Resubmissions

09-01-2022 14:33

220109-rwxq5sdhcr 10

09-01-2022 14:06

220109-rejg7aded7 10

09-01-2022 08:20

220109-j8fz6addd9 10

Analysis

  • max time kernel
    1801s
  • max time network
    1564s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    09-01-2022 14:33

General

  • Target

    59ddabdcb5b43bbc66bbec89123d2627.exe

  • Size

    265KB

  • MD5

    59ddabdcb5b43bbc66bbec89123d2627

  • SHA1

    6c33dde51d6b45319ad99408c10f6ad8b1340e2f

  • SHA256

    2d0bd38ea59864cdcd710759abea3f670449eb4505b54c8a8d22128691deefc1

  • SHA512

    56463528dc37c141519535140a24d0ce02ca2227ef8c302494e422109e5d6b83a5d6ac5f2b698838e29661cd9dd986d9a2dc0f7c3c4f025f5283cebca052b8b3

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nahbleiben.at/upload/

http://noblecreativeaz.com/upload/

http://tvqaq.cn/upload/

http://recmaster.ru/upload/

http://sovels.ru/upload/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59ddabdcb5b43bbc66bbec89123d2627.exe
    "C:\Users\Admin\AppData\Local\Temp\59ddabdcb5b43bbc66bbec89123d2627.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2712
  • C:\Users\Admin\AppData\Roaming\hwahtwf
    C:\Users\Admin\AppData\Roaming\hwahtwf
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1496
  • C:\Users\Admin\AppData\Roaming\hwahtwf
    C:\Users\Admin\AppData\Roaming\hwahtwf
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:696
  • C:\Users\Admin\AppData\Roaming\hwahtwf
    C:\Users\Admin\AppData\Roaming\hwahtwf
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2248

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\hwahtwf
    MD5

    59ddabdcb5b43bbc66bbec89123d2627

    SHA1

    6c33dde51d6b45319ad99408c10f6ad8b1340e2f

    SHA256

    2d0bd38ea59864cdcd710759abea3f670449eb4505b54c8a8d22128691deefc1

    SHA512

    56463528dc37c141519535140a24d0ce02ca2227ef8c302494e422109e5d6b83a5d6ac5f2b698838e29661cd9dd986d9a2dc0f7c3c4f025f5283cebca052b8b3

  • C:\Users\Admin\AppData\Roaming\hwahtwf
    MD5

    59ddabdcb5b43bbc66bbec89123d2627

    SHA1

    6c33dde51d6b45319ad99408c10f6ad8b1340e2f

    SHA256

    2d0bd38ea59864cdcd710759abea3f670449eb4505b54c8a8d22128691deefc1

    SHA512

    56463528dc37c141519535140a24d0ce02ca2227ef8c302494e422109e5d6b83a5d6ac5f2b698838e29661cd9dd986d9a2dc0f7c3c4f025f5283cebca052b8b3

  • C:\Users\Admin\AppData\Roaming\hwahtwf
    MD5

    59ddabdcb5b43bbc66bbec89123d2627

    SHA1

    6c33dde51d6b45319ad99408c10f6ad8b1340e2f

    SHA256

    2d0bd38ea59864cdcd710759abea3f670449eb4505b54c8a8d22128691deefc1

    SHA512

    56463528dc37c141519535140a24d0ce02ca2227ef8c302494e422109e5d6b83a5d6ac5f2b698838e29661cd9dd986d9a2dc0f7c3c4f025f5283cebca052b8b3

  • C:\Users\Admin\AppData\Roaming\hwahtwf
    MD5

    59ddabdcb5b43bbc66bbec89123d2627

    SHA1

    6c33dde51d6b45319ad99408c10f6ad8b1340e2f

    SHA256

    2d0bd38ea59864cdcd710759abea3f670449eb4505b54c8a8d22128691deefc1

    SHA512

    56463528dc37c141519535140a24d0ce02ca2227ef8c302494e422109e5d6b83a5d6ac5f2b698838e29661cd9dd986d9a2dc0f7c3c4f025f5283cebca052b8b3

  • memory/696-124-0x0000000000400000-0x0000000002B79000-memory.dmp
    Filesize

    39.5MB

  • memory/1496-121-0x0000000000400000-0x0000000002B79000-memory.dmp
    Filesize

    39.5MB

  • memory/2248-127-0x0000000000400000-0x0000000002B79000-memory.dmp
    Filesize

    39.5MB

  • memory/2712-115-0x0000000002CF0000-0x0000000002CF8000-memory.dmp
    Filesize

    32KB

  • memory/2712-117-0x0000000000400000-0x0000000002B79000-memory.dmp
    Filesize

    39.5MB

  • memory/2712-116-0x0000000002D00000-0x0000000002D09000-memory.dmp
    Filesize

    36KB

  • memory/3004-122-0x00000000028C0000-0x00000000028D6000-memory.dmp
    Filesize

    88KB

  • memory/3004-118-0x0000000000DC0000-0x0000000000DD6000-memory.dmp
    Filesize

    88KB

  • memory/3004-125-0x00000000028F0000-0x0000000002906000-memory.dmp
    Filesize

    88KB

  • memory/3004-128-0x0000000002950000-0x0000000002966000-memory.dmp
    Filesize

    88KB