Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-10-2021 11:10
Static task
static1
Behavioral task
behavioral1
Sample
pub3.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
pub3.exe
Resource
win10-en-20210920
General
-
Target
pub3.exe
-
Size
335KB
-
MD5
e34cba52b1206c828978872b9338f430
-
SHA1
7b03d09434b98a479c8b3e84a2abf990e3918b93
-
SHA256
3632bc3aa58008650c9633e908804b5db470311e8e6de3a08a8ca598327b2a41
-
SHA512
62ece1d4a19e5572fb2a2af9c9810f56fa95e9449b4133a5ce4635e928c237de48bdac0b480ef70c7a59ba0f287bd409ab618b1e4ffe557b41070a5cd16d1353
Malware Config
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Extracted
icedid
1875681804
enticationmetho.ink
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
967F.exeC3BA.exeSmartClock.exepid process 4660 967F.exe 536 C3BA.exe 820 SmartClock.exe -
Deletes itself 1 IoCs
Processes:
pid process 2552 -
Drops startup file 1 IoCs
Processes:
C3BA.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk C3BA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
pub3.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI pub3.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 820 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pub3.exepid process 3632 pub3.exe 3632 pub3.exe 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 2552 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2552 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
pub3.exepid process 3632 pub3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
C3BA.exedescription pid process target process PID 2552 wrote to memory of 4660 2552 967F.exe PID 2552 wrote to memory of 4660 2552 967F.exe PID 2552 wrote to memory of 536 2552 C3BA.exe PID 2552 wrote to memory of 536 2552 C3BA.exe PID 2552 wrote to memory of 536 2552 C3BA.exe PID 536 wrote to memory of 820 536 C3BA.exe SmartClock.exe PID 536 wrote to memory of 820 536 C3BA.exe SmartClock.exe PID 536 wrote to memory of 820 536 C3BA.exe SmartClock.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pub3.exe"C:\Users\Admin\AppData\Local\Temp\pub3.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\967F.exeC:\Users\Admin\AppData\Local\Temp\967F.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\C3BA.exeC:\Users\Admin\AppData\Local\Temp\C3BA.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\967F.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
C:\Users\Admin\AppData\Local\Temp\967F.exeMD5
81fc38de5b6197c4db58eb506037e7cb
SHA1c2258ab3204e6061d548df202c99aa361242d848
SHA2562b9cba43290c9d4cc2d6a47432ddac5752c63e5ac519c2056ba466580424ed3b
SHA5124c96e9104e55454e741a13be34a7c5a3afb8d0d17c1924d629acbd487975d88d4435fd46b34649defe2d047ff4c84e06c4a0d0176085c7b5ab4d80eed18b0d9a
-
C:\Users\Admin\AppData\Local\Temp\C3BA.exeMD5
87298d878454b01a575fa91744008cb8
SHA176be4a6c063f4e3b5e2e9c1f365bf50cf1a1f025
SHA256308a45a744327c9c3aece85566c40997ef7ad1b483294431908e29b01c64acbe
SHA5121874d9e17c1b0f306b0c3482377c6fd1515ea3a58e9a72b4ea28f07cbd21c7159c628111bdefd14cab49cd14314f8a36e516dec251d543cebea48d1d93d308fc
-
C:\Users\Admin\AppData\Local\Temp\C3BA.exeMD5
87298d878454b01a575fa91744008cb8
SHA176be4a6c063f4e3b5e2e9c1f365bf50cf1a1f025
SHA256308a45a744327c9c3aece85566c40997ef7ad1b483294431908e29b01c64acbe
SHA5121874d9e17c1b0f306b0c3482377c6fd1515ea3a58e9a72b4ea28f07cbd21c7159c628111bdefd14cab49cd14314f8a36e516dec251d543cebea48d1d93d308fc
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
87298d878454b01a575fa91744008cb8
SHA176be4a6c063f4e3b5e2e9c1f365bf50cf1a1f025
SHA256308a45a744327c9c3aece85566c40997ef7ad1b483294431908e29b01c64acbe
SHA5121874d9e17c1b0f306b0c3482377c6fd1515ea3a58e9a72b4ea28f07cbd21c7159c628111bdefd14cab49cd14314f8a36e516dec251d543cebea48d1d93d308fc
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
87298d878454b01a575fa91744008cb8
SHA176be4a6c063f4e3b5e2e9c1f365bf50cf1a1f025
SHA256308a45a744327c9c3aece85566c40997ef7ad1b483294431908e29b01c64acbe
SHA5121874d9e17c1b0f306b0c3482377c6fd1515ea3a58e9a72b4ea28f07cbd21c7159c628111bdefd14cab49cd14314f8a36e516dec251d543cebea48d1d93d308fc
-
memory/536-127-0x0000000001360000-0x00000000013F1000-memory.dmpFilesize
580KB
-
memory/536-126-0x00000000011A1000-0x0000000001221000-memory.dmpFilesize
512KB
-
memory/536-123-0x0000000000000000-mapping.dmp
-
memory/536-132-0x0000000000400000-0x0000000001094000-memory.dmpFilesize
12.6MB
-
memory/820-131-0x0000000001451000-0x00000000014D1000-memory.dmpFilesize
512KB
-
memory/820-128-0x0000000000000000-mapping.dmp
-
memory/820-133-0x00000000010A0000-0x00000000011EA000-memory.dmpFilesize
1.3MB
-
memory/820-134-0x0000000000400000-0x0000000001094000-memory.dmpFilesize
12.6MB
-
memory/2552-118-0x0000000000EB0000-0x0000000000EC6000-memory.dmpFilesize
88KB
-
memory/3632-115-0x0000000000B11000-0x0000000000B22000-memory.dmpFilesize
68KB
-
memory/3632-117-0x0000000000400000-0x0000000000883000-memory.dmpFilesize
4.5MB
-
memory/3632-116-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/4660-119-0x0000000000000000-mapping.dmp
-
memory/4660-122-0x0000000140000000-0x0000000140009000-memory.dmpFilesize
36KB