Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 06:32

General

  • Target

    file.exe

  • Size

    187KB

  • MD5

    d50151680615c2bcd433c1e60e41056e

  • SHA1

    ebb801bbf3d49670d485c6fd5e7aff568aa090a4

  • SHA256

    2bffd5b400289f8b921a8f338e4603f3d373d24dc61ecb085f02ed573b99983d

  • SHA512

    c1985931d97325e4ad219a572da8e33f14ab74f9b8e482c3718f203542c2d2c21a23c5d32a9cfece9ca37d049ffdd27307e1f7d312b5639926f23b7527e20636

  • SSDEEP

    3072:hEKdQd8soLGUiWZwvj5EWUaQrZ/bcm8uiROpZhqG6tzrsj/:1d1LGUiS1raMtb2ui0Z0tzq

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4936
  • C:\Users\Admin\AppData\Local\Temp\35C1.exe
    C:\Users\Admin\AppData\Local\Temp\35C1.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp",Rrptfe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:3900
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14198
        3⤵
          PID:3420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 540
        2⤵
        • Program crash
        PID:2220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4060 -ip 4060
      1⤵
        PID:856

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\35C1.exe

        Filesize

        1.0MB

        MD5

        06eb56951a589d42acf83aa7f03f42eb

        SHA1

        2919c57b6ed1aedb5af94183c61cf1b73c073462

        SHA256

        707ff527e6415a6da0bd08c3c1af3af7e2732e29ef994490cc77eee9b4b4eebd

        SHA512

        de8dc09da4b584422bdbc33b8a957f917382adf5206f178c0f976de7c4ef2d21dce886f438be1a8ec0be3f7cc9d0def0484a23c006e2661d5b2c6c953351a180

      • C:\Users\Admin\AppData\Local\Temp\35C1.exe

        Filesize

        1.0MB

        MD5

        06eb56951a589d42acf83aa7f03f42eb

        SHA1

        2919c57b6ed1aedb5af94183c61cf1b73c073462

        SHA256

        707ff527e6415a6da0bd08c3c1af3af7e2732e29ef994490cc77eee9b4b4eebd

        SHA512

        de8dc09da4b584422bdbc33b8a957f917382adf5206f178c0f976de7c4ef2d21dce886f438be1a8ec0be3f7cc9d0def0484a23c006e2661d5b2c6c953351a180

      • C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp

        Filesize

        774KB

        MD5

        d5e88f35e214f2dff51a7d494316bac2

        SHA1

        6306dfa71c4e32dede210631cf90732693c0afcf

        SHA256

        f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

        SHA512

        ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

      • C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp

        Filesize

        774KB

        MD5

        d5e88f35e214f2dff51a7d494316bac2

        SHA1

        6306dfa71c4e32dede210631cf90732693c0afcf

        SHA256

        f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

        SHA512

        ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

      • memory/3420-159-0x000001F850120000-0x000001F850260000-memory.dmp

        Filesize

        1.2MB

      • memory/3420-158-0x000001F850120000-0x000001F850260000-memory.dmp

        Filesize

        1.2MB

      • memory/3420-157-0x000001F850290000-0x000001F850534000-memory.dmp

        Filesize

        2.6MB

      • memory/3420-156-0x0000000000E80000-0x0000000001112000-memory.dmp

        Filesize

        2.6MB

      • memory/3420-154-0x00007FF733846890-mapping.dmp

      • memory/3900-153-0x0000000004C40000-0x0000000004D80000-memory.dmp

        Filesize

        1.2MB

      • memory/3900-150-0x0000000004C40000-0x0000000004D80000-memory.dmp

        Filesize

        1.2MB

      • memory/3900-155-0x0000000004CB9000-0x0000000004CBB000-memory.dmp

        Filesize

        8KB

      • memory/3900-152-0x0000000004C40000-0x0000000004D80000-memory.dmp

        Filesize

        1.2MB

      • memory/3900-151-0x0000000004C40000-0x0000000004D80000-memory.dmp

        Filesize

        1.2MB

      • memory/3900-146-0x00000000055B0000-0x0000000006111000-memory.dmp

        Filesize

        11.4MB

      • memory/3900-147-0x00000000055B0000-0x0000000006111000-memory.dmp

        Filesize

        11.4MB

      • memory/3900-148-0x0000000004C40000-0x0000000004D80000-memory.dmp

        Filesize

        1.2MB

      • memory/3900-149-0x0000000004C40000-0x0000000004D80000-memory.dmp

        Filesize

        1.2MB

      • memory/3900-142-0x0000000000000000-mapping.dmp

      • memory/4060-145-0x0000000000400000-0x00000000028BA000-memory.dmp

        Filesize

        36.7MB

      • memory/4060-140-0x00000000046E0000-0x0000000004805000-memory.dmp

        Filesize

        1.1MB

      • memory/4060-139-0x0000000004547000-0x0000000004629000-memory.dmp

        Filesize

        904KB

      • memory/4060-141-0x0000000000400000-0x00000000028BA000-memory.dmp

        Filesize

        36.7MB

      • memory/4060-136-0x0000000000000000-mapping.dmp

      • memory/4936-132-0x00000000029ED000-0x00000000029FE000-memory.dmp

        Filesize

        68KB

      • memory/4936-135-0x0000000000400000-0x00000000027E8000-memory.dmp

        Filesize

        35.9MB

      • memory/4936-134-0x0000000000400000-0x00000000027E8000-memory.dmp

        Filesize

        35.9MB

      • memory/4936-133-0x0000000002980000-0x0000000002989000-memory.dmp

        Filesize

        36KB