Resubmissions

26-09-2021 14:45

210926-r4qb2aehcm 10

26-09-2021 14:41

210926-r2wq2afaa9 10

Analysis

  • max time kernel
    601s
  • max time network
    398s
  • platform
    windows7_x64
  • resource
    win7-de-20210920
  • submitted
    26-09-2021 14:45

General

  • Target

    c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24.exe

  • Size

    139KB

  • MD5

    3e201fc20a90e669990e2994d2114b83

  • SHA1

    24bfc9636c793e7ceb309b08e319b2d925a080bd

  • SHA256

    c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24

  • SHA512

    4dae9203c1003ca32600d153d7a9f08fa3c50d7c665ee81d4d7608d8f47354e48493d4bb39af2a3259c7882ca0ba38f4db52033b0df3ddf4321cb7118b228591

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24.exe
    "C:\Users\Admin\AppData\Local\Temp\c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Local\Temp\c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24.exe
      "C:\Users\Admin\AppData\Local\Temp\c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:956
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4C70E113-7879-45EF-9F8A-8DDCEDC99E1E} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Roaming\rrbfjwh
      C:\Users\Admin\AppData\Roaming\rrbfjwh
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Roaming\rrbfjwh
        C:\Users\Admin\AppData\Roaming\rrbfjwh
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:1632
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {16492704-EB3D-4162-A770-77DAA80EC853} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
      PID:316
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {DA89C77D-6D9A-4B6B-A16E-50B3C3237678} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Program Files\Mozilla Firefox\default-browser-agent.exe
        "C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task
        2⤵
          PID:1384

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\rrbfjwh
        MD5

        3e201fc20a90e669990e2994d2114b83

        SHA1

        24bfc9636c793e7ceb309b08e319b2d925a080bd

        SHA256

        c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24

        SHA512

        4dae9203c1003ca32600d153d7a9f08fa3c50d7c665ee81d4d7608d8f47354e48493d4bb39af2a3259c7882ca0ba38f4db52033b0df3ddf4321cb7118b228591

      • C:\Users\Admin\AppData\Roaming\rrbfjwh
        MD5

        3e201fc20a90e669990e2994d2114b83

        SHA1

        24bfc9636c793e7ceb309b08e319b2d925a080bd

        SHA256

        c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24

        SHA512

        4dae9203c1003ca32600d153d7a9f08fa3c50d7c665ee81d4d7608d8f47354e48493d4bb39af2a3259c7882ca0ba38f4db52033b0df3ddf4321cb7118b228591

      • C:\Users\Admin\AppData\Roaming\rrbfjwh
        MD5

        3e201fc20a90e669990e2994d2114b83

        SHA1

        24bfc9636c793e7ceb309b08e319b2d925a080bd

        SHA256

        c8c2f5565b13fbb60b89d11b7e71a03666c3afb2246b87e633cac8023bec0b24

        SHA512

        4dae9203c1003ca32600d153d7a9f08fa3c50d7c665ee81d4d7608d8f47354e48493d4bb39af2a3259c7882ca0ba38f4db52033b0df3ddf4321cb7118b228591

      • memory/956-54-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/956-55-0x0000000000402FA5-mapping.dmp
      • memory/956-56-0x0000000076391000-0x0000000076393000-memory.dmp
        Filesize

        8KB

      • memory/1228-58-0x0000000002A90000-0x0000000002AA6000-memory.dmp
        Filesize

        88KB

      • memory/1228-66-0x0000000002BB0000-0x0000000002BC6000-memory.dmp
        Filesize

        88KB

      • memory/1384-67-0x0000000000000000-mapping.dmp
      • memory/1400-60-0x0000000000000000-mapping.dmp
      • memory/1592-57-0x0000000000220000-0x0000000000229000-memory.dmp
        Filesize

        36KB

      • memory/1632-63-0x0000000000402FA5-mapping.dmp