Analysis

  • max time kernel
    151s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    14-08-2021 03:32

General

  • Target

    b19ea68941ac6a60f6a2d98fa80c022c.exe

  • Size

    181KB

  • MD5

    b19ea68941ac6a60f6a2d98fa80c022c

  • SHA1

    e1e3166abb974f8f1194005e46f73c2eb4218ead

  • SHA256

    cfc34e5f72f2f5960b55cdf15d303a4a3b1922779743587d81c7de00af23f2c0

  • SHA512

    a52cbf0539df5706b286f878d328dc02e1a2111c112b77be027e6d8a6d8fadea47373484c8e7c33b64ee9a2280dd225a4c91de620f63a904a064d89e6d08d644

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe
    "C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe
      "C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1496
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:2176
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:1512
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:2256
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:2668
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:1120
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:3924
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:2424
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:3876
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:3928

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Discovery

                    Query Registry

                    1
                    T1012

                    Peripheral Device Discovery

                    1
                    T1120

                    System Information Discovery

                    1
                    T1082

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1120-130-0x0000000000000000-mapping.dmp
                    • memory/1120-131-0x0000000000F80000-0x0000000000F85000-memory.dmp
                      Filesize

                      20KB

                    • memory/1120-132-0x0000000000F70000-0x0000000000F79000-memory.dmp
                      Filesize

                      36KB

                    • memory/1496-115-0x0000000000402E1A-mapping.dmp
                    • memory/1496-114-0x0000000000400000-0x0000000000409000-memory.dmp
                      Filesize

                      36KB

                    • memory/1512-122-0x0000000000420000-0x0000000000427000-memory.dmp
                      Filesize

                      28KB

                    • memory/1512-123-0x0000000000410000-0x000000000041C000-memory.dmp
                      Filesize

                      48KB

                    • memory/1512-121-0x0000000000000000-mapping.dmp
                    • memory/2176-118-0x0000000000000000-mapping.dmp
                    • memory/2176-119-0x00000000037D0000-0x0000000003844000-memory.dmp
                      Filesize

                      464KB

                    • memory/2176-120-0x00000000012F0000-0x000000000135B000-memory.dmp
                      Filesize

                      428KB

                    • memory/2256-124-0x0000000000000000-mapping.dmp
                    • memory/2256-125-0x00000000009F0000-0x00000000009F7000-memory.dmp
                      Filesize

                      28KB

                    • memory/2256-126-0x00000000009E0000-0x00000000009EB000-memory.dmp
                      Filesize

                      44KB

                    • memory/2424-136-0x0000000000000000-mapping.dmp
                    • memory/2424-137-0x0000000001000000-0x0000000001004000-memory.dmp
                      Filesize

                      16KB

                    • memory/2424-138-0x0000000000DF0000-0x0000000000DF9000-memory.dmp
                      Filesize

                      36KB

                    • memory/2668-129-0x00000000008F0000-0x00000000008FF000-memory.dmp
                      Filesize

                      60KB

                    • memory/2668-128-0x0000000000900000-0x0000000000909000-memory.dmp
                      Filesize

                      36KB

                    • memory/2668-127-0x0000000000000000-mapping.dmp
                    • memory/2824-117-0x0000000000F40000-0x0000000000F56000-memory.dmp
                      Filesize

                      88KB

                    • memory/3876-140-0x0000000000840000-0x0000000000845000-memory.dmp
                      Filesize

                      20KB

                    • memory/3876-141-0x0000000000830000-0x0000000000839000-memory.dmp
                      Filesize

                      36KB

                    • memory/3876-139-0x0000000000000000-mapping.dmp
                    • memory/3916-116-0x0000000002CD0000-0x0000000002CDA000-memory.dmp
                      Filesize

                      40KB

                    • memory/3924-135-0x0000000000900000-0x000000000090C000-memory.dmp
                      Filesize

                      48KB

                    • memory/3924-134-0x0000000000910000-0x0000000000916000-memory.dmp
                      Filesize

                      24KB

                    • memory/3924-133-0x0000000000000000-mapping.dmp
                    • memory/3928-142-0x0000000000000000-mapping.dmp
                    • memory/3928-143-0x0000000000990000-0x0000000000995000-memory.dmp
                      Filesize

                      20KB

                    • memory/3928-144-0x0000000000980000-0x0000000000989000-memory.dmp
                      Filesize

                      36KB