Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-07-2021 22:46

General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware1.15752.14014.exe

  • Size

    213KB

  • MD5

    5415df1e153d017e62ca038755eb3b13

  • SHA1

    84ee77e4ac5fa9bbc03a748bfa24cdb8c1741c6c

  • SHA256

    38bdf86421e02d370cc373b4a22780a96c8a39ccf12a42fb98d9597510be0bc5

  • SHA512

    46aee242ec0d6fd773c96af2cc8db19666dff8da1344f916adf851df895f11b70dea90bd0f58e804a7ebbc07522357550277daec71e6f7972a69686e38f629a0

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 6 IoCs
  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Deletes itself 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.15752.14014.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.15752.14014.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.15752.14014.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.15752.14014.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2536
  • C:\Users\Admin\AppData\Local\Temp\76DB.exe
    C:\Users\Admin\AppData\Local\Temp\76DB.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\proliv.sfx.exe
      "C:\Users\Admin\AppData\Local\Temp\proliv.sfx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Users\Admin\AppData\Local\Temp\proliv.exe
        "C:\Users\Admin\AppData\Local\Temp\proliv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.sfx.exe
          "C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.sfx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.exe
            "C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:388
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\odt\services.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:700
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\ActionCenter\SppExtComObj.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:4020
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "lsass" /sc ONLOGON /tr "'C:\Boot\qps-ploc\lsass.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:3956
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9a0fEmkzCd.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Windows\system32\chcp.com
                chcp 65001
                7⤵
                  PID:3656
                • C:\Windows\system32\PING.EXE
                  ping -n 5 localhost
                  7⤵
                  • Runs ping.exe
                  PID:3492
                • C:\odt\services.exe
                  "C:\odt\services.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2892
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:1096
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:4020
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:200
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:2544
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:2452
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:3712
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:776
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:3896
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3228

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Execution

                      Scheduled Task

                      1
                      T1053

                      Persistence

                      Scheduled Task

                      1
                      T1053

                      Privilege Escalation

                      Scheduled Task

                      1
                      T1053

                      Discovery

                      System Information Discovery

                      2
                      T1082

                      Query Registry

                      1
                      T1012

                      Peripheral Device Discovery

                      1
                      T1120

                      Remote System Discovery

                      1
                      T1018

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\76DB.exe
                        MD5

                        e2c99129da6a5f0fc5e00fba0d8b2518

                        SHA1

                        18f9d04b392fbfc09c64fa7136751ae22d65d1cc

                        SHA256

                        ec21a995806e62e450bf566a2746d2c54ba89029d5ae073dbcc5c69f03776fe5

                        SHA512

                        1506e22dc742421c5e25318697a718831673e6f2be65117cc1edd535afef0a79bff4869657fac3393bacd64e0c474f08fd121013bbc43d91b93838b4d37ede83

                      • C:\Users\Admin\AppData\Local\Temp\76DB.exe
                        MD5

                        e2c99129da6a5f0fc5e00fba0d8b2518

                        SHA1

                        18f9d04b392fbfc09c64fa7136751ae22d65d1cc

                        SHA256

                        ec21a995806e62e450bf566a2746d2c54ba89029d5ae073dbcc5c69f03776fe5

                        SHA512

                        1506e22dc742421c5e25318697a718831673e6f2be65117cc1edd535afef0a79bff4869657fac3393bacd64e0c474f08fd121013bbc43d91b93838b4d37ede83

                      • C:\Users\Admin\AppData\Local\Temp\9a0fEmkzCd.bat
                        MD5

                        64ba9c7c45b1151b457aafcf1c761d6d

                        SHA1

                        979bf9f70a5efa235ae16c1b30b0f56c614ceee2

                        SHA256

                        f7fcfe3a279e5b46eeaf32b27864a6368def3d9f8e4f34d68e547b17c5b75080

                        SHA512

                        3dddf239185194a1b2ab94b0e1cce0ab286b68aae551cc24d1680087cd347dcefce1952c202c56fb170d43e14a726fd8ed0c14ab106e0b9335065b25e92ed90e

                      • C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.exe
                        MD5

                        251178f10fbd7b2ca7926f35e05b7b82

                        SHA1

                        3928c8cc09df615ec3bb9ebc23c2ad59c1a8d49c

                        SHA256

                        fb039991849ed2b8545ef81175239ba16eed16f7d5e8c2efcaa1f700328f2b20

                        SHA512

                        e82aa6936033b6c60c49c7abb5ee1eb1a75a8d607b6c6daa2ba4894b6db1c616c525d49507eaf53687a12c597aacffd1ba2626389db1bdfda57236ddeec831af

                      • C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.exe
                        MD5

                        251178f10fbd7b2ca7926f35e05b7b82

                        SHA1

                        3928c8cc09df615ec3bb9ebc23c2ad59c1a8d49c

                        SHA256

                        fb039991849ed2b8545ef81175239ba16eed16f7d5e8c2efcaa1f700328f2b20

                        SHA512

                        e82aa6936033b6c60c49c7abb5ee1eb1a75a8d607b6c6daa2ba4894b6db1c616c525d49507eaf53687a12c597aacffd1ba2626389db1bdfda57236ddeec831af

                      • C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.sfx.exe
                        MD5

                        8c4279dfabec389b6c31084c671cb9d0

                        SHA1

                        d883f8fc169cc617f08054fd6c1216e148dd86b9

                        SHA256

                        63d067bf36c30b763be9f64caedcff84e1ed7b62f2b4a8d00343e22e755ccfcc

                        SHA512

                        bceec6ec61c31e0f8f748d34355bc690326d5993d1ef141ffe4517bc86ad34be8c3e0a9a61bc1ecda56440825af69b6a9c180d6e72d5c60cc108cc609db89fbf

                      • C:\Users\Admin\AppData\Local\Temp\RefDhcpsvcrefCrt.vmp.sfx.exe
                        MD5

                        8c4279dfabec389b6c31084c671cb9d0

                        SHA1

                        d883f8fc169cc617f08054fd6c1216e148dd86b9

                        SHA256

                        63d067bf36c30b763be9f64caedcff84e1ed7b62f2b4a8d00343e22e755ccfcc

                        SHA512

                        bceec6ec61c31e0f8f748d34355bc690326d5993d1ef141ffe4517bc86ad34be8c3e0a9a61bc1ecda56440825af69b6a9c180d6e72d5c60cc108cc609db89fbf

                      • C:\Users\Admin\AppData\Local\Temp\proliv.exe
                        MD5

                        785690ebf65253311199b6f77ac150bb

                        SHA1

                        f97161c515d47079d21792a333b185fed5b1b6ef

                        SHA256

                        4f14882bdfb10dc3bc57471acd88070ea3d2a39af3f202911e7674e874720921

                        SHA512

                        102d4b7c028edfe6df6c8a227adfc635d943378ef371f2efe6d7f0666a4630e3c1c9c44037feaf7a0d22785eee1ba74023c743e18dfcd8a99f9fdb3c690eef18

                      • C:\Users\Admin\AppData\Local\Temp\proliv.exe
                        MD5

                        785690ebf65253311199b6f77ac150bb

                        SHA1

                        f97161c515d47079d21792a333b185fed5b1b6ef

                        SHA256

                        4f14882bdfb10dc3bc57471acd88070ea3d2a39af3f202911e7674e874720921

                        SHA512

                        102d4b7c028edfe6df6c8a227adfc635d943378ef371f2efe6d7f0666a4630e3c1c9c44037feaf7a0d22785eee1ba74023c743e18dfcd8a99f9fdb3c690eef18

                      • C:\Users\Admin\AppData\Local\Temp\proliv.sfx.exe
                        MD5

                        99b6dcca0c2f2749c83bb6acfe172543

                        SHA1

                        508f0533484459f89c62709ef9f890c2acef4339

                        SHA256

                        8f9e1ecd1106fa37e98974e9b2650766fcfa48b24c3a8b9b07a23f6e69e06d07

                        SHA512

                        3eb86e92cb4c49782ea62b62f88967b3d26b9ef48e2d4db13140f6f5ef4c367871f3bf5912fca61dccbb5c415cd3be9636fc2ecffce7f46e7679bbb8cd7e8d4c

                      • C:\Users\Admin\AppData\Local\Temp\proliv.sfx.exe
                        MD5

                        99b6dcca0c2f2749c83bb6acfe172543

                        SHA1

                        508f0533484459f89c62709ef9f890c2acef4339

                        SHA256

                        8f9e1ecd1106fa37e98974e9b2650766fcfa48b24c3a8b9b07a23f6e69e06d07

                        SHA512

                        3eb86e92cb4c49782ea62b62f88967b3d26b9ef48e2d4db13140f6f5ef4c367871f3bf5912fca61dccbb5c415cd3be9636fc2ecffce7f46e7679bbb8cd7e8d4c

                      • C:\odt\services.exe
                        MD5

                        251178f10fbd7b2ca7926f35e05b7b82

                        SHA1

                        3928c8cc09df615ec3bb9ebc23c2ad59c1a8d49c

                        SHA256

                        fb039991849ed2b8545ef81175239ba16eed16f7d5e8c2efcaa1f700328f2b20

                        SHA512

                        e82aa6936033b6c60c49c7abb5ee1eb1a75a8d607b6c6daa2ba4894b6db1c616c525d49507eaf53687a12c597aacffd1ba2626389db1bdfda57236ddeec831af

                      • C:\odt\services.exe
                        MD5

                        251178f10fbd7b2ca7926f35e05b7b82

                        SHA1

                        3928c8cc09df615ec3bb9ebc23c2ad59c1a8d49c

                        SHA256

                        fb039991849ed2b8545ef81175239ba16eed16f7d5e8c2efcaa1f700328f2b20

                        SHA512

                        e82aa6936033b6c60c49c7abb5ee1eb1a75a8d607b6c6daa2ba4894b6db1c616c525d49507eaf53687a12c597aacffd1ba2626389db1bdfda57236ddeec831af

                      • memory/200-150-0x00000000005E0000-0x00000000005EB000-memory.dmp
                        Filesize

                        44KB

                      • memory/200-148-0x00000000005F0000-0x00000000005F7000-memory.dmp
                        Filesize

                        28KB

                      • memory/200-144-0x0000000000000000-mapping.dmp
                      • memory/388-155-0x0000000001550000-0x0000000001551000-memory.dmp
                        Filesize

                        4KB

                      • memory/388-149-0x0000000000FA0000-0x0000000000FA1000-memory.dmp
                        Filesize

                        4KB

                      • memory/388-154-0x000000001BCE0000-0x000000001BCE2000-memory.dmp
                        Filesize

                        8KB

                      • memory/388-145-0x0000000000000000-mapping.dmp
                      • memory/700-167-0x0000000000000000-mapping.dmp
                      • memory/776-165-0x00000000004E0000-0x00000000004E4000-memory.dmp
                        Filesize

                        16KB

                      • memory/776-166-0x00000000004D0000-0x00000000004D9000-memory.dmp
                        Filesize

                        36KB

                      • memory/776-164-0x0000000000000000-mapping.dmp
                      • memory/1096-125-0x0000000000350000-0x00000000003BB000-memory.dmp
                        Filesize

                        428KB

                      • memory/1096-124-0x0000000000600000-0x0000000000674000-memory.dmp
                        Filesize

                        464KB

                      • memory/1096-122-0x0000000000000000-mapping.dmp
                      • memory/1160-126-0x0000000000000000-mapping.dmp
                      • memory/2128-118-0x0000000000000000-mapping.dmp
                      • memory/2452-158-0x0000000000000000-mapping.dmp
                      • memory/2452-159-0x0000000000660000-0x0000000000665000-memory.dmp
                        Filesize

                        20KB

                      • memory/2452-160-0x0000000000650000-0x0000000000659000-memory.dmp
                        Filesize

                        36KB

                      • memory/2492-117-0x0000000001470000-0x0000000001486000-memory.dmp
                        Filesize

                        88KB

                      • memory/2536-114-0x0000000000400000-0x0000000000409000-memory.dmp
                        Filesize

                        36KB

                      • memory/2536-115-0x0000000000402E1A-mapping.dmp
                      • memory/2544-157-0x0000000000B20000-0x0000000000B2F000-memory.dmp
                        Filesize

                        60KB

                      • memory/2544-156-0x0000000000B30000-0x0000000000B39000-memory.dmp
                        Filesize

                        36KB

                      • memory/2544-153-0x0000000000000000-mapping.dmp
                      • memory/2616-171-0x0000000000000000-mapping.dmp
                      • memory/2732-139-0x0000000000000000-mapping.dmp
                      • memory/2856-134-0x0000000000000000-mapping.dmp
                      • memory/2892-188-0x00000000014F0000-0x00000000014F2000-memory.dmp
                        Filesize

                        8KB

                      • memory/2892-186-0x000000001C202000-0x000000001C203000-memory.dmp
                        Filesize

                        4KB

                      • memory/2892-180-0x0000000000000000-mapping.dmp
                      • memory/2892-187-0x00000000014C0000-0x00000000014C6000-memory.dmp
                        Filesize

                        24KB

                      • memory/3228-177-0x0000000000000000-mapping.dmp
                      • memory/3228-178-0x00000000004A0000-0x00000000004A5000-memory.dmp
                        Filesize

                        20KB

                      • memory/3228-179-0x0000000000490000-0x0000000000499000-memory.dmp
                        Filesize

                        36KB

                      • memory/3492-174-0x0000000000000000-mapping.dmp
                      • memory/3656-173-0x0000000000000000-mapping.dmp
                      • memory/3712-163-0x0000000000710000-0x000000000071C000-memory.dmp
                        Filesize

                        48KB

                      • memory/3712-162-0x0000000000720000-0x0000000000726000-memory.dmp
                        Filesize

                        24KB

                      • memory/3712-161-0x0000000000000000-mapping.dmp
                      • memory/3896-170-0x0000000000000000-mapping.dmp
                      • memory/3896-176-0x0000000000C00000-0x0000000000C09000-memory.dmp
                        Filesize

                        36KB

                      • memory/3896-175-0x0000000000C10000-0x0000000000C15000-memory.dmp
                        Filesize

                        20KB

                      • memory/3956-169-0x0000000000000000-mapping.dmp
                      • memory/4020-168-0x0000000000000000-mapping.dmp
                      • memory/4020-133-0x00000000001A0000-0x00000000001AC000-memory.dmp
                        Filesize

                        48KB

                      • memory/4020-132-0x00000000001B0000-0x00000000001B7000-memory.dmp
                        Filesize

                        28KB

                      • memory/4020-131-0x0000000000000000-mapping.dmp
                      • memory/4048-116-0x00000000008A0000-0x000000000094E000-memory.dmp
                        Filesize

                        696KB