Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    22-12-2021 13:40

General

  • Target

    f29b9318b3be3c7017d20e72e0e7f060d77d8de05de7982203a9ef7275de8d89.exe

  • Size

    326KB

  • MD5

    98f68f3fd92f13094b4341600a31d136

  • SHA1

    85d39680e430390ceae1e1da3b9134df669c5d2d

  • SHA256

    f29b9318b3be3c7017d20e72e0e7f060d77d8de05de7982203a9ef7275de8d89

  • SHA512

    68da4b80456c40dc307b5a69140716a22ee770f24dcbbbcc9dec6b5e1447cb1fe50a79e9d3974a98e8c7fc578dafeb51df46ac4e9d43be001268180d5c74f227

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://rcacademy.at/upload/

http://e-lanpengeonline.com/upload/

http://vjcmvz.cn/upload/

http://galala.ru/upload/

http://witra.ru/upload/

rc4.i32
rc4.i32

Extracted

Family

systembc

C2

185.70.184.41:4001

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29b9318b3be3c7017d20e72e0e7f060d77d8de05de7982203a9ef7275de8d89.exe
    "C:\Users\Admin\AppData\Local\Temp\f29b9318b3be3c7017d20e72e0e7f060d77d8de05de7982203a9ef7275de8d89.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2728
  • C:\Users\Admin\AppData\Local\Temp\7DA3.exe
    C:\Users\Admin\AppData\Local\Temp\7DA3.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1600
  • C:\Users\Admin\AppData\Local\Temp\7DA3.exe
    C:\Users\Admin\AppData\Local\Temp\7DA3.exe start
    1⤵
    • Executes dropped EXE
    PID:3028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7DA3.exe

    MD5

    8d91326c99f8cb867f886e065f88509f

    SHA1

    a6d0b07a91cc81c6729cc0b01fba0a5ac743e606

    SHA256

    086e9bc0fa2ae515cced5d746de30c0b8389e29ef756af95da84ec8e7c7359ec

    SHA512

    8a3ea897ae19a957ed27157b460f05eb459b6397dbd1016bb1e9dbdbd25424bfcdcd7342cc4e64a51b002fbefc6d2746b4754b2dfde48e6d20c1d2065664b103

  • C:\Users\Admin\AppData\Local\Temp\7DA3.exe

    MD5

    8d91326c99f8cb867f886e065f88509f

    SHA1

    a6d0b07a91cc81c6729cc0b01fba0a5ac743e606

    SHA256

    086e9bc0fa2ae515cced5d746de30c0b8389e29ef756af95da84ec8e7c7359ec

    SHA512

    8a3ea897ae19a957ed27157b460f05eb459b6397dbd1016bb1e9dbdbd25424bfcdcd7342cc4e64a51b002fbefc6d2746b4754b2dfde48e6d20c1d2065664b103

  • C:\Users\Admin\AppData\Local\Temp\7DA3.exe

    MD5

    8d91326c99f8cb867f886e065f88509f

    SHA1

    a6d0b07a91cc81c6729cc0b01fba0a5ac743e606

    SHA256

    086e9bc0fa2ae515cced5d746de30c0b8389e29ef756af95da84ec8e7c7359ec

    SHA512

    8a3ea897ae19a957ed27157b460f05eb459b6397dbd1016bb1e9dbdbd25424bfcdcd7342cc4e64a51b002fbefc6d2746b4754b2dfde48e6d20c1d2065664b103

  • memory/1600-119-0x0000000000000000-mapping.dmp

  • memory/1600-124-0x00000000001E0000-0x00000000001E5000-memory.dmp

    Filesize

    20KB

  • memory/1600-125-0x0000000000400000-0x00000000004D2000-memory.dmp

    Filesize

    840KB

  • memory/2728-115-0x00000000006A6000-0x00000000006B6000-memory.dmp

    Filesize

    64KB

  • memory/2728-117-0x0000000000400000-0x00000000004D2000-memory.dmp

    Filesize

    840KB

  • memory/2728-116-0x0000000000530000-0x000000000067A000-memory.dmp

    Filesize

    1.3MB

  • memory/3028-126-0x00000000006DB000-0x00000000006EC000-memory.dmp

    Filesize

    68KB

  • memory/3028-127-0x0000000000400000-0x00000000004D2000-memory.dmp

    Filesize

    840KB

  • memory/3044-118-0x0000000001120000-0x0000000001136000-memory.dmp

    Filesize

    88KB