Resubmissions

12-11-2021 18:04

211112-wnzb8aahhm 10

19-11-2020 10:08

201119-rhwlt38jrx 10

18-11-2020 17:26

201118-htd4fq29va 10

Analysis

  • max time kernel
    336s
  • max time network
    354s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    12-11-2021 18:04

General

  • Target

    HYDRA.exe

  • Size

    2.6MB

  • MD5

    c52bc39684c52886712971a92f339b23

  • SHA1

    c5cb39850affb7ed322bfb0a4900e17c54f95a11

  • SHA256

    f8c17cb375e8ccad5b0e33dae65694a1bd628f91cac6cf65dd11f50e91130c2d

  • SHA512

    2d50c1aa6ca237b9dbe97f000a082a223618f2164c8ab42ace9f4e142c318b2fc53e91a476dbe9c2dd459942b61507df5c551bd5c692a2b2a2037e4f6bd2a12b

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://92.53.105.14/

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • suricata: ET MALWARE Possible Sharik/Smoke Loader Microsoft Connectivity check M3

    suricata: ET MALWARE Possible Sharik/Smoke Loader Microsoft Connectivity check M3

  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 9

    suricata: ET MALWARE Sharik/Smoke CnC Beacon 9

  • Executes dropped EXE 7 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
    "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Roaming\yaya.exe
      C:\Users\Admin\AppData\Roaming\yaya.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
        "C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zltwkivr.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF6A2.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF6A1.tmp"
            5⤵
              PID:760
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe"
            4⤵
              PID:640
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:1384
          • C:\Users\Admin\AppData\Roaming\va.exe
            C:\Users\Admin\AppData\Roaming\va.exe
            2⤵
            • Executes dropped EXE
            • Drops startup file
            PID:1172
          • C:\Users\Admin\AppData\Roaming\ufx.exe
            C:\Users\Admin\AppData\Roaming\ufx.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1564
            • C:\ProgramData\ucp\usc.exe
              "C:\ProgramData\ucp\usc.exe" /ucp/usc.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1732
              • C:\Windows\SysWOW64\SCHTASKS.exe
                SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
                4⤵
                • Creates scheduled task(s)
                PID:2484
          • C:\Users\Admin\AppData\Roaming\sant.exe
            C:\Users\Admin\AppData\Roaming\sant.exe
            2⤵
            • Executes dropped EXE
            • Maps connected drives based on registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4088
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              3⤵
              • Adds Run key to start application
              PID:3668
          • C:\Users\Admin\AppData\Roaming\power.exe
            C:\Users\Admin\AppData\Roaming\power.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2204
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1084

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\ucp\usc.exe
          MD5

          b100b373d645bf59b0487dbbda6c426d

          SHA1

          44a4ad2913f5f35408b8c16459dcce3f101bdcc7

          SHA256

          84d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7

          SHA512

          69483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b

        • C:\ProgramData\ucp\usc.exe
          MD5

          b100b373d645bf59b0487dbbda6c426d

          SHA1

          44a4ad2913f5f35408b8c16459dcce3f101bdcc7

          SHA256

          84d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7

          SHA512

          69483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b

        • C:\Users\Admin\AppData\Local\Temp\RESF6A2.tmp
          MD5

          1e8997e3a9575c3ca9003e69324687c0

          SHA1

          1d6c1f619f87a65fac59ca3c8541c8a8078ff158

          SHA256

          176a0f13b63df1c23292e59e9d43a49a8ed3bdf73d9d90383e32578a37c625e4

          SHA512

          e7fa03696032ca16426cd8f8a399a055591e43540c46655367252a2085be99c45c754b324455382f365fcf4953ce29c82c56a6d5c4ffb51570c2a51c5f2427ee

        • C:\Users\Admin\AppData\Local\Temp\zltwkivr.dll
          MD5

          6482211488d60af64412712da5f67504

          SHA1

          25da50b663f6e521ced82b60a31d7f07b7ca4135

          SHA256

          c11411444f4c5e4fa6446a0e49507540e7b1fb2de874253a1018642bc91de714

          SHA512

          086bd621a9341b0a52d0792296564b803bb2576470fb06e0841d9814ff99f579af9cea843ad13377cf332f92637943be0329d32f4f3608bbeb39f41397ba1142

        • C:\Users\Admin\AppData\Local\Temp\zltwkivr.pdb
          MD5

          057b83004d9fc43fcf371e693d7e45c4

          SHA1

          876a0e3d7c3fcb79b6abd60fb5574b6410eb2273

          SHA256

          56d90f180c77c72e7539b291c147bf86a0a3fd0fd23d3026be2f83a030551098

          SHA512

          0adc8230cce244197f353052bf2319c219036ca15bf9211d37844b9663ebf34e8042a526bca2a3629a29120f52a03f2af03b9e602ab42a0351d78dfdcbe8796c

        • C:\Users\Admin\AppData\Roaming\power.exe
          MD5

          743f47ae7d09fce22d0a7c724461f7e3

          SHA1

          8e98dd1efb70749af72c57344aab409fb927394e

          SHA256

          1bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465

          SHA512

          567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf

        • C:\Users\Admin\AppData\Roaming\power.exe
          MD5

          743f47ae7d09fce22d0a7c724461f7e3

          SHA1

          8e98dd1efb70749af72c57344aab409fb927394e

          SHA256

          1bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465

          SHA512

          567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf

        • C:\Users\Admin\AppData\Roaming\sant.exe
          MD5

          5effca91c3f1e9c87d364460097f8048

          SHA1

          28387c043ab6857aaa51865346046cf5dc4c7b49

          SHA256

          3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907

          SHA512

          b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0

        • C:\Users\Admin\AppData\Roaming\sant.exe
          MD5

          5effca91c3f1e9c87d364460097f8048

          SHA1

          28387c043ab6857aaa51865346046cf5dc4c7b49

          SHA256

          3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907

          SHA512

          b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0

        • C:\Users\Admin\AppData\Roaming\ufx.exe
          MD5

          22e088012519e1013c39a3828bda7498

          SHA1

          3a8a87cce3f6aff415ee39cf21738663c0610016

          SHA256

          9e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973

          SHA512

          5559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8

        • C:\Users\Admin\AppData\Roaming\ufx.exe
          MD5

          22e088012519e1013c39a3828bda7498

          SHA1

          3a8a87cce3f6aff415ee39cf21738663c0610016

          SHA256

          9e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973

          SHA512

          5559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8

        • C:\Users\Admin\AppData\Roaming\va.exe
          MD5

          c084e736931c9e6656362b0ba971a628

          SHA1

          ef83b95fc645ad3a161a19ccef3224c72e5472bd

          SHA256

          3139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1

          SHA512

          cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f

        • C:\Users\Admin\AppData\Roaming\va.exe
          MD5

          c084e736931c9e6656362b0ba971a628

          SHA1

          ef83b95fc645ad3a161a19ccef3224c72e5472bd

          SHA256

          3139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1

          SHA512

          cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f

        • C:\Users\Admin\AppData\Roaming\yaya.exe
          MD5

          7d05ab95cfe93d84bc5db006c789a47f

          SHA1

          aa4aa0189140670c618348f1baad877b8eca04a4

          SHA256

          5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f

          SHA512

          40d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84

        • C:\Users\Admin\AppData\Roaming\yaya.exe
          MD5

          7d05ab95cfe93d84bc5db006c789a47f

          SHA1

          aa4aa0189140670c618348f1baad877b8eca04a4

          SHA256

          5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f

          SHA512

          40d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84

        • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
          MD5

          51bf85f3bf56e628b52d61614192359d

          SHA1

          c1bc90be6a4beb67fb7b195707798106114ec332

          SHA256

          990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446

          SHA512

          131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474

        • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
          MD5

          51bf85f3bf56e628b52d61614192359d

          SHA1

          c1bc90be6a4beb67fb7b195707798106114ec332

          SHA256

          990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446

          SHA512

          131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCF6A1.tmp
          MD5

          d5b11598e1eddcc9e9f13443483ddb1f

          SHA1

          e25f4eb032632b97e42c54ed706e01ac45254fb4

          SHA256

          07213f9d1a68f3a1a404fcce4b4d5698461dfc5b969c8e4b429482049a66678c

          SHA512

          b4a9ee8f2e1b3400529938b81bb5cfb37a5eb5ee820ada17586996923ed3c1a677ac23db629bee6fe83f59eaea7f1517517653bd0150225c2e14d7900dbd5fc0

        • \??\c:\Users\Admin\AppData\Local\Temp\zltwkivr.0.cs
          MD5

          a0d1b6f34f315b4d81d384b8ebcdeaa5

          SHA1

          794c1ff4f2a28e0c631a783846ecfffdd4c7ae09

          SHA256

          0b3a3f8f11eb6f50fe67943f2b73c5824614f31c2e0352cc234927d7cb1a52e0

          SHA512

          0a89293d731c5bca05e73148f85a740b324fc877f2fb05cde1f68e2098329fbca552d78249a46f4a1da15a450c8e754c73be20c652f7089d5cfec445ce950a0e

        • \??\c:\Users\Admin\AppData\Local\Temp\zltwkivr.cmdline
          MD5

          8125eedd1f9dde6decb1dd8c6b3b615b

          SHA1

          19c903ef6d04463949ed14eaa2dbd6dde07fc721

          SHA256

          b79775f1f3d919a63708626ffcecad4960274d73c5fb9aec694eaea85ca03564

          SHA512

          b9de949ad691b864790facaa6dd776d1d9bda093281093d1a6d2e4d50523f1c0500dbeb8c566be48847ccf5790b353b586109a6d410c0ad16c02d616affb5393

        • memory/760-151-0x0000000000000000-mapping.dmp
        • memory/1084-167-0x0000000008350000-0x0000000008351000-memory.dmp
          Filesize

          4KB

        • memory/1084-178-0x0000000008C10000-0x0000000008C11000-memory.dmp
          Filesize

          4KB

        • memory/1084-166-0x0000000008040000-0x0000000008041000-memory.dmp
          Filesize

          4KB

        • memory/1084-165-0x00000000080B0000-0x00000000080B1000-memory.dmp
          Filesize

          4KB

        • memory/1084-164-0x00000000079E0000-0x00000000079E1000-memory.dmp
          Filesize

          4KB

        • memory/1084-157-0x0000000000000000-mapping.dmp
        • memory/1084-163-0x0000000004EF2000-0x0000000004EF3000-memory.dmp
          Filesize

          4KB

        • memory/1084-168-0x0000000008770000-0x0000000008771000-memory.dmp
          Filesize

          4KB

        • memory/1084-169-0x00000000087C0000-0x00000000087C1000-memory.dmp
          Filesize

          4KB

        • memory/1084-162-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
          Filesize

          4KB

        • memory/1084-161-0x0000000007A10000-0x0000000007A11000-memory.dmp
          Filesize

          4KB

        • memory/1084-160-0x0000000004F90000-0x0000000004F91000-memory.dmp
          Filesize

          4KB

        • memory/1084-170-0x0000000004E50000-0x0000000004E51000-memory.dmp
          Filesize

          4KB

        • memory/1084-158-0x0000000004E50000-0x0000000004E51000-memory.dmp
          Filesize

          4KB

        • memory/1084-209-0x0000000009920000-0x0000000009921000-memory.dmp
          Filesize

          4KB

        • memory/1084-159-0x0000000004E50000-0x0000000004E51000-memory.dmp
          Filesize

          4KB

        • memory/1172-121-0x0000000000000000-mapping.dmp
        • memory/1452-118-0x0000000000000000-mapping.dmp
        • memory/1564-124-0x0000000000000000-mapping.dmp
        • memory/1688-144-0x0000000002702000-0x0000000002704000-memory.dmp
          Filesize

          8KB

        • memory/1688-135-0x0000000000000000-mapping.dmp
        • memory/1688-142-0x0000000002700000-0x0000000002702000-memory.dmp
          Filesize

          8KB

        • memory/1688-143-0x00007FF9E21A0000-0x00007FF9E2CFD000-memory.dmp
          Filesize

          11.4MB

        • memory/1732-138-0x0000000000000000-mapping.dmp
        • memory/2204-134-0x0000000000490000-0x00000000005DA000-memory.dmp
          Filesize

          1.3MB

        • memory/2204-131-0x0000000000000000-mapping.dmp
        • memory/2484-141-0x0000000000000000-mapping.dmp
        • memory/3668-148-0x0000000000000000-mapping.dmp
        • memory/3668-149-0x00000000011B0000-0x00000000015EF000-memory.dmp
          Filesize

          4.2MB

        • memory/3668-150-0x0000000000380000-0x000000000038A000-memory.dmp
          Filesize

          40KB

        • memory/3692-145-0x0000000000000000-mapping.dmp
        • memory/3692-156-0x0000000000920000-0x0000000000922000-memory.dmp
          Filesize

          8KB

        • memory/4088-130-0x00000000001D0000-0x00000000001DA000-memory.dmp
          Filesize

          40KB

        • memory/4088-127-0x0000000000000000-mapping.dmp