Analysis
-
max time kernel
1805s -
max time network
1808s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-10-2021 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Fri0541e16ce794d258f.exe
Resource
win7-ja-20211014
Behavioral task
behavioral2
Sample
Fri0541e16ce794d258f.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
Fri0541e16ce794d258f.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
Fri0541e16ce794d258f.exe
Resource
win11
Behavioral task
behavioral5
Sample
Fri0541e16ce794d258f.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
Fri0541e16ce794d258f.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
Fri0541e16ce794d258f.exe
Resource
win10-de-20210920
General
-
Target
Fri0541e16ce794d258f.exe
-
Size
284KB
-
MD5
dec69c757ce1ae8454f97ef6966aa817
-
SHA1
160d556701a012ab18194aeecaa396e21727c9b2
-
SHA256
2b396ae1fa95ef655bb7b0eb45532a857d882bb601adeb8fb1b5d43dcff9ec31
-
SHA512
c6304aa1a5b762804c81461fb1db1bae9ba57120c279dfb1ad83c3bb2e3309563f15c90a1a04a9f3acb5aac3a527432a87d1bb7ba32846dc75bda961b162db16
Malware Config
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Extracted
icedid
1875681804
enticationmetho.ink
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
4846.exeudbrhrtudbrhrtudbrhrtpid process 1204 4846.exe 1480 udbrhrt 1968 udbrhrt 1196 udbrhrt -
Deletes itself 1 IoCs
Processes:
pid process 1420 -
Loads dropped DLL 2 IoCs
Processes:
pid process 1420 1420 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Fri0541e16ce794d258f.exeudbrhrtudbrhrtudbrhrtdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri0541e16ce794d258f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri0541e16ce794d258f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Fri0541e16ce794d258f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI udbrhrt -
Processes:
4846.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 4846.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 4846.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 4846.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 4846.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Fri0541e16ce794d258f.exepid process 1568 Fri0541e16ce794d258f.exe 1568 Fri0541e16ce794d258f.exe 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 1420 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1420 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
Fri0541e16ce794d258f.exeudbrhrtudbrhrtudbrhrtpid process 1568 Fri0541e16ce794d258f.exe 1480 udbrhrt 1968 udbrhrt 1196 udbrhrt -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1420 Token: SeShutdownPrivilege 1420 Token: SeShutdownPrivilege 1420 Token: SeShutdownPrivilege 1420 Token: SeShutdownPrivilege 1420 Token: SeShutdownPrivilege 1420 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1420 1420 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1420 1420 -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
taskeng.exetaskeng.exetaskeng.exedescription pid process target process PID 1420 wrote to memory of 1204 1420 4846.exe PID 1420 wrote to memory of 1204 1420 4846.exe PID 1420 wrote to memory of 1204 1420 4846.exe PID 1176 wrote to memory of 1480 1176 taskeng.exe udbrhrt PID 1176 wrote to memory of 1480 1176 taskeng.exe udbrhrt PID 1176 wrote to memory of 1480 1176 taskeng.exe udbrhrt PID 1176 wrote to memory of 1480 1176 taskeng.exe udbrhrt PID 304 wrote to memory of 1968 304 taskeng.exe udbrhrt PID 304 wrote to memory of 1968 304 taskeng.exe udbrhrt PID 304 wrote to memory of 1968 304 taskeng.exe udbrhrt PID 304 wrote to memory of 1968 304 taskeng.exe udbrhrt PID 1188 wrote to memory of 1196 1188 taskeng.exe udbrhrt PID 1188 wrote to memory of 1196 1188 taskeng.exe udbrhrt PID 1188 wrote to memory of 1196 1188 taskeng.exe udbrhrt PID 1188 wrote to memory of 1196 1188 taskeng.exe udbrhrt
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fri0541e16ce794d258f.exe"C:\Users\Admin\AppData\Local\Temp\Fri0541e16ce794d258f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4846.exeC:\Users\Admin\AppData\Local\Temp\4846.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\system32\taskeng.exetaskeng.exe {1097AC97-89DC-485E-80FB-F5086C629D7F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\udbrhrtC:\Users\Admin\AppData\Roaming\udbrhrt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\taskeng.exetaskeng.exe {FD5D85FD-667E-4D93-B449-69B6BF868DBB} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\udbrhrtC:\Users\Admin\AppData\Roaming\udbrhrt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\taskeng.exetaskeng.exe {CCF8724B-E06D-4AF5-BF49-96D88CB42306} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\udbrhrtC:\Users\Admin\AppData\Roaming\udbrhrt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4846.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
C:\Users\Admin\AppData\Roaming\udbrhrtMD5
dec69c757ce1ae8454f97ef6966aa817
SHA1160d556701a012ab18194aeecaa396e21727c9b2
SHA2562b396ae1fa95ef655bb7b0eb45532a857d882bb601adeb8fb1b5d43dcff9ec31
SHA512c6304aa1a5b762804c81461fb1db1bae9ba57120c279dfb1ad83c3bb2e3309563f15c90a1a04a9f3acb5aac3a527432a87d1bb7ba32846dc75bda961b162db16
-
C:\Users\Admin\AppData\Roaming\udbrhrtMD5
dec69c757ce1ae8454f97ef6966aa817
SHA1160d556701a012ab18194aeecaa396e21727c9b2
SHA2562b396ae1fa95ef655bb7b0eb45532a857d882bb601adeb8fb1b5d43dcff9ec31
SHA512c6304aa1a5b762804c81461fb1db1bae9ba57120c279dfb1ad83c3bb2e3309563f15c90a1a04a9f3acb5aac3a527432a87d1bb7ba32846dc75bda961b162db16
-
C:\Users\Admin\AppData\Roaming\udbrhrtMD5
dec69c757ce1ae8454f97ef6966aa817
SHA1160d556701a012ab18194aeecaa396e21727c9b2
SHA2562b396ae1fa95ef655bb7b0eb45532a857d882bb601adeb8fb1b5d43dcff9ec31
SHA512c6304aa1a5b762804c81461fb1db1bae9ba57120c279dfb1ad83c3bb2e3309563f15c90a1a04a9f3acb5aac3a527432a87d1bb7ba32846dc75bda961b162db16
-
C:\Users\Admin\AppData\Roaming\udbrhrtMD5
dec69c757ce1ae8454f97ef6966aa817
SHA1160d556701a012ab18194aeecaa396e21727c9b2
SHA2562b396ae1fa95ef655bb7b0eb45532a857d882bb601adeb8fb1b5d43dcff9ec31
SHA512c6304aa1a5b762804c81461fb1db1bae9ba57120c279dfb1ad83c3bb2e3309563f15c90a1a04a9f3acb5aac3a527432a87d1bb7ba32846dc75bda961b162db16
-
\Users\Admin\AppData\Local\Temp\4846.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
\Users\Admin\AppData\Local\Temp\4846.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
memory/1196-81-0x0000000000400000-0x0000000000877000-memory.dmpFilesize
4.5MB
-
memory/1196-79-0x0000000000948000-0x0000000000959000-memory.dmpFilesize
68KB
-
memory/1196-77-0x0000000000000000-mapping.dmp
-
memory/1204-61-0x0000000000000000-mapping.dmp
-
memory/1204-63-0x0000000140000000-0x0000000140009000-memory.dmpFilesize
36KB
-
memory/1420-76-0x0000000003D90000-0x0000000003DA6000-memory.dmpFilesize
88KB
-
memory/1420-82-0x0000000003DD0000-0x0000000003DE6000-memory.dmpFilesize
88KB
-
memory/1420-58-0x00000000025D0000-0x00000000025E6000-memory.dmpFilesize
88KB
-
memory/1420-70-0x00000000041E0000-0x00000000041F6000-memory.dmpFilesize
88KB
-
memory/1480-69-0x0000000000400000-0x0000000000877000-memory.dmpFilesize
4.5MB
-
memory/1480-65-0x0000000000000000-mapping.dmp
-
memory/1480-67-0x00000000002C8000-0x00000000002D9000-memory.dmpFilesize
68KB
-
memory/1568-54-0x0000000000979000-0x0000000000989000-memory.dmpFilesize
64KB
-
memory/1568-56-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/1568-57-0x0000000000400000-0x0000000000877000-memory.dmpFilesize
4.5MB
-
memory/1568-55-0x0000000075951000-0x0000000075953000-memory.dmpFilesize
8KB
-
memory/1968-73-0x0000000000958000-0x0000000000969000-memory.dmpFilesize
68KB
-
memory/1968-75-0x0000000000400000-0x0000000000877000-memory.dmpFilesize
4.5MB
-
memory/1968-71-0x0000000000000000-mapping.dmp