Analysis
-
max time kernel
152s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-10-2022 21:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://guluiiiimnstrannaer.net/dl/6523.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
http://guluiiiimnstrannaer.net/dl/6523.exe
Resource
win10v2004-20220812-en
General
-
Target
http://guluiiiimnstrannaer.net/dl/6523.exe
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1776-60-0x00000000003A0000-0x00000000003A9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
6523.exepid process 1776 6523.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6523.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6523.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6523.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6523.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 3092270215d9d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000f77b155e87b8e40f628e418b664b9648c8c13fafed7aad2eb141a9b997634937000000000e800000000200002000000083d7e2126a45838f67f7f4adf232ce69d50e85ea8a336fc5bc0feafdafc3cbc4200000007750530901a6468ba9e7b7833d31867697eb964735cc3726bf431e7a4b8df8194000000000929b0e2f6b631316e8af34fbd1cb9bdf527c1f8a5477908f0f2b3df2fe05ecae677f95b3adb9c42ef939361748551a836a11529a2b88fe6bc2911e3290e6eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B036AC1-4508-11ED-8413-C22E595EE768} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371778692" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07d761415d9d801 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6523.exepid process 1776 6523.exe 1776 6523.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6523.exepid process 1776 6523.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 560 iexplore.exe 560 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 560 iexplore.exe 560 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exedescription pid process target process PID 560 wrote to memory of 1512 560 iexplore.exe IEXPLORE.EXE PID 560 wrote to memory of 1512 560 iexplore.exe IEXPLORE.EXE PID 560 wrote to memory of 1512 560 iexplore.exe IEXPLORE.EXE PID 560 wrote to memory of 1512 560 iexplore.exe IEXPLORE.EXE PID 560 wrote to memory of 1776 560 iexplore.exe 6523.exe PID 560 wrote to memory of 1776 560 iexplore.exe 6523.exe PID 560 wrote to memory of 1776 560 iexplore.exe 6523.exe PID 560 wrote to memory of 1776 560 iexplore.exe 6523.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://guluiiiimnstrannaer.net/dl/6523.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I9NA5QYV\6523.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I9NA5QYV\6523.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I9NA5QYV\6523.exeFilesize
271KB
MD50b28c768b2688d0b845c6cc8fd1c0c0d
SHA19c90b3b6675075e7e36199f9ece3fd4d8231b810
SHA25666d05cd109af6833d21e53732782d29a1b4f2f24b4431fc65c3c39da708e6c59
SHA5124d6d255afa82b82a903f5d40c31c286ae8f8945d01a255657e8ce00e523418138ef4c47d3a4d6e5b76812fd5d80efd1afea622972eb424972852a92c54229d11
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I9NA5QYV\6523.exe.bylc3gf.partialFilesize
271KB
MD50b28c768b2688d0b845c6cc8fd1c0c0d
SHA19c90b3b6675075e7e36199f9ece3fd4d8231b810
SHA25666d05cd109af6833d21e53732782d29a1b4f2f24b4431fc65c3c39da708e6c59
SHA5124d6d255afa82b82a903f5d40c31c286ae8f8945d01a255657e8ce00e523418138ef4c47d3a4d6e5b76812fd5d80efd1afea622972eb424972852a92c54229d11
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HQ50HXDD.txtFilesize
603B
MD5b025a2a8a43a2645c9acfe119af86cf9
SHA104d328cf54e7eeddea2e6c6824231c4f5a5db8a5
SHA2562f1802781a4c5bbdddfcca3ba7b32cc04f42ea2324274b9605dbbe32ebd7ccb2
SHA512e2002ef931877f88a7ea8aa4a9cde2a5ec15f31b032da08da680d9d70bfa133df487da314225ca6241e4cdca7e90f68655c30ee09020800f860d9b033be78e6a
-
memory/1776-55-0x0000000000000000-mapping.dmp
-
memory/1776-58-0x0000000076041000-0x0000000076043000-memory.dmpFilesize
8KB
-
memory/1776-59-0x0000000000230000-0x0000000000330000-memory.dmpFilesize
1024KB
-
memory/1776-60-0x00000000003A0000-0x00000000003A9000-memory.dmpFilesize
36KB
-
memory/1776-61-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/1776-62-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB