Analysis

  • max time kernel
    158s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:22

General

  • Target

    2ec66b67ec0734dbf1048b2f71a969e5915deeefc75aea61a91e079fc5720eaa.exe

  • Size

    186KB

  • MD5

    20265014ad062dbae27ff0398b9f1cc6

  • SHA1

    2bb048c1aeed663031b3056019f9cd543f7a9edc

  • SHA256

    2ec66b67ec0734dbf1048b2f71a969e5915deeefc75aea61a91e079fc5720eaa

  • SHA512

    e87415a86b797c4a59e1d07b774b6354361a9db5e79c0fdd9c59bbe418bcf31a2a0f9f6fff1326b99ed0992ce53952a1d5fba49f2a33a0c8a71849863b1aab96

  • SSDEEP

    3072:oDuvOZCRgdLRzZRvWFJO5BzbGdeAnGv1hB8ZlPDzS2fKpKN:euh4LRltuOnkGNhB8LPXS2fCK

Malware Config

Signatures

  • Detects Smokeloader packer 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ec66b67ec0734dbf1048b2f71a969e5915deeefc75aea61a91e079fc5720eaa.exe
    "C:\Users\Admin\AppData\Local\Temp\2ec66b67ec0734dbf1048b2f71a969e5915deeefc75aea61a91e079fc5720eaa.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4460
  • C:\Users\Admin\AppData\Local\Temp\81C3.exe
    C:\Users\Admin\AppData\Local\Temp\81C3.exe
    1⤵
    • Executes dropped EXE
    PID:2116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 436
      2⤵
      • Program crash
      PID:4504
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2116 -ip 2116
    1⤵
      PID:5000
    • C:\Users\Admin\AppData\Local\Temp\CA85.exe
      C:\Users\Admin\AppData\Local\Temp\CA85.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
      • C:\Users\Admin\AppData\Local\Temp\CA85.exe
        C:\Users\Admin\AppData\Local\Temp\CA85.exe
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:2104
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:4420
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:4436
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:2432
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:5088
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:716
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:2588
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:2776
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:4108
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:4596

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\81C3.exe

                        Filesize

                        1.0MB

                        MD5

                        fc78f5650188734808f725d0934650a1

                        SHA1

                        e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000

                        SHA256

                        319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a

                        SHA512

                        d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0

                      • C:\Users\Admin\AppData\Local\Temp\81C3.exe

                        Filesize

                        1.0MB

                        MD5

                        fc78f5650188734808f725d0934650a1

                        SHA1

                        e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000

                        SHA256

                        319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a

                        SHA512

                        d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0

                      • C:\Users\Admin\AppData\Local\Temp\CA85.exe

                        Filesize

                        6KB

                        MD5

                        1fa7079d26058ea034b51f04938b4f44

                        SHA1

                        2cccd49d886cdfcd80da806971962d93b6eeaf45

                        SHA256

                        19c00af81f362be665658f611e54d1a6e460bcdde64a15e3db3910841374e2a0

                        SHA512

                        43053b5d324b61ac922a38b8991511e21a9cdcea6e240720e7ec01f122dea06194efdb29a2e4c6b6628bfadbc7ff7846b0a324b6b5472d1501094e3dbae24f46

                      • C:\Users\Admin\AppData\Local\Temp\CA85.exe

                        Filesize

                        6KB

                        MD5

                        1fa7079d26058ea034b51f04938b4f44

                        SHA1

                        2cccd49d886cdfcd80da806971962d93b6eeaf45

                        SHA256

                        19c00af81f362be665658f611e54d1a6e460bcdde64a15e3db3910841374e2a0

                        SHA512

                        43053b5d324b61ac922a38b8991511e21a9cdcea6e240720e7ec01f122dea06194efdb29a2e4c6b6628bfadbc7ff7846b0a324b6b5472d1501094e3dbae24f46

                      • C:\Users\Admin\AppData\Local\Temp\CA85.exe

                        Filesize

                        6KB

                        MD5

                        1fa7079d26058ea034b51f04938b4f44

                        SHA1

                        2cccd49d886cdfcd80da806971962d93b6eeaf45

                        SHA256

                        19c00af81f362be665658f611e54d1a6e460bcdde64a15e3db3910841374e2a0

                        SHA512

                        43053b5d324b61ac922a38b8991511e21a9cdcea6e240720e7ec01f122dea06194efdb29a2e4c6b6628bfadbc7ff7846b0a324b6b5472d1501094e3dbae24f46

                      • memory/716-170-0x0000000000A90000-0x0000000000AB7000-memory.dmp

                        Filesize

                        156KB

                      • memory/716-168-0x0000000000AC0000-0x0000000000AE2000-memory.dmp

                        Filesize

                        136KB

                      • memory/716-167-0x0000000000000000-mapping.dmp

                      • memory/716-190-0x0000000000AC0000-0x0000000000AE2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2104-194-0x0000000000400000-0x0000000000409000-memory.dmp

                        Filesize

                        36KB

                      • memory/2104-184-0x0000000000000000-mapping.dmp

                      • memory/2104-185-0x0000000000400000-0x0000000000409000-memory.dmp

                        Filesize

                        36KB

                      • memory/2104-188-0x0000000000400000-0x0000000000409000-memory.dmp

                        Filesize

                        36KB

                      • memory/2116-137-0x0000000000000000-mapping.dmp

                      • memory/2324-140-0x0000000000000000-mapping.dmp

                      • memory/2324-146-0x0000000006340000-0x0000000006362000-memory.dmp

                        Filesize

                        136KB

                      • memory/2324-145-0x00000000068C0000-0x0000000006E64000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2324-144-0x0000000006270000-0x0000000006302000-memory.dmp

                        Filesize

                        584KB

                      • memory/2324-143-0x0000000000B10000-0x0000000000B18000-memory.dmp

                        Filesize

                        32KB

                      • memory/2432-187-0x0000000000850000-0x0000000000855000-memory.dmp

                        Filesize

                        20KB

                      • memory/2432-163-0x0000000000840000-0x0000000000849000-memory.dmp

                        Filesize

                        36KB

                      • memory/2432-162-0x0000000000850000-0x0000000000855000-memory.dmp

                        Filesize

                        20KB

                      • memory/2432-161-0x0000000000000000-mapping.dmp

                      • memory/2588-172-0x0000000001450000-0x0000000001455000-memory.dmp

                        Filesize

                        20KB

                      • memory/2588-191-0x0000000001450000-0x0000000001455000-memory.dmp

                        Filesize

                        20KB

                      • memory/2588-169-0x0000000000000000-mapping.dmp

                      • memory/2588-173-0x0000000001440000-0x0000000001449000-memory.dmp

                        Filesize

                        36KB

                      • memory/2776-171-0x0000000000000000-mapping.dmp

                      • memory/2776-192-0x0000000000CB0000-0x0000000000CB6000-memory.dmp

                        Filesize

                        24KB

                      • memory/2776-174-0x0000000000CA0000-0x0000000000CAB000-memory.dmp

                        Filesize

                        44KB

                      • memory/2776-176-0x0000000000CB0000-0x0000000000CB6000-memory.dmp

                        Filesize

                        24KB

                      • memory/2968-148-0x00000000025F0000-0x0000000002626000-memory.dmp

                        Filesize

                        216KB

                      • memory/2968-153-0x00000000071F0000-0x000000000786A000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/2968-147-0x0000000000000000-mapping.dmp

                      • memory/2968-149-0x0000000004E30000-0x0000000005458000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/2968-150-0x0000000004D90000-0x0000000004DF6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2968-151-0x0000000005590000-0x00000000055F6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2968-152-0x0000000005BC0000-0x0000000005BDE000-memory.dmp

                        Filesize

                        120KB

                      • memory/2968-154-0x00000000060D0000-0x00000000060EA000-memory.dmp

                        Filesize

                        104KB

                      • memory/4108-193-0x0000000000DF0000-0x0000000000DF7000-memory.dmp

                        Filesize

                        28KB

                      • memory/4108-178-0x0000000000DE0000-0x0000000000DED000-memory.dmp

                        Filesize

                        52KB

                      • memory/4108-177-0x0000000000DF0000-0x0000000000DF7000-memory.dmp

                        Filesize

                        28KB

                      • memory/4108-175-0x0000000000000000-mapping.dmp

                      • memory/4420-156-0x00000000006F0000-0x00000000006F7000-memory.dmp

                        Filesize

                        28KB

                      • memory/4420-155-0x0000000000000000-mapping.dmp

                      • memory/4420-182-0x00000000006F0000-0x00000000006F7000-memory.dmp

                        Filesize

                        28KB

                      • memory/4420-157-0x00000000006E0000-0x00000000006EB000-memory.dmp

                        Filesize

                        44KB

                      • memory/4436-183-0x0000000000120000-0x0000000000129000-memory.dmp

                        Filesize

                        36KB

                      • memory/4436-158-0x0000000000000000-mapping.dmp

                      • memory/4436-159-0x0000000000120000-0x0000000000129000-memory.dmp

                        Filesize

                        36KB

                      • memory/4436-160-0x0000000000110000-0x000000000011F000-memory.dmp

                        Filesize

                        60KB

                      • memory/4460-133-0x0000000000650000-0x0000000000750000-memory.dmp

                        Filesize

                        1024KB

                      • memory/4460-134-0x0000000002380000-0x0000000002389000-memory.dmp

                        Filesize

                        36KB

                      • memory/4460-135-0x0000000000400000-0x000000000064C000-memory.dmp

                        Filesize

                        2.3MB

                      • memory/4460-136-0x0000000000400000-0x000000000064C000-memory.dmp

                        Filesize

                        2.3MB

                      • memory/4596-181-0x0000000001440000-0x000000000144B000-memory.dmp

                        Filesize

                        44KB

                      • memory/4596-180-0x0000000001450000-0x0000000001458000-memory.dmp

                        Filesize

                        32KB

                      • memory/4596-179-0x0000000000000000-mapping.dmp

                      • memory/4596-195-0x0000000001450000-0x0000000001458000-memory.dmp

                        Filesize

                        32KB

                      • memory/5088-189-0x0000000000F80000-0x0000000000F86000-memory.dmp

                        Filesize

                        24KB

                      • memory/5088-166-0x0000000000F70000-0x0000000000F7C000-memory.dmp

                        Filesize

                        48KB

                      • memory/5088-164-0x0000000000000000-mapping.dmp

                      • memory/5088-165-0x0000000000F80000-0x0000000000F86000-memory.dmp

                        Filesize

                        24KB