Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    08-01-2022 15:51

General

  • Target

    42c9365b1284d5e5e95be8c82e3eb480.exe

  • Size

    271KB

  • MD5

    42c9365b1284d5e5e95be8c82e3eb480

  • SHA1

    af966c6db72acf8ccdab4d39f7f328043c3ad592

  • SHA256

    47c2ec67d40d8e342db29823981ab4539c758486d30d00bd15106acdb39a96cc

  • SHA512

    b5fd84c5fc5b2fa94227f9732af2b5ced856349f37a1a1175a3bcd4065a016bc5c129b8e52ade6ec8bfe2c7a11f5bd2a0af527cb6901320f7e2136b81022a660

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nahbleiben.at/upload/

http://noblecreativeaz.com/upload/

http://tvqaq.cn/upload/

http://recmaster.ru/upload/

http://sovels.ru/upload/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42c9365b1284d5e5e95be8c82e3eb480.exe
    "C:\Users\Admin\AppData\Local\Temp\42c9365b1284d5e5e95be8c82e3eb480.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:944
  • C:\Users\Admin\AppData\Local\Temp\FA27.exe
    C:\Users\Admin\AppData\Local\Temp\FA27.exe
    1⤵
    • Executes dropped EXE
    PID:1816
  • C:\Users\Admin\AppData\Local\Temp\18FE.exe
    C:\Users\Admin\AppData\Local\Temp\18FE.exe
    1⤵
    • Executes dropped EXE
    PID:1676

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\18FE.exe
    MD5

    f8151b5d4c4e62166a8c2e914f54cbb7

    SHA1

    ee9da83f51b904db29d14847a013c4cff7ea6711

    SHA256

    7d3b2e91c3cfb16df02f63b973c69a2047b8031295a49e4fffa0fad3dba975f0

    SHA512

    0e141cee03549a768d284381bd8751b3b3b18805bffa1ada7e4a7c44c3d50fae190d6a4d82ddaee76c82f2a853190549a2d6d1f3a3fdfef425cff3499933b084

  • C:\Users\Admin\AppData\Local\Temp\FA27.exe
    MD5

    f8151b5d4c4e62166a8c2e914f54cbb7

    SHA1

    ee9da83f51b904db29d14847a013c4cff7ea6711

    SHA256

    7d3b2e91c3cfb16df02f63b973c69a2047b8031295a49e4fffa0fad3dba975f0

    SHA512

    0e141cee03549a768d284381bd8751b3b3b18805bffa1ada7e4a7c44c3d50fae190d6a4d82ddaee76c82f2a853190549a2d6d1f3a3fdfef425cff3499933b084

  • memory/944-55-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/944-58-0x0000000000230000-0x0000000000239000-memory.dmp
    Filesize

    36KB

  • memory/944-56-0x0000000075F91000-0x0000000075F93000-memory.dmp
    Filesize

    8KB

  • memory/944-57-0x0000000000400000-0x0000000002B79000-memory.dmp
    Filesize

    39.5MB

  • memory/1224-59-0x0000000002A30000-0x0000000002A46000-memory.dmp
    Filesize

    88KB

  • memory/1676-62-0x0000000000000000-mapping.dmp
  • memory/1676-69-0x0000000000400000-0x0000000002C53000-memory.dmp
    Filesize

    40.3MB

  • memory/1816-60-0x0000000000000000-mapping.dmp
  • memory/1816-66-0x0000000000400000-0x0000000002C53000-memory.dmp
    Filesize

    40.3MB

  • memory/1816-65-0x00000000046C0000-0x00000000047BA000-memory.dmp
    Filesize

    1000KB

  • memory/1816-64-0x00000000044D0000-0x00000000045B2000-memory.dmp
    Filesize

    904KB