Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
04-12-2021 00:20
Static task
static1
Behavioral task
behavioral1
Sample
3987760559955d73718fc2b9637f02eb.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
3987760559955d73718fc2b9637f02eb.exe
Resource
win10-en-20211014
General
-
Target
3987760559955d73718fc2b9637f02eb.exe
-
Size
247KB
-
MD5
3987760559955d73718fc2b9637f02eb
-
SHA1
a8eccbffb25f81c40623215e5c356d133c64032e
-
SHA256
c2cb62e9291d6dc8dc9fdf0064de10045eb7995c2e8b197ac9cddf7932a662b8
-
SHA512
46c51f190f73f091e0638afb04dd4d7818d8ab6675c42786ec52aefa314450296857cee4462d468d2cdebfd4d88ecc15d8dbe8828f300133d20008f3e43a2b9d
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
C255.exeSmartClock.exeEFEF.exepid process 1928 C255.exe 956 SmartClock.exe 1416 EFEF.exe -
Deletes itself 1 IoCs
Processes:
pid process 1300 -
Drops startup file 1 IoCs
Processes:
C255.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk C255.exe -
Loads dropped DLL 3 IoCs
Processes:
C255.exepid process 1928 C255.exe 1928 C255.exe 1928 C255.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3987760559955d73718fc2b9637f02eb.exeEFEF.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3987760559955d73718fc2b9637f02eb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3987760559955d73718fc2b9637f02eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EFEF.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EFEF.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EFEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3987760559955d73718fc2b9637f02eb.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 956 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3987760559955d73718fc2b9637f02eb.exepid process 1592 3987760559955d73718fc2b9637f02eb.exe 1592 3987760559955d73718fc2b9637f02eb.exe 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 1300 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1300 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
3987760559955d73718fc2b9637f02eb.exepid process 1592 3987760559955d73718fc2b9637f02eb.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1300 1300 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1300 1300 1300 1300 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
C255.exedescription pid process target process PID 1300 wrote to memory of 1928 1300 C255.exe PID 1300 wrote to memory of 1928 1300 C255.exe PID 1300 wrote to memory of 1928 1300 C255.exe PID 1300 wrote to memory of 1928 1300 C255.exe PID 1928 wrote to memory of 956 1928 C255.exe SmartClock.exe PID 1928 wrote to memory of 956 1928 C255.exe SmartClock.exe PID 1928 wrote to memory of 956 1928 C255.exe SmartClock.exe PID 1928 wrote to memory of 956 1928 C255.exe SmartClock.exe PID 1300 wrote to memory of 1416 1300 EFEF.exe PID 1300 wrote to memory of 1416 1300 EFEF.exe PID 1300 wrote to memory of 1416 1300 EFEF.exe PID 1300 wrote to memory of 1416 1300 EFEF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3987760559955d73718fc2b9637f02eb.exe"C:\Users\Admin\AppData\Local\Temp\3987760559955d73718fc2b9637f02eb.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1592
-
C:\Users\Admin\AppData\Local\Temp\C255.exeC:\Users\Admin\AppData\Local\Temp\C255.exe1⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:956
-
C:\Users\Admin\AppData\Local\Temp\EFEF.exeC:\Users\Admin\AppData\Local\Temp\EFEF.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
86c76df3f0feed13d6ad6f9155156369
SHA1330e82600381f68d6f6914b50b451b6c59901b26
SHA2564dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf
SHA512078e22f7c6109abf532591dc429d6a58255a192c3a70324b769e5f2b79549d0814fa2330693484dccdc27427ef25526b5db4f3b574c521bed0ae27eadada789c
-
MD5
0f2ad680804d76fcdcf2f7b1da480105
SHA19ba9798f3396c294fde4ca5d832f078bcdc357b7
SHA2564b9ad6f585f391d83637c00cd0421391aa1b1f5d786b99bb5100ff1115a12b59
SHA512e866ea64c9244f3c0cf0a89c0c13961688dccb1163a8d18307c89b9d070ed575903a463ca2fa82ad6973a70b4882959ae5869cfb6426ec1ee3860e77ca14da04
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5