Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-10-2021 11:34
Static task
static1
Behavioral task
behavioral1
Sample
0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe
Resource
win10-en-20211014
General
-
Target
0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe
-
Size
213KB
-
MD5
f50e748b30a91dd671d0c6fc2f8e8681
-
SHA1
67cee6fffd5e2ab09ed92f490b2f991902ce3c85
-
SHA256
0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032
-
SHA512
f081143710eef0ae705a7b145a46e0e08cbde32db587a8485b3867d0dcc17fb2378ee49ab35198072018a02ac384ce9b9532c2c944bbcbcbd38aae79a55f9f8a
Malware Config
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
raccoon
187e8d46623768b376fedb48580157fafedb4942
-
url4cnc
http://telegin.top/frombobu98s
http://ttmirror.top/frombobu98s
http://teletele.top/frombobu98s
http://telegalive.top/frombobu98s
http://toptelete.top/frombobu98s
http://telegraf.top/frombobu98s
https://t.me/frombobu98s
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2440 created 1776 2440 WerFault.exe F3C3.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
8180.exeSmartClock.exeF3C3.exepid process 4580 8180.exe 4720 SmartClock.exe 1776 F3C3.exe -
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Drops startup file 1 IoCs
Processes:
8180.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 8180.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2440 1776 WerFault.exe F3C3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 4720 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exepid process 2216 0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe 2216 0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3056 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exepid process 2216 0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2440 WerFault.exe Token: SeBackupPrivilege 2440 WerFault.exe Token: SeDebugPrivilege 2440 WerFault.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3056 3056 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3056 3056 3056 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8180.exedescription pid process target process PID 3056 wrote to memory of 4580 3056 8180.exe PID 3056 wrote to memory of 4580 3056 8180.exe PID 3056 wrote to memory of 4580 3056 8180.exe PID 4580 wrote to memory of 4720 4580 8180.exe SmartClock.exe PID 4580 wrote to memory of 4720 4580 8180.exe SmartClock.exe PID 4580 wrote to memory of 4720 4580 8180.exe SmartClock.exe PID 3056 wrote to memory of 1776 3056 F3C3.exe PID 3056 wrote to memory of 1776 3056 F3C3.exe PID 3056 wrote to memory of 1776 3056 F3C3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe"C:\Users\Admin\AppData\Local\Temp\0c234eb09ebee0e484dca3d0f6bf3072843b89527ecd6cfa4680eb27f0b8f032.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\8180.exeC:\Users\Admin\AppData\Local\Temp\8180.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\F3C3.exeC:\Users\Admin\AppData\Local\Temp\F3C3.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 10162⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8180.exeMD5
0791a29b349cb041ce7a942927ec2d34
SHA13ad5f687f84082a64787808eca134db2e561bb2f
SHA256305fe55e6c47c88aae2cfab4f4a45b5ceac3d08ccd6f6d42667aa826e04e9598
SHA512db25f9cb727ca67b340176335f5b4b4cd0da78bb687b9adee02a741d7b7da66fa3d9fd8efd46514f727264d21373753e8ee35424765f2e5bcf91c959c90965fa
-
C:\Users\Admin\AppData\Local\Temp\8180.exeMD5
0791a29b349cb041ce7a942927ec2d34
SHA13ad5f687f84082a64787808eca134db2e561bb2f
SHA256305fe55e6c47c88aae2cfab4f4a45b5ceac3d08ccd6f6d42667aa826e04e9598
SHA512db25f9cb727ca67b340176335f5b4b4cd0da78bb687b9adee02a741d7b7da66fa3d9fd8efd46514f727264d21373753e8ee35424765f2e5bcf91c959c90965fa
-
C:\Users\Admin\AppData\Local\Temp\F3C3.exeMD5
248d4db4353a519f94d61b9f7f09f70f
SHA1ba27bf3fcf5aa9fda7e6cab44770481c0825f4c9
SHA256e74e2260c8edc4e6789ed628a428190b281b292294f4f1af2b4c669a78a710ff
SHA512ffd3b84fa77728fe03d32541ddc87e285bd1174d61613181e7ef75eb7e7e4147f4a767be60c83b0a80ef02dfacf92b783a302bc776e363119f99d2ca86ffb8a0
-
C:\Users\Admin\AppData\Local\Temp\F3C3.exeMD5
248d4db4353a519f94d61b9f7f09f70f
SHA1ba27bf3fcf5aa9fda7e6cab44770481c0825f4c9
SHA256e74e2260c8edc4e6789ed628a428190b281b292294f4f1af2b4c669a78a710ff
SHA512ffd3b84fa77728fe03d32541ddc87e285bd1174d61613181e7ef75eb7e7e4147f4a767be60c83b0a80ef02dfacf92b783a302bc776e363119f99d2ca86ffb8a0
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
0791a29b349cb041ce7a942927ec2d34
SHA13ad5f687f84082a64787808eca134db2e561bb2f
SHA256305fe55e6c47c88aae2cfab4f4a45b5ceac3d08ccd6f6d42667aa826e04e9598
SHA512db25f9cb727ca67b340176335f5b4b4cd0da78bb687b9adee02a741d7b7da66fa3d9fd8efd46514f727264d21373753e8ee35424765f2e5bcf91c959c90965fa
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
0791a29b349cb041ce7a942927ec2d34
SHA13ad5f687f84082a64787808eca134db2e561bb2f
SHA256305fe55e6c47c88aae2cfab4f4a45b5ceac3d08ccd6f6d42667aa826e04e9598
SHA512db25f9cb727ca67b340176335f5b4b4cd0da78bb687b9adee02a741d7b7da66fa3d9fd8efd46514f727264d21373753e8ee35424765f2e5bcf91c959c90965fa
-
memory/1776-129-0x0000000000000000-mapping.dmp
-
memory/1776-132-0x0000000004A10000-0x0000000004A5E000-memory.dmpFilesize
312KB
-
memory/1776-134-0x0000000000400000-0x0000000002F42000-memory.dmpFilesize
43.3MB
-
memory/1776-133-0x0000000004AA0000-0x0000000004B2E000-memory.dmpFilesize
568KB
-
memory/2216-115-0x0000000002F00000-0x000000000304A000-memory.dmpFilesize
1.3MB
-
memory/2216-116-0x0000000002F00000-0x000000000304A000-memory.dmpFilesize
1.3MB
-
memory/2216-117-0x0000000000400000-0x0000000002EFC000-memory.dmpFilesize
43.0MB
-
memory/3056-118-0x0000000000720000-0x0000000000736000-memory.dmpFilesize
88KB
-
memory/4580-124-0x0000000000400000-0x0000000002F73000-memory.dmpFilesize
43.4MB
-
memory/4580-122-0x0000000003210000-0x0000000003290000-memory.dmpFilesize
512KB
-
memory/4580-123-0x0000000004CA0000-0x0000000004D31000-memory.dmpFilesize
580KB
-
memory/4580-119-0x0000000000000000-mapping.dmp
-
memory/4720-125-0x0000000000000000-mapping.dmp
-
memory/4720-128-0x0000000000400000-0x0000000002F73000-memory.dmpFilesize
43.4MB