Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2022 11:15

General

  • Target

    8d579af72e40ac93ab1049001d1a2263a55fe03b03184947d07e878683f96a04.exe

  • Size

    319KB

  • MD5

    e9421c419d7d6863c3e68c9781c00f84

  • SHA1

    b2a56e00e0c12ac4b9faf8d3dd4b389c46346c26

  • SHA256

    8d579af72e40ac93ab1049001d1a2263a55fe03b03184947d07e878683f96a04

  • SHA512

    098c3ab7d0ed6303c44f2f7f23f228ef815c0c390af98348446bd1fa3877d334e32ca13be6de473b95fda1dffabfd866c1c40edecb3a3154174db89a7fac585c

  • SSDEEP

    3072:jtLwUSPN25GxCgOi8oLFgYKhWNejXRem2OWIyRkZ5vi4VggjcGkNIVqIs7:pwUSPDxzOi8oBgF8NejheJ1wJR7ITsq

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 48 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d579af72e40ac93ab1049001d1a2263a55fe03b03184947d07e878683f96a04.exe
    "C:\Users\Admin\AppData\Local\Temp\8d579af72e40ac93ab1049001d1a2263a55fe03b03184947d07e878683f96a04.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:992
  • C:\Users\Admin\AppData\Local\Temp\1146.exe
    C:\Users\Admin\AppData\Local\Temp\1146.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 816
      2⤵
      • Program crash
      PID:4180
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 816
      2⤵
      • Program crash
      PID:4672
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 964
      2⤵
      • Program crash
      PID:1888
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4892
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2812 -ip 2812
    1⤵
      PID:2764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2812 -ip 2812
      1⤵
        PID:3176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2812 -ip 2812
        1⤵
          PID:1752

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\06e2a386-e288-47d2-9ed4-4891d5859cba.tmp

          Filesize

          25KB

          MD5

          9f670566b87be47f09e3871cd67ed6d9

          SHA1

          8b49dd7fb4bf06df0a16cfc03a42832b78bdfabd

          SHA256

          d7089602fa181dfd161165dc1bb34271e7481f88ee2ca06230da2a2269a68c80

          SHA512

          6e53a2d3c4329114f7e562d84bcb6345176ce4d7006c9d699d6dab9886d5aa277b5b8fe5cfb9e574a49e0c1de6414efa913cf9b3ffecd95e9fafa28370fc2456

        • C:\Users\Admin\AppData\Local\Temp\1146.exe

          Filesize

          4.9MB

          MD5

          d9c3d5139ae650969f1fb1fa00e43ae3

          SHA1

          8eb8301cdebe8e428e35bc865fc29d188684ee95

          SHA256

          7feb3b577f1b98337265a7f1be540f9e4700788f3566f490bee594ca1d926883

          SHA512

          c8c7ff5ce8fd1f35815beb9e8f9ddd63d0749adaf14b081a20daed5c765b36f5405b951076e7f0672c9dc0d3d351052c60f7c80a0f961f397aa93b3f586efb78

        • C:\Users\Admin\AppData\Local\Temp\1146.exe

          Filesize

          4.9MB

          MD5

          d9c3d5139ae650969f1fb1fa00e43ae3

          SHA1

          8eb8301cdebe8e428e35bc865fc29d188684ee95

          SHA256

          7feb3b577f1b98337265a7f1be540f9e4700788f3566f490bee594ca1d926883

          SHA512

          c8c7ff5ce8fd1f35815beb9e8f9ddd63d0749adaf14b081a20daed5c765b36f5405b951076e7f0672c9dc0d3d351052c60f7c80a0f961f397aa93b3f586efb78

        • C:\Users\Admin\AppData\Local\Temp\Rpiidpytrto.tmp

          Filesize

          3.5MB

          MD5

          c597ca48af580cb2755914474a787ddf

          SHA1

          427cdbd19eadb94f1f89b51a7c3647a3ff7d3925

          SHA256

          8c67a70fe070595fda6ec977af7da0085d40df299f04cdd5669156752fee3f31

          SHA512

          c41ab851b712c484184934b2dab7015d329ec485b454b645411f69a97ef4a46351fe892f86522abf19c08cf1b7b6a5212954053b8218046cdfab24ef734e47ab

        • C:\Users\Admin\AppData\Local\Temp\f1289b69-6512-49b4-94c5-178649e284db.tmp

          Filesize

          22KB

          MD5

          99e972f6d63ded5a9f3d6a06ff481bec

          SHA1

          b3c98ed6975c649454bce3d88806ad1883e22327

          SHA256

          d6f11c606729d553e9c9b3d0db9e5d51567ea969bedd98008cce7b9415a17490

          SHA512

          ecc322a906b25ea835fdfcb528fb0bc11ade80112b9d0783f0c02100a83368b718c45ca5bdbe38c106e3559db7723dc2fdf38e2bf473fb461ddade999d02f416

        • C:\Users\Admin\AppData\Local\Temp\jusched.log

          Filesize

          265KB

          MD5

          1796099a7eaef43649ee0ee72ce45f97

          SHA1

          dca61a20718c410f7c9295f611ca8a20b4c75c5e

          SHA256

          f68cb61b4540455be8078c8d906eeee3971f2866807a864682dacd3ee01830eb

          SHA512

          c67ee1201697cfcdec547f04989f91ec3fa5abd538b032031d678b64eed8244b98ca776e79de23c55c66bb135ab64e4b0f924a04fb692ac3420f4dd5ba5c4a99

        • memory/992-133-0x0000000002D90000-0x0000000002D99000-memory.dmp

          Filesize

          36KB

        • memory/992-134-0x0000000000400000-0x0000000002C3E000-memory.dmp

          Filesize

          40.2MB

        • memory/992-135-0x0000000000400000-0x0000000002C3E000-memory.dmp

          Filesize

          40.2MB

        • memory/992-132-0x0000000002F52000-0x0000000002F67000-memory.dmp

          Filesize

          84KB

        • memory/2812-141-0x0000000000400000-0x00000000030D3000-memory.dmp

          Filesize

          44.8MB

        • memory/2812-144-0x0000000005EA0000-0x0000000006A09000-memory.dmp

          Filesize

          11.4MB

        • memory/2812-145-0x0000000005EA0000-0x0000000006A09000-memory.dmp

          Filesize

          11.4MB

        • memory/2812-146-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-147-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-148-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-149-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-150-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-151-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-152-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-153-0x0000000006BB0000-0x0000000006CF0000-memory.dmp

          Filesize

          1.2MB

        • memory/2812-168-0x0000000005EA0000-0x0000000006A09000-memory.dmp

          Filesize

          11.4MB

        • memory/2812-162-0x0000000000400000-0x00000000030D3000-memory.dmp

          Filesize

          44.8MB

        • memory/2812-143-0x0000000005EA0000-0x0000000006A09000-memory.dmp

          Filesize

          11.4MB

        • memory/2812-139-0x00000000033BA000-0x0000000003864000-memory.dmp

          Filesize

          4.7MB

        • memory/2812-142-0x0000000000400000-0x00000000030D3000-memory.dmp

          Filesize

          44.8MB

        • memory/2812-140-0x0000000005210000-0x0000000005865000-memory.dmp

          Filesize

          6.3MB

        • memory/4892-157-0x0000000003E10000-0x0000000003F50000-memory.dmp

          Filesize

          1.2MB

        • memory/4892-156-0x0000000003E10000-0x0000000003F50000-memory.dmp

          Filesize

          1.2MB

        • memory/4892-155-0x00000000031E0000-0x0000000003D49000-memory.dmp

          Filesize

          11.4MB

        • memory/4892-163-0x0000000003E10000-0x0000000003F50000-memory.dmp

          Filesize

          1.2MB

        • memory/4892-164-0x0000000003E10000-0x0000000003F50000-memory.dmp

          Filesize

          1.2MB

        • memory/4892-165-0x0000000000C70000-0x00000000016BA000-memory.dmp

          Filesize

          10.3MB

        • memory/4892-166-0x00000000031E0000-0x0000000003D49000-memory.dmp

          Filesize

          11.4MB

        • memory/4892-167-0x00000000031E0000-0x0000000003D49000-memory.dmp

          Filesize

          11.4MB