Analysis

  • max time kernel
    35s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 08:01

General

  • Target

    46aec41c3bc850cf147e9d2e4fad4a1b60b22c0e8d238bd67e68bc1784a42a17.exe

  • Size

    356KB

  • MD5

    10dd5160a2f6a3478d45db45ed5ba689

  • SHA1

    e5f76fcf92d3819006213bc9c9c069f1f4f18ff8

  • SHA256

    46aec41c3bc850cf147e9d2e4fad4a1b60b22c0e8d238bd67e68bc1784a42a17

  • SHA512

    46aaba0eb1c11eeb6611ae61f3d10492b0f39c6536511848532715d5128f2726f135dfb4b0b9941b7e7f2fb540f2784935f3fc4e891d7b8bb9d6ce400dc57b4d

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://klub11n.se/zb/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46aec41c3bc850cf147e9d2e4fad4a1b60b22c0e8d238bd67e68bc1784a42a17.exe
    "C:\Users\Admin\AppData\Local\Temp\46aec41c3bc850cf147e9d2e4fad4a1b60b22c0e8d238bd67e68bc1784a42a17.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Users\Admin\AppData\Local\Temp\46aec41c3bc850cf147e9d2e4fad4a1b60b22c0e8d238bd67e68bc1784a42a17.exe
      "C:\Users\Admin\AppData\Local\Temp\46aec41c3bc850cf147e9d2e4fad4a1b60b22c0e8d238bd67e68bc1784a42a17.exe"
      2⤵
      • Maps connected drives based on registry
      • Suspicious behavior: MapViewOfSection
      PID:608

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/608-56-0x0000000000402931-mapping.dmp
  • memory/608-59-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/884-54-0x0000000075D21000-0x0000000075D23000-memory.dmp
    Filesize

    8KB

  • memory/884-55-0x0000000000400000-0x000000000045D000-memory.dmp
    Filesize

    372KB

  • memory/1260-58-0x0000000002980000-0x0000000002995000-memory.dmp
    Filesize

    84KB