Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    25-01-2022 19:47

General

  • Target

    2b0dea2ff2d83c8a0f9a2c72ccca46769955ea60dede40dc96e8e99e7f824de3.exe

  • Size

    316KB

  • MD5

    afc1267985c0d23f4b7fb22a4cc98cca

  • SHA1

    fa0bb2db621e58372afe3a53af58b059c35f606e

  • SHA256

    2b0dea2ff2d83c8a0f9a2c72ccca46769955ea60dede40dc96e8e99e7f824de3

  • SHA512

    07a98098a729be1b2640c7a660f8a67481be198eb8106ae051729d4136d304117813ab9070f7140161fe7cb463f3c3b2fdafac908f919e80e5812c04d19bd6ae

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
    "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
    1⤵
      PID:3256
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:3768
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3768 -s 908
          2⤵
          • Program crash
          PID:2000
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3512
        • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
          1⤵
            PID:3268
          • c:\windows\system32\taskhostw.exe
            taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
            1⤵
              PID:2760
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
              1⤵
                PID:2456
              • c:\windows\system32\sihost.exe
                sihost.exe
                1⤵
                  PID:2448
                • C:\Users\Admin\AppData\Local\Temp\2b0dea2ff2d83c8a0f9a2c72ccca46769955ea60dede40dc96e8e99e7f824de3.exe
                  "C:\Users\Admin\AppData\Local\Temp\2b0dea2ff2d83c8a0f9a2c72ccca46769955ea60dede40dc96e8e99e7f824de3.exe"
                  1⤵
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:2384
                • C:\Windows\system32\cmd.exe
                  cmd
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3968
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1032
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1384
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                    2⤵
                      PID:2324
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                      2⤵
                        PID:4060
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                      1⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2384
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:82945 /prefetch:2
                        2⤵
                        • Modifies Internet Explorer settings
                        • Suspicious use of SetWindowsHookEx
                        PID:2972
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                      • Accesses Microsoft Outlook profiles
                      • outlook_office_path
                      • outlook_win_path
                      PID:1428
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:3372
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:1472
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:1268
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:596
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:944
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:2064
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:992

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Defense Evasion

                      Modify Registry

                      1
                      T1112

                      Discovery

                      Query Registry

                      1
                      T1012

                      Peripheral Device Discovery

                      1
                      T1120

                      System Information Discovery

                      1
                      T1082

                      Collection

                      Email Collection

                      1
                      T1114

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/596-321-0x00000000004F0000-0x00000000004F5000-memory.dmp
                        Filesize

                        20KB

                      • memory/596-322-0x00000000004E0000-0x00000000004E9000-memory.dmp
                        Filesize

                        36KB

                      • memory/944-324-0x0000000000C30000-0x0000000000C3C000-memory.dmp
                        Filesize

                        48KB

                      • memory/944-323-0x0000000000C40000-0x0000000000C46000-memory.dmp
                        Filesize

                        24KB

                      • memory/992-328-0x00000000008A0000-0x00000000008AD000-memory.dmp
                        Filesize

                        52KB

                      • memory/992-327-0x00000000008B0000-0x00000000008B7000-memory.dmp
                        Filesize

                        28KB

                      • memory/1268-319-0x0000000000BB0000-0x0000000000BB9000-memory.dmp
                        Filesize

                        36KB

                      • memory/1268-320-0x0000000000BA0000-0x0000000000BAE000-memory.dmp
                        Filesize

                        56KB

                      • memory/1428-315-0x0000000003200000-0x000000000326B000-memory.dmp
                        Filesize

                        428KB

                      • memory/1428-314-0x0000000003270000-0x00000000032E5000-memory.dmp
                        Filesize

                        468KB

                      • memory/1472-317-0x0000000002EF0000-0x0000000002EF7000-memory.dmp
                        Filesize

                        28KB

                      • memory/1472-318-0x0000000000AA0000-0x0000000000AAB000-memory.dmp
                        Filesize

                        44KB

                      • memory/1880-120-0x0000000000650000-0x0000000000666000-memory.dmp
                        Filesize

                        88KB

                      • memory/2000-334-0x0000027CF2A30000-0x0000027CF2A31000-memory.dmp
                        Filesize

                        4KB

                      • memory/2064-325-0x0000000000A20000-0x0000000000A26000-memory.dmp
                        Filesize

                        24KB

                      • memory/2064-326-0x0000000000A10000-0x0000000000A1B000-memory.dmp
                        Filesize

                        44KB

                      • memory/2384-118-0x0000000000460000-0x00000000005AA000-memory.dmp
                        Filesize

                        1.3MB

                      • memory/2384-119-0x0000000000400000-0x0000000000456000-memory.dmp
                        Filesize

                        344KB

                      • memory/2384-117-0x0000000000030000-0x0000000000038000-memory.dmp
                        Filesize

                        32KB

                      • memory/2448-329-0x0000020E446A0000-0x0000020E446A1000-memory.dmp
                        Filesize

                        4KB

                      • memory/2456-330-0x000002784E580000-0x000002784E581000-memory.dmp
                        Filesize

                        4KB

                      • memory/2760-331-0x0000024B3EFE0000-0x0000024B3EFE1000-memory.dmp
                        Filesize

                        4KB

                      • memory/2760-333-0x0000024B3F320000-0x0000024B3F321000-memory.dmp
                        Filesize

                        4KB

                      • memory/3372-316-0x0000000000A00000-0x0000000000A0C000-memory.dmp
                        Filesize

                        48KB

                      • memory/3512-332-0x0000027712630000-0x0000027712631000-memory.dmp
                        Filesize

                        4KB