Analysis

  • max time kernel
    164s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    27-01-2022 13:14

General

  • Target

    f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe

  • Size

    189KB

  • MD5

    c1d7d3c37cb954a86b42287ca35986ec

  • SHA1

    7b5ba6597b26fe3b0136e5cd0fbe8dc1060f96d0

  • SHA256

    f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc

  • SHA512

    b22a8e4f5b9b66660fa7fe42fcd06283c52b00384684b349959cf6580bd57895ddb57439e7527577d5635800da7e4c8ea3e84a3e2058aba6aef25f6b77e6e142

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • c:\windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:3000
    • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
      "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
      1⤵
        PID:3312
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
        1⤵
          PID:2940
        • c:\windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2920
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:3804
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 3804 -s 912
                2⤵
                • Program crash
                PID:948
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:3516
              • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
                1⤵
                  PID:3332
                • C:\Users\Admin\AppData\Local\Temp\f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe
                  "C:\Users\Admin\AppData\Local\Temp\f7c09d9f4183a4e024b1a943b13d599540df81bffa5175223d10f5f344f5f6bc.exe"
                  1⤵
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:3376
                • C:\Windows\system32\cmd.exe
                  cmd
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4388
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4456
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4336
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                    2⤵
                      PID:3232
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                      2⤵
                        PID:3832
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                        2⤵
                          PID:4508
                      • C:\Windows\system32\msiexec.exe
                        C:\Windows\system32\msiexec.exe /V
                        1⤵
                          PID:3320
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                          1⤵
                          • Modifies Internet Explorer settings
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2388
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:82945 /prefetch:2
                            2⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of SetWindowsHookEx
                            PID:2992
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                          • Accesses Microsoft Outlook profiles
                          • outlook_office_path
                          • outlook_win_path
                          PID:1232
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          1⤵
                            PID:4888
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:4664
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe
                            1⤵
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:2980
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:4860
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe
                            1⤵
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:3844
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:4564
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe
                            1⤵
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:4264

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • memory/948-152-0x00000281CE680000-0x00000281CE979000-memory.dmp
                            Filesize

                            3.0MB

                          • memory/948-151-0x00000281CE680000-0x00000281CE979000-memory.dmp
                            Filesize

                            3.0MB

                          • memory/948-154-0x00000281CE680000-0x00000281CE979000-memory.dmp
                            Filesize

                            3.0MB

                          • memory/1232-132-0x0000000000A70000-0x0000000000AE5000-memory.dmp
                            Filesize

                            468KB

                          • memory/1232-133-0x0000000000A00000-0x0000000000A6B000-memory.dmp
                            Filesize

                            428KB

                          • memory/2612-121-0x0000000000D20000-0x0000000000D36000-memory.dmp
                            Filesize

                            88KB

                          • memory/2612-124-0x0000000000F50000-0x0000000002D00000-memory.dmp
                            Filesize

                            29.7MB

                          • memory/2920-146-0x0000029E0EB00000-0x0000029E0EB01000-memory.dmp
                            Filesize

                            4KB

                          • memory/2940-147-0x000001EAC8240000-0x000001EAC8241000-memory.dmp
                            Filesize

                            4KB

                          • memory/2980-137-0x0000000000510000-0x000000000051E000-memory.dmp
                            Filesize

                            56KB

                          • memory/2980-136-0x0000000000520000-0x0000000000529000-memory.dmp
                            Filesize

                            36KB

                          • memory/3000-153-0x000001ED1D070000-0x000001ED1D071000-memory.dmp
                            Filesize

                            4KB

                          • memory/3000-148-0x000001ED1CD30000-0x000001ED1CD31000-memory.dmp
                            Filesize

                            4KB

                          • memory/3376-120-0x0000000000400000-0x0000000000436000-memory.dmp
                            Filesize

                            216KB

                          • memory/3376-119-0x0000000000520000-0x0000000000529000-memory.dmp
                            Filesize

                            36KB

                          • memory/3516-149-0x000001B5B9860000-0x000001B5B9861000-memory.dmp
                            Filesize

                            4KB

                          • memory/3844-140-0x00000000001D0000-0x00000000001D6000-memory.dmp
                            Filesize

                            24KB

                          • memory/3844-141-0x00000000001C0000-0x00000000001CC000-memory.dmp
                            Filesize

                            48KB

                          • memory/4264-145-0x0000000000680000-0x000000000068D000-memory.dmp
                            Filesize

                            52KB

                          • memory/4264-144-0x0000000000690000-0x0000000000697000-memory.dmp
                            Filesize

                            28KB

                          • memory/4564-143-0x0000000001000000-0x000000000100B000-memory.dmp
                            Filesize

                            44KB

                          • memory/4564-142-0x0000000001010000-0x0000000001016000-memory.dmp
                            Filesize

                            24KB

                          • memory/4664-135-0x0000000000B60000-0x0000000000B6B000-memory.dmp
                            Filesize

                            44KB

                          • memory/4664-134-0x0000000000B70000-0x0000000000B77000-memory.dmp
                            Filesize

                            28KB

                          • memory/4860-139-0x00000000010D0000-0x00000000010D9000-memory.dmp
                            Filesize

                            36KB

                          • memory/4860-138-0x00000000010E0000-0x00000000010E5000-memory.dmp
                            Filesize

                            20KB

                          • memory/4888-131-0x0000000000170000-0x000000000017C000-memory.dmp
                            Filesize

                            48KB