Analysis
-
max time kernel
164s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe
Resource
win10-en-20211208
General
-
Target
f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe
-
Size
189KB
-
MD5
c1d7d3c37cb954a86b42287ca35986ec
-
SHA1
7b5ba6597b26fe3b0136e5cd0fbe8dc1060f96d0
-
SHA256
f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc
-
SHA512
b22a8e4f5b9b66660fa7fe42fcd06283c52b00384684b349959cf6580bd57895ddb57439e7527577d5635800da7e4c8ea3e84a3e2058aba6aef25f6b77e6e142
Malware Config
Extracted
smokeloader
2020
https://oakland-studio.video/search.php
https://seattle-university.video/search.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 2612 -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 948 3804 WerFault.exe DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49B95854-7F73-11EC-9231-46AC2453C65E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\SOFTWARE\Microsoft\Internet Explorer\Main Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exepid process 3376 f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe 3376 f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2612 -
Suspicious behavior: MapViewOfSection 47 IoCs
Processes:
f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 3376 f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe 2612 2612 2612 2612 2612 2612 4664 explorer.exe 4664 explorer.exe 2612 2612 2980 explorer.exe 2980 explorer.exe 2612 2612 4860 explorer.exe 4860 explorer.exe 2612 2612 3844 explorer.exe 3844 explorer.exe 2612 2612 4564 explorer.exe 4564 explorer.exe 2612 2612 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe 4264 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 4456 WMIC.exe Token: SeSecurityPrivilege 4456 WMIC.exe Token: SeTakeOwnershipPrivilege 4456 WMIC.exe Token: SeLoadDriverPrivilege 4456 WMIC.exe Token: SeSystemProfilePrivilege 4456 WMIC.exe Token: SeSystemtimePrivilege 4456 WMIC.exe Token: SeProfSingleProcessPrivilege 4456 WMIC.exe Token: SeIncBasePriorityPrivilege 4456 WMIC.exe Token: SeCreatePagefilePrivilege 4456 WMIC.exe Token: SeBackupPrivilege 4456 WMIC.exe Token: SeRestorePrivilege 4456 WMIC.exe Token: SeShutdownPrivilege 4456 WMIC.exe Token: SeDebugPrivilege 4456 WMIC.exe Token: SeSystemEnvironmentPrivilege 4456 WMIC.exe Token: SeRemoteShutdownPrivilege 4456 WMIC.exe Token: SeUndockPrivilege 4456 WMIC.exe Token: SeManageVolumePrivilege 4456 WMIC.exe Token: 33 4456 WMIC.exe Token: 34 4456 WMIC.exe Token: 35 4456 WMIC.exe Token: 36 4456 WMIC.exe Token: SeIncreaseQuotaPrivilege 4456 WMIC.exe Token: SeSecurityPrivilege 4456 WMIC.exe Token: SeTakeOwnershipPrivilege 4456 WMIC.exe Token: SeLoadDriverPrivilege 4456 WMIC.exe Token: SeSystemProfilePrivilege 4456 WMIC.exe Token: SeSystemtimePrivilege 4456 WMIC.exe Token: SeProfSingleProcessPrivilege 4456 WMIC.exe Token: SeIncBasePriorityPrivilege 4456 WMIC.exe Token: SeCreatePagefilePrivilege 4456 WMIC.exe Token: SeBackupPrivilege 4456 WMIC.exe Token: SeRestorePrivilege 4456 WMIC.exe Token: SeShutdownPrivilege 4456 WMIC.exe Token: SeDebugPrivilege 4456 WMIC.exe Token: SeSystemEnvironmentPrivilege 4456 WMIC.exe Token: SeRemoteShutdownPrivilege 4456 WMIC.exe Token: SeUndockPrivilege 4456 WMIC.exe Token: SeManageVolumePrivilege 4456 WMIC.exe Token: 33 4456 WMIC.exe Token: 34 4456 WMIC.exe Token: 35 4456 WMIC.exe Token: 36 4456 WMIC.exe Token: SeIncreaseQuotaPrivilege 4336 WMIC.exe Token: SeSecurityPrivilege 4336 WMIC.exe Token: SeTakeOwnershipPrivilege 4336 WMIC.exe Token: SeLoadDriverPrivilege 4336 WMIC.exe Token: SeSystemProfilePrivilege 4336 WMIC.exe Token: SeSystemtimePrivilege 4336 WMIC.exe Token: SeProfSingleProcessPrivilege 4336 WMIC.exe Token: SeIncBasePriorityPrivilege 4336 WMIC.exe Token: SeCreatePagefilePrivilege 4336 WMIC.exe Token: SeBackupPrivilege 4336 WMIC.exe Token: SeRestorePrivilege 4336 WMIC.exe Token: SeShutdownPrivilege 4336 WMIC.exe Token: SeDebugPrivilege 4336 WMIC.exe Token: SeSystemEnvironmentPrivilege 4336 WMIC.exe Token: SeRemoteShutdownPrivilege 4336 WMIC.exe Token: SeUndockPrivilege 4336 WMIC.exe Token: SeManageVolumePrivilege 4336 WMIC.exe Token: 33 4336 WMIC.exe Token: 34 4336 WMIC.exe Token: 35 4336 WMIC.exe Token: 36 4336 WMIC.exe Token: SeIncreaseQuotaPrivilege 4336 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2388 iexplore.exe 2388 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exeiexplore.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription pid process target process PID 2612 wrote to memory of 4388 2612 cmd.exe PID 2612 wrote to memory of 4388 2612 cmd.exe PID 4388 wrote to memory of 4456 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 4456 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 4336 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 4336 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 3232 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 3232 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 3832 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 3832 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 4508 4388 cmd.exe WMIC.exe PID 4388 wrote to memory of 4508 4388 cmd.exe WMIC.exe PID 2388 wrote to memory of 2992 2388 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 2992 2388 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 2992 2388 iexplore.exe IEXPLORE.EXE PID 2612 wrote to memory of 1232 2612 explorer.exe PID 2612 wrote to memory of 1232 2612 explorer.exe PID 2612 wrote to memory of 1232 2612 explorer.exe PID 2612 wrote to memory of 1232 2612 explorer.exe PID 2612 wrote to memory of 4888 2612 explorer.exe PID 2612 wrote to memory of 4888 2612 explorer.exe PID 2612 wrote to memory of 4888 2612 explorer.exe PID 2612 wrote to memory of 4664 2612 explorer.exe PID 2612 wrote to memory of 4664 2612 explorer.exe PID 2612 wrote to memory of 4664 2612 explorer.exe PID 2612 wrote to memory of 4664 2612 explorer.exe PID 4664 wrote to memory of 2992 4664 explorer.exe IEXPLORE.EXE PID 4664 wrote to memory of 2992 4664 explorer.exe IEXPLORE.EXE PID 2612 wrote to memory of 2980 2612 explorer.exe PID 2612 wrote to memory of 2980 2612 explorer.exe PID 2612 wrote to memory of 2980 2612 explorer.exe PID 2980 wrote to memory of 2388 2980 explorer.exe iexplore.exe PID 2980 wrote to memory of 2388 2980 explorer.exe iexplore.exe PID 2612 wrote to memory of 4860 2612 explorer.exe PID 2612 wrote to memory of 4860 2612 explorer.exe PID 2612 wrote to memory of 4860 2612 explorer.exe PID 2612 wrote to memory of 4860 2612 explorer.exe PID 4860 wrote to memory of 2992 4860 explorer.exe IEXPLORE.EXE PID 4860 wrote to memory of 2992 4860 explorer.exe IEXPLORE.EXE PID 2612 wrote to memory of 3844 2612 explorer.exe PID 2612 wrote to memory of 3844 2612 explorer.exe PID 2612 wrote to memory of 3844 2612 explorer.exe PID 3844 wrote to memory of 2388 3844 explorer.exe iexplore.exe PID 3844 wrote to memory of 2388 3844 explorer.exe iexplore.exe PID 2612 wrote to memory of 4564 2612 explorer.exe PID 2612 wrote to memory of 4564 2612 explorer.exe PID 2612 wrote to memory of 4564 2612 explorer.exe PID 2612 wrote to memory of 4564 2612 explorer.exe PID 4564 wrote to memory of 2992 4564 explorer.exe IEXPLORE.EXE PID 4564 wrote to memory of 2992 4564 explorer.exe IEXPLORE.EXE PID 2612 wrote to memory of 4264 2612 explorer.exe PID 2612 wrote to memory of 4264 2612 explorer.exe PID 2612 wrote to memory of 4264 2612 explorer.exe PID 4264 wrote to memory of 2920 4264 explorer.exe sihost.exe PID 4264 wrote to memory of 2920 4264 explorer.exe sihost.exe PID 4264 wrote to memory of 2940 4264 explorer.exe svchost.exe PID 4264 wrote to memory of 2940 4264 explorer.exe svchost.exe PID 4264 wrote to memory of 3000 4264 explorer.exe taskhostw.exe PID 4264 wrote to memory of 3000 4264 explorer.exe taskhostw.exe PID 4264 wrote to memory of 3312 4264 explorer.exe ShellExperienceHost.exe PID 4264 wrote to memory of 3312 4264 explorer.exe ShellExperienceHost.exe PID 4264 wrote to memory of 3332 4264 explorer.exe SearchUI.exe PID 4264 wrote to memory of 3332 4264 explorer.exe SearchUI.exe PID 4264 wrote to memory of 3516 4264 explorer.exe RuntimeBroker.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3000
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3312
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2940
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3804
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3804 -s 9122⤵
- Program crash
PID:948
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3516
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe"C:\Users\Admin\AppData\Local\Temp\f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3376
-
C:\Windows\system32\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵PID:3232
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵PID:3832
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵PID:4508
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:3320
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1232
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4888
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4664
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2980
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4860
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3844
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4564
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4264