Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 14:47
Static task
static1
Behavioral task
behavioral1
Sample
5cc21139c643e1d2299cf569e4d0ff98.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5cc21139c643e1d2299cf569e4d0ff98.exe
Resource
win10v2004-20220414-en
General
-
Target
5cc21139c643e1d2299cf569e4d0ff98.exe
-
Size
263KB
-
MD5
5cc21139c643e1d2299cf569e4d0ff98
-
SHA1
9254593f03a506444c3d3e29a74c4cf028ca625c
-
SHA256
cc0f6fa48f1bc9ffae208185fd4e568385a67c40a92a12c4a1bd00ad7adbb4b4
-
SHA512
cb6ce4976ffd5d19734ce941875817adcd603347cd09d1d5bf1e4413ce122b0e100afbb98a541f22465748f5ec7ecd4ca13d6c2bb8aeff3cc655a9152de84799
Malware Config
Extracted
smokeloader
2020
http://motionberry999xerz.ru/
http://happyday9risce.com/
http://kokihap7siexz3.com/
https://motionberry999xerz.ru/
https://happyday9risce.com/
https://kokihap7siexz3.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
D650.exepid process 3204 D650.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
D650.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation D650.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
D650.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lrjaaawiu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Cdyynpvt\\Lrjaaawiu.exe\"" D650.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{823AA7DF-8F5D-4F0C-B37A-95F2EDFFD8E6}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{4F38B0FA-47A5-4808-BFEC-09BFE2E4E6F8}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
D650.exedescription pid process target process PID 3204 set thread context of 1536 3204 D650.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4268 4180 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5cc21139c643e1d2299cf569e4d0ff98.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5cc21139c643e1d2299cf569e4d0ff98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5cc21139c643e1d2299cf569e4d0ff98.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5cc21139c643e1d2299cf569e4d0ff98.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 800 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5cc21139c643e1d2299cf569e4d0ff98.exepid process 3840 5cc21139c643e1d2299cf569e4d0ff98.exe 3840 5cc21139c643e1d2299cf569e4d0ff98.exe 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3052 -
Suspicious behavior: MapViewOfSection 17 IoCs
Processes:
5cc21139c643e1d2299cf569e4d0ff98.exepid process 3840 5cc21139c643e1d2299cf569e4d0ff98.exe 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 3052 -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
D650.exeInstallUtil.exedescription pid process Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeDebugPrivilege 3204 D650.exe Token: SeDebugPrivilege 1536 InstallUtil.exe Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 Token: SeShutdownPrivilege 3052 Token: SeCreatePagefilePrivilege 3052 -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
pid process 3052 3052 3052 3052 3052 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 3052 3052 3052 -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
D650.execmd.exedescription pid process target process PID 3052 wrote to memory of 3204 3052 D650.exe PID 3052 wrote to memory of 3204 3052 D650.exe PID 3052 wrote to memory of 3204 3052 D650.exe PID 3052 wrote to memory of 4180 3052 explorer.exe PID 3052 wrote to memory of 4180 3052 explorer.exe PID 3052 wrote to memory of 4180 3052 explorer.exe PID 3052 wrote to memory of 4180 3052 explorer.exe PID 3052 wrote to memory of 1676 3052 explorer.exe PID 3052 wrote to memory of 1676 3052 explorer.exe PID 3052 wrote to memory of 1676 3052 explorer.exe PID 3052 wrote to memory of 2212 3052 explorer.exe PID 3052 wrote to memory of 2212 3052 explorer.exe PID 3052 wrote to memory of 2212 3052 explorer.exe PID 3052 wrote to memory of 2212 3052 explorer.exe PID 3052 wrote to memory of 4848 3052 explorer.exe PID 3052 wrote to memory of 4848 3052 explorer.exe PID 3052 wrote to memory of 4848 3052 explorer.exe PID 3052 wrote to memory of 1988 3052 explorer.exe PID 3052 wrote to memory of 1988 3052 explorer.exe PID 3052 wrote to memory of 1988 3052 explorer.exe PID 3052 wrote to memory of 1988 3052 explorer.exe PID 3052 wrote to memory of 5052 3052 explorer.exe PID 3052 wrote to memory of 5052 3052 explorer.exe PID 3052 wrote to memory of 5052 3052 explorer.exe PID 3052 wrote to memory of 5052 3052 explorer.exe PID 3052 wrote to memory of 1944 3052 explorer.exe PID 3052 wrote to memory of 1944 3052 explorer.exe PID 3052 wrote to memory of 1944 3052 explorer.exe PID 3052 wrote to memory of 5096 3052 explorer.exe PID 3052 wrote to memory of 5096 3052 explorer.exe PID 3052 wrote to memory of 5096 3052 explorer.exe PID 3052 wrote to memory of 5096 3052 explorer.exe PID 3204 wrote to memory of 4728 3204 D650.exe cmd.exe PID 3204 wrote to memory of 4728 3204 D650.exe cmd.exe PID 3204 wrote to memory of 4728 3204 D650.exe cmd.exe PID 4728 wrote to memory of 800 4728 cmd.exe timeout.exe PID 4728 wrote to memory of 800 4728 cmd.exe timeout.exe PID 4728 wrote to memory of 800 4728 cmd.exe timeout.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe PID 3204 wrote to memory of 1536 3204 D650.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cc21139c643e1d2299cf569e4d0ff98.exe"C:\Users\Admin\AppData\Local\Temp\5cc21139c643e1d2299cf569e4d0ff98.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\D650.exeC:\Users\Admin\AppData\Local\Temp\D650.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 202⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 203⤵
- Delays execution with timeout.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 8762⤵
- Program crash
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4180 -ip 41801⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\D650.exeFilesize
1.2MB
MD5c52e23f559f027c6af598ff0a4c3497d
SHA10e6de0682ae5d89a6530a6c6e03054f5aaeb0662
SHA256409a345a063f2fc853b7b45c060970231d9fdc6b453444ae855b7fda4be50021
SHA512802159c0fa6034dfc4278ee470aef46a52947006b007ae6a90391377d6c9b3774c999c30ab8d62a10869bf4d459736da4b70ce97d7771bf849effff7714e6428
-
C:\Users\Admin\AppData\Local\Temp\D650.exeFilesize
1.2MB
MD5c52e23f559f027c6af598ff0a4c3497d
SHA10e6de0682ae5d89a6530a6c6e03054f5aaeb0662
SHA256409a345a063f2fc853b7b45c060970231d9fdc6b453444ae855b7fda4be50021
SHA512802159c0fa6034dfc4278ee470aef46a52947006b007ae6a90391377d6c9b3774c999c30ab8d62a10869bf4d459736da4b70ce97d7771bf849effff7714e6428
-
memory/800-147-0x0000000000000000-mapping.dmp
-
memory/1536-156-0x0000000008640000-0x00000000086D2000-memory.dmpFilesize
584KB
-
memory/1536-154-0x0000000007750000-0x00000000077B6000-memory.dmpFilesize
408KB
-
memory/1536-159-0x0000000009A60000-0x0000000009AB0000-memory.dmpFilesize
320KB
-
memory/1536-160-0x0000000009C80000-0x0000000009E42000-memory.dmpFilesize
1.8MB
-
memory/1536-157-0x0000000008C90000-0x0000000009234000-memory.dmpFilesize
5.6MB
-
memory/1536-161-0x000000000A380000-0x000000000A8AC000-memory.dmpFilesize
5.2MB
-
memory/1536-155-0x0000000008520000-0x0000000008596000-memory.dmpFilesize
472KB
-
memory/1536-158-0x0000000008800000-0x000000000881E000-memory.dmpFilesize
120KB
-
memory/1536-153-0x0000000007420000-0x000000000745C000-memory.dmpFilesize
240KB
-
memory/1536-152-0x00000000074F0000-0x00000000075FA000-memory.dmpFilesize
1.0MB
-
memory/1536-151-0x00000000073C0000-0x00000000073D2000-memory.dmpFilesize
72KB
-
memory/1536-150-0x0000000007940000-0x0000000007F58000-memory.dmpFilesize
6.1MB
-
memory/1536-149-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1536-148-0x0000000000000000-mapping.dmp
-
memory/1676-138-0x0000000000000000-mapping.dmp
-
memory/1944-144-0x0000000000000000-mapping.dmp
-
memory/1988-142-0x0000000000000000-mapping.dmp
-
memory/2212-140-0x0000000000000000-mapping.dmp
-
memory/3052-133-0x0000000000BB0000-0x0000000000BC6000-memory.dmpFilesize
88KB
-
memory/3204-134-0x0000000000000000-mapping.dmp
-
memory/3204-139-0x0000000000BE0000-0x0000000000D24000-memory.dmpFilesize
1.3MB
-
memory/3840-131-0x00000000006E0000-0x00000000006E9000-memory.dmpFilesize
36KB
-
memory/3840-132-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/3840-130-0x0000000000777000-0x0000000000787000-memory.dmpFilesize
64KB
-
memory/4180-137-0x0000000000000000-mapping.dmp
-
memory/4728-146-0x0000000000000000-mapping.dmp
-
memory/4848-141-0x0000000000000000-mapping.dmp
-
memory/5052-143-0x0000000000000000-mapping.dmp
-
memory/5096-145-0x0000000000000000-mapping.dmp