Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 17:35

General

  • Target

    4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783.exe

  • Size

    100KB

  • MD5

    353055e160858b668a5d3af3f574e9b4

  • SHA1

    364138438342df6979867d5073fe983bf1e66236

  • SHA256

    4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783

  • SHA512

    5ba5b7d28e0da2b68f7c95d02e639d0f0ad4cc730c6435df5d0381978024713beeed81ea2df9cba06b080749e090c7703a9d27c3a39df763e1dcae47a3d30c24

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://attributivelyberkshire.bid/

http://aureomycinsschoenberg.bid/

http://winfredsbucharests.bid/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783.exe
    "C:\Users\Admin\AppData\Local\Temp\4aa6cc23c7a6dfb9ec83918c987d439b44d6cdc7e2047c539ee22fad5165e783.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious behavior: MapViewOfSection
    PID:2824

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-133-0x0000000000560000-0x0000000000575000-memory.dmp
    Filesize

    84KB

  • memory/2824-130-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2824-131-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2824-132-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2824-134-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB