Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2022 10:35

General

  • Target

    file.exe

  • Size

    286KB

  • MD5

    be50ca237f863bdba5da3a8611d35bc2

  • SHA1

    ed2cecd55057023782f216aeb296a3a7eae0f92f

  • SHA256

    ede1c9f32404351fc3dbd389b7dc0734b95586f2827dffa01dc0482549855202

  • SHA512

    536e2dff104fd043441a1a48531e4e86039165d28b342a7f550d7f2078a99ba6e0609dea2665c6e532caaeb15c65a57fe3f2dbcae7a64025183460b966674548

  • SSDEEP

    3072:YYqDquggQLf5q0fTrraXB75J8Nu/ttYmd7eUXDw/AnUs:/qfQk0fmPeiKAlDwIUs

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 46 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1976
  • C:\Users\Admin\AppData\Local\Temp\FF35.exe
    C:\Users\Admin\AppData\Local\Temp\FF35.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 620
      2⤵
      • Program crash
      PID:4468
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 948
      2⤵
      • Program crash
      PID:4176
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 1000
      2⤵
      • Program crash
      PID:2936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 992
      2⤵
      • Program crash
      PID:4520
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      PID:4460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1464
        3⤵
        • Program crash
        PID:2336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4348 -ip 4348
    1⤵
      PID:2392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4348 -ip 4348
      1⤵
        PID:4272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4348 -ip 4348
        1⤵
          PID:960
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4348 -ip 4348
          1⤵
            PID:3128
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4460 -ip 4460
            1⤵
              PID:3380

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\FF35.exe

              Filesize

              1.3MB

              MD5

              e61dc22de3289357caf18ec84341f2e1

              SHA1

              39573e49bdaf6c7959384605c78c6417cc494569

              SHA256

              c8e96cc5fd4a053395182baa57dbbf469a76e98fe84de77fbeb64707d79f0189

              SHA512

              4a8a9a4c8904c52dbdd923aa950bf23029ecf3411a50ee75a2e7c8cdc3d192a0276dea74caea626298416c7e9f5306a2b0da1550152f78902ce5a8680f41ed06

            • C:\Users\Admin\AppData\Local\Temp\FF35.exe

              Filesize

              1.3MB

              MD5

              e61dc22de3289357caf18ec84341f2e1

              SHA1

              39573e49bdaf6c7959384605c78c6417cc494569

              SHA256

              c8e96cc5fd4a053395182baa57dbbf469a76e98fe84de77fbeb64707d79f0189

              SHA512

              4a8a9a4c8904c52dbdd923aa950bf23029ecf3411a50ee75a2e7c8cdc3d192a0276dea74caea626298416c7e9f5306a2b0da1550152f78902ce5a8680f41ed06

            • C:\Users\Admin\AppData\Local\Temp\Wffwew.tmp

              Filesize

              3.5MB

              MD5

              a7d875022bb5e3a34d034b947003d1b3

              SHA1

              5905ca93fea101ce80e5bf8925eb2a7eec1e333d

              SHA256

              bcdf4c540c4289f81c98448d0a4482a96522fb767ab6015e76288afce148226a

              SHA512

              f2b78a100cf0fa84909629b892e548d7ef9797621623a96aa75f15241d7350eecca117c3793056c30dc317ade8ecc0023c2b875516d9c25ac9bb0d880bb3149a

            • memory/780-150-0x0000000000A30000-0x0000000000A33000-memory.dmp

              Filesize

              12KB

            • memory/780-151-0x0000000000A30000-0x0000000000A33000-memory.dmp

              Filesize

              12KB

            • memory/780-147-0x0000000000A00000-0x0000000000A03000-memory.dmp

              Filesize

              12KB

            • memory/780-149-0x0000000000A20000-0x0000000000A23000-memory.dmp

              Filesize

              12KB

            • memory/780-148-0x0000000000A10000-0x0000000000A13000-memory.dmp

              Filesize

              12KB

            • memory/780-144-0x0000000000000000-mapping.dmp

            • memory/780-145-0x00000000007E0000-0x00000000007E3000-memory.dmp

              Filesize

              12KB

            • memory/780-146-0x00000000007F0000-0x00000000007F3000-memory.dmp

              Filesize

              12KB

            • memory/1976-135-0x0000000000400000-0x000000000084A000-memory.dmp

              Filesize

              4.3MB

            • memory/1976-134-0x0000000000400000-0x000000000084A000-memory.dmp

              Filesize

              4.3MB

            • memory/1976-133-0x0000000002440000-0x0000000002449000-memory.dmp

              Filesize

              36KB

            • memory/1976-132-0x0000000000879000-0x000000000088F000-memory.dmp

              Filesize

              88KB

            • memory/4348-152-0x0000000000400000-0x0000000000957000-memory.dmp

              Filesize

              5.3MB

            • memory/4348-160-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-142-0x0000000000400000-0x0000000000957000-memory.dmp

              Filesize

              5.3MB

            • memory/4348-141-0x00000000026C0000-0x000000000298C000-memory.dmp

              Filesize

              2.8MB

            • memory/4348-140-0x0000000002562000-0x0000000002684000-memory.dmp

              Filesize

              1.1MB

            • memory/4348-139-0x0000000000400000-0x0000000000957000-memory.dmp

              Filesize

              5.3MB

            • memory/4348-136-0x0000000000000000-mapping.dmp

            • memory/4348-154-0x0000000003210000-0x0000000003D70000-memory.dmp

              Filesize

              11.4MB

            • memory/4348-155-0x0000000003210000-0x0000000003D70000-memory.dmp

              Filesize

              11.4MB

            • memory/4348-156-0x0000000003210000-0x0000000003D70000-memory.dmp

              Filesize

              11.4MB

            • memory/4348-157-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-158-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-159-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-143-0x0000000000400000-0x0000000000957000-memory.dmp

              Filesize

              5.3MB

            • memory/4348-161-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-162-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-163-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-164-0x0000000003F30000-0x0000000004070000-memory.dmp

              Filesize

              1.2MB

            • memory/4348-174-0x0000000003210000-0x0000000003D70000-memory.dmp

              Filesize

              11.4MB

            • memory/4460-166-0x0000000002EE0000-0x0000000003A40000-memory.dmp

              Filesize

              11.4MB

            • memory/4460-167-0x0000000003A40000-0x0000000003B80000-memory.dmp

              Filesize

              1.2MB

            • memory/4460-168-0x0000000003A40000-0x0000000003B80000-memory.dmp

              Filesize

              1.2MB

            • memory/4460-169-0x0000000000A00000-0x0000000001440000-memory.dmp

              Filesize

              10.2MB

            • memory/4460-170-0x0000000002EE0000-0x0000000003A40000-memory.dmp

              Filesize

              11.4MB

            • memory/4460-171-0x0000000003A40000-0x0000000003B80000-memory.dmp

              Filesize

              1.2MB

            • memory/4460-172-0x0000000003A40000-0x0000000003B80000-memory.dmp

              Filesize

              1.2MB

            • memory/4460-173-0x0000000002EE0000-0x0000000003A40000-memory.dmp

              Filesize

              11.4MB

            • memory/4460-165-0x0000000000000000-mapping.dmp