Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-07-2021 23:04

General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe

  • Size

    213KB

  • MD5

    9d4d248957fee5b2a47e27c19f30ddf7

  • SHA1

    1a816bdadf0acdd942cffbd80273e481f592e048

  • SHA256

    d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2

  • SHA512

    5bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2864
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:1248
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:1560
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:640
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:1392
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:1160
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:2408
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:2888
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:2616
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:2168
                    • C:\Users\Admin\AppData\Roaming\cjgidwa
                      C:\Users\Admin\AppData\Roaming\cjgidwa
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:2644
                      • C:\Users\Admin\AppData\Roaming\cjgidwa
                        C:\Users\Admin\AppData\Roaming\cjgidwa
                        2⤵
                        • Executes dropped EXE
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: MapViewOfSection
                        PID:3364

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Discovery

                    Query Registry

                    1
                    T1012

                    Peripheral Device Discovery

                    1
                    T1120

                    System Information Discovery

                    1
                    T1082

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Roaming\cjgidwa
                      MD5

                      9d4d248957fee5b2a47e27c19f30ddf7

                      SHA1

                      1a816bdadf0acdd942cffbd80273e481f592e048

                      SHA256

                      d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2

                      SHA512

                      5bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5

                    • C:\Users\Admin\AppData\Roaming\cjgidwa
                      MD5

                      9d4d248957fee5b2a47e27c19f30ddf7

                      SHA1

                      1a816bdadf0acdd942cffbd80273e481f592e048

                      SHA256

                      d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2

                      SHA512

                      5bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5

                    • C:\Users\Admin\AppData\Roaming\cjgidwa
                      MD5

                      9d4d248957fee5b2a47e27c19f30ddf7

                      SHA1

                      1a816bdadf0acdd942cffbd80273e481f592e048

                      SHA256

                      d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2

                      SHA512

                      5bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5

                    • memory/640-124-0x0000000000000000-mapping.dmp
                    • memory/640-125-0x0000000000E90000-0x0000000000E97000-memory.dmp
                      Filesize

                      28KB

                    • memory/640-126-0x0000000000E80000-0x0000000000E8B000-memory.dmp
                      Filesize

                      44KB

                    • memory/1160-130-0x0000000000000000-mapping.dmp
                    • memory/1160-133-0x0000000000E10000-0x0000000000E19000-memory.dmp
                      Filesize

                      36KB

                    • memory/1160-131-0x0000000000E20000-0x0000000000E25000-memory.dmp
                      Filesize

                      20KB

                    • memory/1248-119-0x0000000000400000-0x0000000000474000-memory.dmp
                      Filesize

                      464KB

                    • memory/1248-120-0x0000000000170000-0x00000000001DB000-memory.dmp
                      Filesize

                      428KB

                    • memory/1248-118-0x0000000000000000-mapping.dmp
                    • memory/1392-128-0x0000000000DF0000-0x0000000000DF9000-memory.dmp
                      Filesize

                      36KB

                    • memory/1392-127-0x0000000000000000-mapping.dmp
                    • memory/1392-129-0x0000000000DE0000-0x0000000000DEF000-memory.dmp
                      Filesize

                      60KB

                    • memory/1560-123-0x0000000000340000-0x000000000034C000-memory.dmp
                      Filesize

                      48KB

                    • memory/1560-122-0x0000000000350000-0x0000000000357000-memory.dmp
                      Filesize

                      28KB

                    • memory/1560-121-0x0000000000000000-mapping.dmp
                    • memory/2168-142-0x0000000000000000-mapping.dmp
                    • memory/2168-144-0x00000000012A0000-0x00000000012A9000-memory.dmp
                      Filesize

                      36KB

                    • memory/2168-143-0x00000000012B0000-0x00000000012B5000-memory.dmp
                      Filesize

                      20KB

                    • memory/2408-136-0x0000000000520000-0x000000000052C000-memory.dmp
                      Filesize

                      48KB

                    • memory/2408-134-0x0000000000530000-0x0000000000536000-memory.dmp
                      Filesize

                      24KB

                    • memory/2408-132-0x0000000000000000-mapping.dmp
                    • memory/2492-117-0x0000000001470000-0x0000000001486000-memory.dmp
                      Filesize

                      88KB

                    • memory/2492-150-0x00000000014D0000-0x00000000014E6000-memory.dmp
                      Filesize

                      88KB

                    • memory/2616-137-0x0000000000000000-mapping.dmp
                    • memory/2616-139-0x00000000007E0000-0x00000000007E5000-memory.dmp
                      Filesize

                      20KB

                    • memory/2616-141-0x00000000007D0000-0x00000000007D9000-memory.dmp
                      Filesize

                      36KB

                    • memory/2864-115-0x0000000000402E1A-mapping.dmp
                    • memory/2864-114-0x0000000000400000-0x0000000000409000-memory.dmp
                      Filesize

                      36KB

                    • memory/2888-135-0x0000000000000000-mapping.dmp
                    • memory/2888-138-0x00000000003C0000-0x00000000003C4000-memory.dmp
                      Filesize

                      16KB

                    • memory/2888-140-0x00000000003B0000-0x00000000003B9000-memory.dmp
                      Filesize

                      36KB

                    • memory/3364-148-0x0000000000402E1A-mapping.dmp
                    • memory/4064-116-0x0000000000980000-0x000000000098A000-memory.dmp
                      Filesize

                      40KB