Resubmissions

19-11-2022 21:40

221119-1jgzlacd49 8

19-11-2022 13:48

221119-q4ed4adg34 10

19-11-2022 06:26

221119-g7aqmscg91 10

19-11-2022 05:30

221119-f67hjsbc8t 10

15-11-2022 20:50

221115-zm3j2abf6y 10

15-11-2022 20:50

221115-zmpm6sfh23 10

15-11-2022 20:49

221115-zl6kasfg98 10

15-11-2022 20:19

221115-y4ct9sff87 10

14-11-2022 19:39

221114-yc4tnsdb92 10

14-11-2022 19:34

221114-yakb9adb83 10

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2022 19:34

General

  • Target

    db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe

  • Size

    307KB

  • MD5

    0abe50c1509136bf62d2184ab439e7a5

  • SHA1

    722a7e2a0dd66f506ba93d24946b8bf504b100c0

  • SHA256

    db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50

  • SHA512

    0c232d1eaf68c0099fb499fcd40bb33cd604f0259a71b853c296e00cc468342de95548ccf61d9e904cef5d34fd94defbb43f844e9f50a51517c7c95ab66862c5

  • SSDEEP

    6144:Gu0FGLnBOUaLPP7S9dW8dsgMF24raEn2E1a:Gu0wTBOU2Pj6EisgM/uUv

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 19 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
    "C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4304
  • C:\Users\Admin\AppData\Local\Temp\4E.exe
    C:\Users\Admin\AppData\Local\Temp\4E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Hefurhy.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 16327
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 500
      2⤵
      • Program crash
      PID:3344
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1544 -ip 1544
    1⤵
      PID:4228
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2128

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      3
      T1082

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\4E.exe
        Filesize

        3.0MB

        MD5

        a6809a0da3ac7da364c708f781161cf6

        SHA1

        e68f010ad14d7f00890c755a3ec5135027b355e4

        SHA256

        c40e7bef8854ab8d7f96917ca4650bc04915c68837b5459565c3bec26db45b84

        SHA512

        7eeb9fb194121b61259efe1f14b8471b06e8a1817ce7ca8ddb2101d6bbfcb327ecd384207c987e1e130a61a32be54198013e8a490bf61afd6d53d9f0b3e26dce

      • C:\Users\Admin\AppData\Local\Temp\4E.exe
        Filesize

        3.0MB

        MD5

        a6809a0da3ac7da364c708f781161cf6

        SHA1

        e68f010ad14d7f00890c755a3ec5135027b355e4

        SHA256

        c40e7bef8854ab8d7f96917ca4650bc04915c68837b5459565c3bec26db45b84

        SHA512

        7eeb9fb194121b61259efe1f14b8471b06e8a1817ce7ca8ddb2101d6bbfcb327ecd384207c987e1e130a61a32be54198013e8a490bf61afd6d53d9f0b3e26dce

      • C:\Users\Admin\AppData\Local\Temp\Hefurhy.dll
        Filesize

        4.3MB

        MD5

        e57c417c9dd87946ef9bdca4919d010f

        SHA1

        d5733fe5d5d93a2492fad98dd20c2c7b1c6220f2

        SHA256

        54819bc7a9e2f302d27ad904ff35fd22d5cb77b7cf391fb7dee968165b72cb0f

        SHA512

        c51f7ce0ffce748e1a2042ace2224f176ae7ad78334a5e9be443e69c48399dd94fab480c1321b8a0771b86d3cf89973486e9a87edd174ffdc1738755e8eb5d8b

      • C:\Users\Admin\AppData\Local\Temp\Hefurhy.dll
        Filesize

        4.3MB

        MD5

        e57c417c9dd87946ef9bdca4919d010f

        SHA1

        d5733fe5d5d93a2492fad98dd20c2c7b1c6220f2

        SHA256

        54819bc7a9e2f302d27ad904ff35fd22d5cb77b7cf391fb7dee968165b72cb0f

        SHA512

        c51f7ce0ffce748e1a2042ace2224f176ae7ad78334a5e9be443e69c48399dd94fab480c1321b8a0771b86d3cf89973486e9a87edd174ffdc1738755e8eb5d8b

      • memory/1500-163-0x00000250B1B90000-0x00000250B1E33000-memory.dmp
        Filesize

        2.6MB

      • memory/1500-159-0x00000250B35E0000-0x00000250B3720000-memory.dmp
        Filesize

        1.2MB

      • memory/1500-160-0x00000250B35E0000-0x00000250B3720000-memory.dmp
        Filesize

        1.2MB

      • memory/1500-162-0x0000000000810000-0x0000000000AA2000-memory.dmp
        Filesize

        2.6MB

      • memory/1500-158-0x00007FF6CE666890-mapping.dmp
      • memory/1544-137-0x0000000000000000-mapping.dmp
      • memory/1544-142-0x0000000000400000-0x0000000000AFC000-memory.dmp
        Filesize

        7.0MB

      • memory/1544-141-0x0000000002A60000-0x0000000002D61000-memory.dmp
        Filesize

        3.0MB

      • memory/1544-140-0x0000000000DFC000-0x00000000010BF000-memory.dmp
        Filesize

        2.8MB

      • memory/1544-147-0x0000000000400000-0x0000000000AFC000-memory.dmp
        Filesize

        7.0MB

      • memory/4304-136-0x0000000000400000-0x0000000000850000-memory.dmp
        Filesize

        4.3MB

      • memory/4304-135-0x0000000000400000-0x0000000000850000-memory.dmp
        Filesize

        4.3MB

      • memory/4304-133-0x0000000000850000-0x0000000000950000-memory.dmp
        Filesize

        1024KB

      • memory/4304-134-0x0000000000BA0000-0x0000000000BA9000-memory.dmp
        Filesize

        36KB

      • memory/5080-149-0x00000000039B0000-0x000000000453C000-memory.dmp
        Filesize

        11.5MB

      • memory/5080-152-0x0000000004600000-0x0000000004740000-memory.dmp
        Filesize

        1.2MB

      • memory/5080-153-0x0000000004600000-0x0000000004740000-memory.dmp
        Filesize

        1.2MB

      • memory/5080-154-0x0000000004600000-0x0000000004740000-memory.dmp
        Filesize

        1.2MB

      • memory/5080-155-0x0000000004600000-0x0000000004740000-memory.dmp
        Filesize

        1.2MB

      • memory/5080-156-0x0000000004600000-0x0000000004740000-memory.dmp
        Filesize

        1.2MB

      • memory/5080-157-0x0000000004600000-0x0000000004740000-memory.dmp
        Filesize

        1.2MB

      • memory/5080-151-0x00000000039B0000-0x000000000453C000-memory.dmp
        Filesize

        11.5MB

      • memory/5080-150-0x00000000039B0000-0x000000000453C000-memory.dmp
        Filesize

        11.5MB

      • memory/5080-148-0x0000000000400000-0x0000000000851000-memory.dmp
        Filesize

        4.3MB

      • memory/5080-146-0x0000000000400000-0x0000000000851000-memory.dmp
        Filesize

        4.3MB

      • memory/5080-161-0x0000000004679000-0x000000000467B000-memory.dmp
        Filesize

        8KB

      • memory/5080-143-0x0000000000000000-mapping.dmp
      • memory/5080-164-0x00000000039B0000-0x000000000453C000-memory.dmp
        Filesize

        11.5MB