Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2022 15:20

General

  • Target

    1b0fd55f094821963a477b344116b1710a9e9a8b536321513ede6cf812c442e8.exe

  • Size

    285KB

  • MD5

    f526de6c51cf1993608007fb74cc7537

  • SHA1

    06c3ff1ded6de234e55560540827a8b59ab9cfd6

  • SHA256

    1b0fd55f094821963a477b344116b1710a9e9a8b536321513ede6cf812c442e8

  • SHA512

    31788a0cfef556a8aa7f7248507a5ba670e1ae36a7b450dd9c3c4562d71d684de06386943509ee7e4a29c97a9623174d331c8bb1e15b5ed52af283297bebe1cb

  • SSDEEP

    3072:TqdvxqiTZbrgg67lq65analtS7REPl1wHINMj71DPAsXek3cmBJ05BVZyF4zffBa:ujqQ2MZnuLPM6Mtcxko7VlzE

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 44 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b0fd55f094821963a477b344116b1710a9e9a8b536321513ede6cf812c442e8.exe
    "C:\Users\Admin\AppData\Local\Temp\1b0fd55f094821963a477b344116b1710a9e9a8b536321513ede6cf812c442e8.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3648
  • C:\Users\Admin\AppData\Local\Temp\DBDE.exe
    C:\Users\Admin\AppData\Local\Temp\DBDE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:3172
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      PID:2432
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 1040
      2⤵
      • Program crash
      PID:2744
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3828 -ip 3828
    1⤵
      PID:1744

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DBDE.exe

      Filesize

      1.3MB

      MD5

      f8244a0b3f8c2f695ca83fd57b559886

      SHA1

      31ca73ee87268a7e6aa7e89f441ce1c42829870d

      SHA256

      edfce5aa7f69d4216ad9214519d0f50e75058fc074722b906d7beedf59ee1281

      SHA512

      90cb17960849a182b328315523e5130d99bee1211a0e1f065f0c566d4626cb6bf33ab03c4b22f4daeaa363815276e69ceff4525d5142bdcdc99a96afca4bd9ea

    • C:\Users\Admin\AppData\Local\Temp\DBDE.exe

      Filesize

      1.3MB

      MD5

      f8244a0b3f8c2f695ca83fd57b559886

      SHA1

      31ca73ee87268a7e6aa7e89f441ce1c42829870d

      SHA256

      edfce5aa7f69d4216ad9214519d0f50e75058fc074722b906d7beedf59ee1281

      SHA512

      90cb17960849a182b328315523e5130d99bee1211a0e1f065f0c566d4626cb6bf33ab03c4b22f4daeaa363815276e69ceff4525d5142bdcdc99a96afca4bd9ea

    • C:\Users\Admin\AppData\Local\Temp\Wffwew.tmp

      Filesize

      3.5MB

      MD5

      a7d875022bb5e3a34d034b947003d1b3

      SHA1

      5905ca93fea101ce80e5bf8925eb2a7eec1e333d

      SHA256

      bcdf4c540c4289f81c98448d0a4482a96522fb767ab6015e76288afce148226a

      SHA512

      f2b78a100cf0fa84909629b892e548d7ef9797621623a96aa75f15241d7350eecca117c3793056c30dc317ade8ecc0023c2b875516d9c25ac9bb0d880bb3149a

    • memory/2432-173-0x0000000000D50000-0x0000000001790000-memory.dmp

      Filesize

      10.2MB

    • memory/2432-172-0x0000000002F30000-0x0000000003A90000-memory.dmp

      Filesize

      11.4MB

    • memory/2432-177-0x0000000002F30000-0x0000000003A90000-memory.dmp

      Filesize

      11.4MB

    • memory/2432-176-0x0000000002F30000-0x0000000003A90000-memory.dmp

      Filesize

      11.4MB

    • memory/2432-175-0x0000000003B50000-0x0000000003C90000-memory.dmp

      Filesize

      1.2MB

    • memory/2432-174-0x0000000003B50000-0x0000000003C90000-memory.dmp

      Filesize

      1.2MB

    • memory/3172-152-0x00000000004C0000-0x00000000004C3000-memory.dmp

      Filesize

      12KB

    • memory/3172-157-0x0000000000500000-0x0000000000503000-memory.dmp

      Filesize

      12KB

    • memory/3172-146-0x0000000000460000-0x0000000000463000-memory.dmp

      Filesize

      12KB

    • memory/3172-147-0x0000000000470000-0x0000000000473000-memory.dmp

      Filesize

      12KB

    • memory/3172-148-0x0000000000480000-0x0000000000483000-memory.dmp

      Filesize

      12KB

    • memory/3172-149-0x0000000000490000-0x0000000000493000-memory.dmp

      Filesize

      12KB

    • memory/3172-150-0x00000000004A0000-0x00000000004A3000-memory.dmp

      Filesize

      12KB

    • memory/3172-151-0x00000000004B0000-0x00000000004B3000-memory.dmp

      Filesize

      12KB

    • memory/3172-156-0x0000000000500000-0x0000000000503000-memory.dmp

      Filesize

      12KB

    • memory/3172-153-0x00000000004D0000-0x00000000004D3000-memory.dmp

      Filesize

      12KB

    • memory/3172-155-0x00000000004F0000-0x00000000004F3000-memory.dmp

      Filesize

      12KB

    • memory/3172-154-0x00000000004E0000-0x00000000004E3000-memory.dmp

      Filesize

      12KB

    • memory/3648-133-0x0000000000850000-0x0000000000950000-memory.dmp

      Filesize

      1024KB

    • memory/3648-136-0x0000000000400000-0x000000000084A000-memory.dmp

      Filesize

      4.3MB

    • memory/3648-135-0x0000000000400000-0x000000000084A000-memory.dmp

      Filesize

      4.3MB

    • memory/3648-134-0x0000000002440000-0x0000000002449000-memory.dmp

      Filesize

      36KB

    • memory/3828-144-0x0000000000400000-0x0000000000957000-memory.dmp

      Filesize

      5.3MB

    • memory/3828-161-0x0000000003230000-0x0000000003D90000-memory.dmp

      Filesize

      11.4MB

    • memory/3828-162-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-163-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-164-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-166-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-165-0x0000000003230000-0x0000000003D90000-memory.dmp

      Filesize

      11.4MB

    • memory/3828-167-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-168-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-169-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-170-0x0000000003F50000-0x0000000004090000-memory.dmp

      Filesize

      1.2MB

    • memory/3828-160-0x0000000000400000-0x0000000000957000-memory.dmp

      Filesize

      5.3MB

    • memory/3828-159-0x0000000003230000-0x0000000003D90000-memory.dmp

      Filesize

      11.4MB

    • memory/3828-143-0x0000000000400000-0x0000000000957000-memory.dmp

      Filesize

      5.3MB

    • memory/3828-142-0x0000000002720000-0x00000000029EC000-memory.dmp

      Filesize

      2.8MB

    • memory/3828-141-0x00000000024EF000-0x0000000002611000-memory.dmp

      Filesize

      1.1MB

    • memory/3828-140-0x0000000000400000-0x0000000000957000-memory.dmp

      Filesize

      5.3MB

    • memory/3828-178-0x0000000000400000-0x0000000000957000-memory.dmp

      Filesize

      5.3MB

    • memory/3828-179-0x0000000003230000-0x0000000003D90000-memory.dmp

      Filesize

      11.4MB