Analysis

  • max time kernel
    148s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 18:20

General

  • Target

    becc55f0da56190c49c0b6043e9e7edaf68621331434f23f037f99a41d476ce0.exe

  • Size

    133KB

  • MD5

    055a72c67c6ca93ad472397f536963f6

  • SHA1

    97f95eb5af6b2e1f219bdde636dd0cd22f72529d

  • SHA256

    becc55f0da56190c49c0b6043e9e7edaf68621331434f23f037f99a41d476ce0

  • SHA512

    047612ae7c30c9109fbca14ae18c4b93befff37dc06a6872cefe17894071c256d38ad7aeddced012cd8680db64eea3e81eeeec36e7a7154dbe6c5eb21373d2d3

  • SSDEEP

    3072:a0qHM7OR0IhWqjMprNY6F8m+AgBDrh47RXmG:YDMqjb6F8mTS4c

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • GoLang User-Agent 5 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\becc55f0da56190c49c0b6043e9e7edaf68621331434f23f037f99a41d476ce0.exe
    "C:\Users\Admin\AppData\Local\Temp\becc55f0da56190c49c0b6043e9e7edaf68621331434f23f037f99a41d476ce0.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1048
  • C:\Users\Admin\AppData\Local\Temp\AF94.exe
    C:\Users\Admin\AppData\Local\Temp\AF94.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4484
  • C:\Users\Admin\AppData\Local\Temp\CFEE.exe
    C:\Users\Admin\AppData\Local\Temp\CFEE.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\Temp\1.exe
      "C:\Windows\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      PID:808
  • C:\Users\Admin\AppData\Local\Temp\F1EF.exe
    C:\Users\Admin\AppData\Local\Temp\F1EF.exe
    1⤵
    • Executes dropped EXE
    PID:3876
  • C:\Users\Admin\AppData\Local\Temp\F7CC.exe
    C:\Users\Admin\AppData\Local\Temp\F7CC.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1096
  • C:\Users\Admin\AppData\Local\Temp\1B91.exe
    C:\Users\Admin\AppData\Local\Temp\1B91.exe
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic cpu get name"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic cpu get name
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3912
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic path win32_VideoController get name"
      2⤵
        PID:4308
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          3⤵
            PID:1468
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic os get Caption
          2⤵
            PID:4352
        • C:\Users\Admin\AppData\Local\Temp\2314.exe
          C:\Users\Admin\AppData\Local\Temp\2314.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1080
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:4180
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:704
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:2860
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:2620
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3952
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:2608
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:996
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:1404
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:1684

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\1B91.exe

                            Filesize

                            4.3MB

                            MD5

                            06a1dc7aae769814998f99c0bca5ea41

                            SHA1

                            81ea40089386bffadd0e0a6bb780b7ddd4dc71a9

                            SHA256

                            ed14ed57c0a785e01024deffe5a05a79ed9d61a21c58ea8be136c79d31e2daa6

                            SHA512

                            aa4a4f8cfe7d7e68c6751e518763cbc509a7ba31699dc7541104170af1a19b439e9ae687d92c8b09450088317e58b5fc78b921646ddba0a28b1f080b7190f65b

                          • C:\Users\Admin\AppData\Local\Temp\1B91.exe

                            Filesize

                            4.3MB

                            MD5

                            06a1dc7aae769814998f99c0bca5ea41

                            SHA1

                            81ea40089386bffadd0e0a6bb780b7ddd4dc71a9

                            SHA256

                            ed14ed57c0a785e01024deffe5a05a79ed9d61a21c58ea8be136c79d31e2daa6

                            SHA512

                            aa4a4f8cfe7d7e68c6751e518763cbc509a7ba31699dc7541104170af1a19b439e9ae687d92c8b09450088317e58b5fc78b921646ddba0a28b1f080b7190f65b

                          • C:\Users\Admin\AppData\Local\Temp\2314.exe

                            Filesize

                            236KB

                            MD5

                            ae135c9b09deb9a72e3fa5286aa473e7

                            SHA1

                            d544617488a05590be04e771932ccff8b3e43e46

                            SHA256

                            49aacad637554371e55dae62d643fffcfc5b13c80a6474804321ae4f399a7a24

                            SHA512

                            756d1a143824a7ff6f48820c43ded94d866e3f386e8b353905eb6dcd446c3103592de90f97d6102406de75e52882acd329e924695ea4bfcc5d54b058d87d5205

                          • C:\Users\Admin\AppData\Local\Temp\2314.exe

                            Filesize

                            236KB

                            MD5

                            ae135c9b09deb9a72e3fa5286aa473e7

                            SHA1

                            d544617488a05590be04e771932ccff8b3e43e46

                            SHA256

                            49aacad637554371e55dae62d643fffcfc5b13c80a6474804321ae4f399a7a24

                            SHA512

                            756d1a143824a7ff6f48820c43ded94d866e3f386e8b353905eb6dcd446c3103592de90f97d6102406de75e52882acd329e924695ea4bfcc5d54b058d87d5205

                          • C:\Users\Admin\AppData\Local\Temp\AF94.exe

                            Filesize

                            699KB

                            MD5

                            c6f4ffde851054ec2871e72833cd9d59

                            SHA1

                            e688103c4fa3ca815732f0f70f37d11f69232e04

                            SHA256

                            25502cd9907336216d2733d966787f67c47a6ea07a7895a4fa9f26e9206dd0e7

                            SHA512

                            47264796515d6ef559b9f33f68011230ba242f5edfc47ea28cc1f788930a6e42f42c7c2963bf727ab67e86e859ae877a139af91dd0e7e95581a69888ad192fe4

                          • C:\Users\Admin\AppData\Local\Temp\AF94.exe

                            Filesize

                            699KB

                            MD5

                            c6f4ffde851054ec2871e72833cd9d59

                            SHA1

                            e688103c4fa3ca815732f0f70f37d11f69232e04

                            SHA256

                            25502cd9907336216d2733d966787f67c47a6ea07a7895a4fa9f26e9206dd0e7

                            SHA512

                            47264796515d6ef559b9f33f68011230ba242f5edfc47ea28cc1f788930a6e42f42c7c2963bf727ab67e86e859ae877a139af91dd0e7e95581a69888ad192fe4

                          • C:\Users\Admin\AppData\Local\Temp\CFEE.exe

                            Filesize

                            466KB

                            MD5

                            2955a7fdcda8c0768d106b135a352173

                            SHA1

                            1de1f74183421d4f811af2dc469840c8d266eec9

                            SHA256

                            3238f627cf753b195a814ad7a01bd16fa13616802e39f48a981c5c8703a2ff6f

                            SHA512

                            c87bf10bc4eaaa912a74da441c3a3894535e54764e60a76c505c628e70e35822fcbe147aaabd117ddacbc88294ad16243c7f721400ac64178681633db8898bbb

                          • C:\Users\Admin\AppData\Local\Temp\CFEE.exe

                            Filesize

                            466KB

                            MD5

                            2955a7fdcda8c0768d106b135a352173

                            SHA1

                            1de1f74183421d4f811af2dc469840c8d266eec9

                            SHA256

                            3238f627cf753b195a814ad7a01bd16fa13616802e39f48a981c5c8703a2ff6f

                            SHA512

                            c87bf10bc4eaaa912a74da441c3a3894535e54764e60a76c505c628e70e35822fcbe147aaabd117ddacbc88294ad16243c7f721400ac64178681633db8898bbb

                          • C:\Users\Admin\AppData\Local\Temp\F1EF.exe

                            Filesize

                            315KB

                            MD5

                            eca8745d0a485815926c5c0b73346887

                            SHA1

                            8395d421d78434277b1c5e84245d8c15e27ec616

                            SHA256

                            1c9f3cedcf3295930ccbf061916b974ce2f37a4cc9a697e88d758273566d924e

                            SHA512

                            fd88e9e93ecf804af7537526f04c32c66f57425b84c0d32178db5e43b9086510aede1a5916a23e079e9bec7e94885777cad6a222d02411e7a38aa2654a0994b9

                          • C:\Users\Admin\AppData\Local\Temp\F1EF.exe

                            Filesize

                            315KB

                            MD5

                            eca8745d0a485815926c5c0b73346887

                            SHA1

                            8395d421d78434277b1c5e84245d8c15e27ec616

                            SHA256

                            1c9f3cedcf3295930ccbf061916b974ce2f37a4cc9a697e88d758273566d924e

                            SHA512

                            fd88e9e93ecf804af7537526f04c32c66f57425b84c0d32178db5e43b9086510aede1a5916a23e079e9bec7e94885777cad6a222d02411e7a38aa2654a0994b9

                          • C:\Users\Admin\AppData\Local\Temp\F7CC.exe

                            Filesize

                            237KB

                            MD5

                            d721aa5fb80cb8439585838732ddda66

                            SHA1

                            e0ff77d67729bc979068408358cb29dbbf40cf22

                            SHA256

                            3fe71ff72cc08157f0cbb93be5051ae98b8ae88546f7bd1e1bee06bfa542dba2

                            SHA512

                            5d685d11467fda77e2cfb1223dd22f10c3a3e9262516e8be8ee57d3df9b32bb472174603071c3af7d1d4bf7794776a801d1ea5266392cf5dc5df88c35e851e96

                          • C:\Users\Admin\AppData\Local\Temp\F7CC.exe

                            Filesize

                            237KB

                            MD5

                            d721aa5fb80cb8439585838732ddda66

                            SHA1

                            e0ff77d67729bc979068408358cb29dbbf40cf22

                            SHA256

                            3fe71ff72cc08157f0cbb93be5051ae98b8ae88546f7bd1e1bee06bfa542dba2

                            SHA512

                            5d685d11467fda77e2cfb1223dd22f10c3a3e9262516e8be8ee57d3df9b32bb472174603071c3af7d1d4bf7794776a801d1ea5266392cf5dc5df88c35e851e96

                          • C:\Windows\Temp\1.exe

                            Filesize

                            369KB

                            MD5

                            4a32a16c5a3c79ade487c098ee71a2be

                            SHA1

                            414b203eeb20ac7e74316fd2877ca4ebf52193df

                            SHA256

                            61059bd8f3bdb2b07ca01c87efe6284b8b3b77ca63e9a063e0e9010774a482a4

                            SHA512

                            6470c0269052bbccea48bfb5da80cdcf96fec71e0e45ae79a42acacd7c4d92139ccc6f122ab97e5b104fc93bee84891850a80aa9c835c0b31418f151517b1ee5

                          • C:\Windows\Temp\1.exe

                            Filesize

                            369KB

                            MD5

                            4a32a16c5a3c79ade487c098ee71a2be

                            SHA1

                            414b203eeb20ac7e74316fd2877ca4ebf52193df

                            SHA256

                            61059bd8f3bdb2b07ca01c87efe6284b8b3b77ca63e9a063e0e9010774a482a4

                            SHA512

                            6470c0269052bbccea48bfb5da80cdcf96fec71e0e45ae79a42acacd7c4d92139ccc6f122ab97e5b104fc93bee84891850a80aa9c835c0b31418f151517b1ee5

                          • memory/704-161-0x0000000000000000-mapping.dmp

                          • memory/704-166-0x00000000009F0000-0x00000000009F9000-memory.dmp

                            Filesize

                            36KB

                          • memory/704-167-0x00000000009E0000-0x00000000009EF000-memory.dmp

                            Filesize

                            60KB

                          • memory/808-169-0x0000000000000000-mapping.dmp

                          • memory/996-200-0x0000000000000000-mapping.dmp

                          • memory/996-207-0x00000000010C0000-0x00000000010C6000-memory.dmp

                            Filesize

                            24KB

                          • memory/996-208-0x00000000010B0000-0x00000000010BB000-memory.dmp

                            Filesize

                            44KB

                          • memory/1048-133-0x00000000022B0000-0x00000000022B9000-memory.dmp

                            Filesize

                            36KB

                          • memory/1048-132-0x00000000005ED000-0x00000000005FD000-memory.dmp

                            Filesize

                            64KB

                          • memory/1048-134-0x0000000000400000-0x000000000057F000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/1048-135-0x0000000000400000-0x000000000057F000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/1080-155-0x0000000000000000-mapping.dmp

                          • memory/1080-201-0x0000000006DB0000-0x0000000006F72000-memory.dmp

                            Filesize

                            1.8MB

                          • memory/1080-203-0x0000000006F90000-0x00000000074BC000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/1080-176-0x000000000077D000-0x00000000007A7000-memory.dmp

                            Filesize

                            168KB

                          • memory/1080-189-0x0000000006BD0000-0x0000000006C20000-memory.dmp

                            Filesize

                            320KB

                          • memory/1080-168-0x00000000006F0000-0x0000000000728000-memory.dmp

                            Filesize

                            224KB

                          • memory/1080-171-0x0000000000400000-0x0000000000598000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1080-185-0x00000000067D0000-0x0000000006836000-memory.dmp

                            Filesize

                            408KB

                          • memory/1096-206-0x0000000000650000-0x0000000000688000-memory.dmp

                            Filesize

                            224KB

                          • memory/1096-158-0x0000000004D20000-0x00000000052C4000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/1096-163-0x00000000058F0000-0x00000000059FA000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/1096-170-0x0000000005A00000-0x0000000005A3C000-memory.dmp

                            Filesize

                            240KB

                          • memory/1096-162-0x0000000004C80000-0x0000000004C92000-memory.dmp

                            Filesize

                            72KB

                          • memory/1096-186-0x00000000067D0000-0x0000000006862000-memory.dmp

                            Filesize

                            584KB

                          • memory/1096-190-0x0000000006D10000-0x0000000006D86000-memory.dmp

                            Filesize

                            472KB

                          • memory/1096-160-0x00000000052D0000-0x00000000058E8000-memory.dmp

                            Filesize

                            6.1MB

                          • memory/1096-149-0x0000000000650000-0x0000000000688000-memory.dmp

                            Filesize

                            224KB

                          • memory/1096-194-0x0000000006DD0000-0x0000000006DEE000-memory.dmp

                            Filesize

                            120KB

                          • memory/1096-205-0x00000000006CD000-0x00000000006F7000-memory.dmp

                            Filesize

                            168KB

                          • memory/1096-148-0x00000000006CD000-0x00000000006F7000-memory.dmp

                            Filesize

                            168KB

                          • memory/1096-150-0x0000000000400000-0x0000000000598000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1096-144-0x0000000000000000-mapping.dmp

                          • memory/1404-214-0x0000000000DC0000-0x0000000000DCD000-memory.dmp

                            Filesize

                            52KB

                          • memory/1404-213-0x0000000000DD0000-0x0000000000DD7000-memory.dmp

                            Filesize

                            28KB

                          • memory/1404-209-0x0000000000000000-mapping.dmp

                          • memory/1468-204-0x0000000000000000-mapping.dmp

                          • memory/1660-151-0x0000000000000000-mapping.dmp

                          • memory/1684-215-0x0000000000000000-mapping.dmp

                          • memory/1684-217-0x0000000000B40000-0x0000000000B4B000-memory.dmp

                            Filesize

                            44KB

                          • memory/1684-216-0x0000000000B50000-0x0000000000B58000-memory.dmp

                            Filesize

                            32KB

                          • memory/2608-195-0x0000000000000000-mapping.dmp

                          • memory/2608-199-0x00000000008E0000-0x00000000008E9000-memory.dmp

                            Filesize

                            36KB

                          • memory/2608-198-0x00000000008F0000-0x00000000008F5000-memory.dmp

                            Filesize

                            20KB

                          • memory/2620-184-0x0000000000900000-0x000000000090C000-memory.dmp

                            Filesize

                            48KB

                          • memory/2620-179-0x0000000000000000-mapping.dmp

                          • memory/2620-182-0x0000000000910000-0x0000000000916000-memory.dmp

                            Filesize

                            24KB

                          • memory/2756-139-0x0000000000000000-mapping.dmp

                          • memory/2860-178-0x0000000000560000-0x0000000000569000-memory.dmp

                            Filesize

                            36KB

                          • memory/2860-177-0x0000000000570000-0x0000000000575000-memory.dmp

                            Filesize

                            20KB

                          • memory/2860-173-0x0000000000000000-mapping.dmp

                          • memory/3708-196-0x0000000000000000-mapping.dmp

                          • memory/3876-142-0x0000000000000000-mapping.dmp

                          • memory/3904-141-0x0000000000B80000-0x0000000000C30000-memory.dmp

                            Filesize

                            704KB

                          • memory/3904-175-0x0000000005760000-0x0000000005782000-memory.dmp

                            Filesize

                            136KB

                          • memory/3904-136-0x0000000000000000-mapping.dmp

                          • memory/3912-197-0x0000000000000000-mapping.dmp

                          • memory/3952-193-0x0000000001080000-0x00000000010A7000-memory.dmp

                            Filesize

                            156KB

                          • memory/3952-191-0x00000000010B0000-0x00000000010D2000-memory.dmp

                            Filesize

                            136KB

                          • memory/3952-187-0x0000000000000000-mapping.dmp

                          • memory/4180-164-0x0000000000F50000-0x0000000000F57000-memory.dmp

                            Filesize

                            28KB

                          • memory/4180-165-0x0000000000F40000-0x0000000000F4B000-memory.dmp

                            Filesize

                            44KB

                          • memory/4180-159-0x0000000000000000-mapping.dmp

                          • memory/4308-202-0x0000000000000000-mapping.dmp

                          • memory/4352-212-0x0000000000000000-mapping.dmp

                          • memory/4484-188-0x00000000063A0000-0x0000000006406000-memory.dmp

                            Filesize

                            408KB

                          • memory/4484-211-0x0000000006E00000-0x0000000006E1A000-memory.dmp

                            Filesize

                            104KB

                          • memory/4484-210-0x0000000008320000-0x000000000899A000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4484-180-0x0000000000000000-mapping.dmp

                          • memory/4484-181-0x0000000003350000-0x0000000003386000-memory.dmp

                            Filesize

                            216KB

                          • memory/4484-183-0x0000000005C70000-0x0000000006298000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/4484-192-0x0000000006910000-0x000000000692E000-memory.dmp

                            Filesize

                            120KB