Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-10-2021 16:42
Static task
static1
Behavioral task
behavioral1
Sample
11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe
Resource
win10-en-20210920
General
-
Target
11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe
-
Size
185KB
-
MD5
6b3b05d88c27ebec4effcdf9ce592de0
-
SHA1
e83041739c36aa198acd7dbbea1e64111fb0c38b
-
SHA256
11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f
-
SHA512
7abd5037008f5b6245190d5b7eae7c2aee79e7978bb88ba6032fb1d775b79792d3c21bea6d51f5380ec52ce91d1d34e5e127844490767e3e35f2a988e9447fd3
Malware Config
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
icedid
1976347518
portedauthenticati.ink
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
6AEB.exeSmartClock.exeD5DB.exeE78F.exepid process 8 6AEB.exe 3364 SmartClock.exe 2308 D5DB.exe 2012 E78F.exe -
Deletes itself 1 IoCs
Processes:
pid process 3028 -
Drops startup file 1 IoCs
Processes:
6AEB.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 6AEB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 3364 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exepid process 2720 11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe 2720 11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3028 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exepid process 2720 11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
D5DB.exedescription pid process Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeDebugPrivilege 2308 D5DB.exe Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
6AEB.exedescription pid process target process PID 3028 wrote to memory of 8 3028 6AEB.exe PID 3028 wrote to memory of 8 3028 6AEB.exe PID 3028 wrote to memory of 8 3028 6AEB.exe PID 8 wrote to memory of 3364 8 6AEB.exe SmartClock.exe PID 8 wrote to memory of 3364 8 6AEB.exe SmartClock.exe PID 8 wrote to memory of 3364 8 6AEB.exe SmartClock.exe PID 3028 wrote to memory of 2308 3028 D5DB.exe PID 3028 wrote to memory of 2308 3028 D5DB.exe PID 3028 wrote to memory of 2308 3028 D5DB.exe PID 3028 wrote to memory of 2012 3028 E78F.exe PID 3028 wrote to memory of 2012 3028 E78F.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe"C:\Users\Admin\AppData\Local\Temp\11a3c2f9bfa57c07f1a8fd8afe0071f775ccde87e3abdfb5f8f06caf3d18435f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\6AEB.exeC:\Users\Admin\AppData\Local\Temp\6AEB.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\D5DB.exeC:\Users\Admin\AppData\Local\Temp\D5DB.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\E78F.exeC:\Users\Admin\AppData\Local\Temp\E78F.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6AEB.exeMD5
23f7abd6cd6abedfb39c0a3d7c5d84d9
SHA1e0775d4503e75cf6021112b7567cbbf317754abd
SHA256e21619a3046918661695229131b6da6569d58460e31b043b620ce5db160031ed
SHA5129ca0d74abffb16767c92c3deb99ff7b4b1e8117584564a77235bc07bb1541c4a37bec1b09e4624df9d32414e9df6ddd18e118e17f53bf73287f3b173871205cf
-
C:\Users\Admin\AppData\Local\Temp\6AEB.exeMD5
23f7abd6cd6abedfb39c0a3d7c5d84d9
SHA1e0775d4503e75cf6021112b7567cbbf317754abd
SHA256e21619a3046918661695229131b6da6569d58460e31b043b620ce5db160031ed
SHA5129ca0d74abffb16767c92c3deb99ff7b4b1e8117584564a77235bc07bb1541c4a37bec1b09e4624df9d32414e9df6ddd18e118e17f53bf73287f3b173871205cf
-
C:\Users\Admin\AppData\Local\Temp\D5DB.exeMD5
4f0bdd79f373e79c29c5b778d2c02bc0
SHA1029e432f4ad15b9711d87af60ffb6cd832c0512b
SHA2564852d57a7359372dba40d704476b1f07fafe8359d447446729d56bcaea3398df
SHA5123037b4557201f3352d694de919fdfc289d9a8c31158a6ae9a89c0c73bde98078f0337c44ee6ebb79cdc70ded6aad200f9eb4ae6719b49004260a0918d5fcff80
-
C:\Users\Admin\AppData\Local\Temp\D5DB.exeMD5
4f0bdd79f373e79c29c5b778d2c02bc0
SHA1029e432f4ad15b9711d87af60ffb6cd832c0512b
SHA2564852d57a7359372dba40d704476b1f07fafe8359d447446729d56bcaea3398df
SHA5123037b4557201f3352d694de919fdfc289d9a8c31158a6ae9a89c0c73bde98078f0337c44ee6ebb79cdc70ded6aad200f9eb4ae6719b49004260a0918d5fcff80
-
C:\Users\Admin\AppData\Local\Temp\E78F.exeMD5
482546ac36d7158aee1d98e851bb438a
SHA1f8d60730daf9f513fe7a8607b3fd2d240a37eb91
SHA25688dd28e5663fc93826bfd0d281f596578b89dcc73e638fbe1e69d1b6360122ed
SHA5124f2f19f860fd488186d5f8e5f5cfd5884574d753b0bd31b6987a9c23dde7626e1cb3b796ba6edf03241455deb46a3452bc09e81fb3734230d27d6ddc967f6f7f
-
C:\Users\Admin\AppData\Local\Temp\E78F.exeMD5
482546ac36d7158aee1d98e851bb438a
SHA1f8d60730daf9f513fe7a8607b3fd2d240a37eb91
SHA25688dd28e5663fc93826bfd0d281f596578b89dcc73e638fbe1e69d1b6360122ed
SHA5124f2f19f860fd488186d5f8e5f5cfd5884574d753b0bd31b6987a9c23dde7626e1cb3b796ba6edf03241455deb46a3452bc09e81fb3734230d27d6ddc967f6f7f
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
23f7abd6cd6abedfb39c0a3d7c5d84d9
SHA1e0775d4503e75cf6021112b7567cbbf317754abd
SHA256e21619a3046918661695229131b6da6569d58460e31b043b620ce5db160031ed
SHA5129ca0d74abffb16767c92c3deb99ff7b4b1e8117584564a77235bc07bb1541c4a37bec1b09e4624df9d32414e9df6ddd18e118e17f53bf73287f3b173871205cf
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
23f7abd6cd6abedfb39c0a3d7c5d84d9
SHA1e0775d4503e75cf6021112b7567cbbf317754abd
SHA256e21619a3046918661695229131b6da6569d58460e31b043b620ce5db160031ed
SHA5129ca0d74abffb16767c92c3deb99ff7b4b1e8117584564a77235bc07bb1541c4a37bec1b09e4624df9d32414e9df6ddd18e118e17f53bf73287f3b173871205cf
-
memory/8-119-0x0000000000000000-mapping.dmp
-
memory/8-122-0x0000000002F70000-0x000000000301E000-memory.dmpFilesize
696KB
-
memory/8-123-0x0000000004C50000-0x0000000004CE1000-memory.dmpFilesize
580KB
-
memory/8-127-0x0000000000400000-0x0000000002F6B000-memory.dmpFilesize
43.4MB
-
memory/2012-142-0x0000000000000000-mapping.dmp
-
memory/2012-145-0x0000000140000000-0x00000001400B4000-memory.dmpFilesize
720KB
-
memory/2308-137-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/2308-140-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/2308-130-0x0000000000000000-mapping.dmp
-
memory/2308-141-0x0000000004D90000-0x000000000528E000-memory.dmpFilesize
5.0MB
-
memory/2308-133-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/2308-135-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/2308-136-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/2308-139-0x0000000004DC0000-0x0000000004DC1000-memory.dmpFilesize
4KB
-
memory/2308-138-0x0000000004D90000-0x000000000528E000-memory.dmpFilesize
5.0MB
-
memory/2720-116-0x0000000002FE0000-0x000000000312A000-memory.dmpFilesize
1.3MB
-
memory/2720-117-0x0000000000400000-0x0000000002EF4000-memory.dmpFilesize
43.0MB
-
memory/2720-115-0x0000000002FE0000-0x000000000312A000-memory.dmpFilesize
1.3MB
-
memory/3028-118-0x0000000000E90000-0x0000000000EA6000-memory.dmpFilesize
88KB
-
memory/3364-129-0x0000000000400000-0x0000000002F6B000-memory.dmpFilesize
43.4MB
-
memory/3364-128-0x0000000004B70000-0x0000000004BEF000-memory.dmpFilesize
508KB
-
memory/3364-124-0x0000000000000000-mapping.dmp