wrote to memory of 1324 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 30 PID 748 wrote to memory of 564 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 31 PID 748 wrote to memory of 564 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 31 PID 748 wrote to memory of 564 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 31 PID 748 wrote to memory of 564 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 31 PID 1128 wrote to memory of 576 1128 jg3_3uag.exe 32 PID 1128 wrote to memory of 576 1128 jg3_3uag.exe 32 PID 1128 wrote to memory of 576 1128 jg3_3uag.exe 32 PID 1128 wrote to memory of 576 1128 jg3_3uag.exe 32 PID 748 wrote to memory of 624 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 33 PID 748 wrote to memory of 624 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 33 PID 748 wrote to memory of 624 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 33 PID 748 wrote to memory of 624 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 33 PID 748 wrote to memory of 1124 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 34 PID 748 wrote to memory of 1124 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 34 PID 748 wrote to memory of 1124 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 34 PID 748 wrote to memory of 1124 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 34 PID 748 wrote to memory of 764 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 35 PID 748 wrote to memory of 764 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 35 PID 748 wrote to memory of 764 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 35 PID 748 wrote to memory of 764 748 51D8ECF0ED7ECB364FD78F3FC53F871F.exe 35 PID 564 wrote to memory of 1044 564 Files.exe 36 PID 564 wrote to memory of 1044 564 Files.exe 36 PID 564 wrote to memory of 1044 564 Files.exe 36 PID 564 wrote to memory of 1044 564 Files.exe 36 PID 1124 wrote to memory of 1656 1124 pzyh.exe 40 PID 1124 wrote to memory of 1656 1124 pzyh.exe 40 PID 1124 wrote to memory of 1656 1124 pzyh.exe 40 PID 1124 wrote to memory of 1656 1124 pzyh.exe 40 PID 732 wrote to memory of 2012 732 iexplore.exe 42 PID 732 wrote to memory of 2012 732 iexplore.exe 42 PID 732 wrote to memory of 2012 732 iexplore.exe 42 PID 732 wrote to memory of 2012 732 iexplore.exe 42 PID 576 wrote to memory of 112 576 jg3_3uag.exe 44 PID 576 wrote to memory of 112 576 jg3_3uag.exe 44 PID 576 wrote to memory of 112 576 jg3_3uag.exe 44 PID 576 wrote to memory of 112 576 jg3_3uag.exe 44 PID 1124 wrote to memory of 1672 1124 pzyh.exe 45 PID 1124 wrote to memory of 1672 1124 pzyh.exe 45 PID 1124 wrote to memory of 1672 1124 pzyh.exe 45 PID 1124 wrote to memory of 1672 1124 pzyh.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\51D8ECF0ED7ECB364FD78F3FC53F871F.exe"C:\Users\Admin\AppData\Local\Temp\51D8ECF0ED7ECB364FD78F3FC53F871F.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\jg3_3uag.exe"C:\Users\Admin\AppData\Local\Temp\jg3_3uag.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg3_3uag.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg3_3uag.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 576 -s 1924⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\Files.exe"C:\Users\Admin\AppData\Local\Temp\Files.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\File.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\File.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Folder.exe"C:\Users\Admin\AppData\Local\Temp\Folder.exe"2⤵
- Executes dropped EXE
PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\pzyh.exe"C:\Users\Admin\AppData\Local\Temp\pzyh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\pub2.exe"C:\Users\Admin\AppData\Local\Temp\pub2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-