Analysis

  • max time kernel
    158s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:40

General

  • Target

    file.exe

  • Size

    186KB

  • MD5

    620ae5771848bc425d5d686054019ef8

  • SHA1

    c16fa58a41f6deeb94369bd9371aa7dbd91a014f

  • SHA256

    c0ace3785dd2cf1b9e8696e2e26735ba89800f8e4e1efaa8d23c058b145b04bd

  • SHA512

    65945888bf87d6e2db50b839ae49b245ce4ff5e5ddc74fbac5481b5cf59082fb46f1fc7e0b2985ea0247b9b422c3d75c482480c2bd3b306e8b63f5b860cdbbb0

  • SSDEEP

    3072:DehojATICdjLWBJa07Wyos5EO2cbybKXzOUiVRhAssmDxU:ahcSLWBJa07lwcbybMzlGhA46

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:5060
  • C:\Users\Admin\AppData\Local\Temp\B268.exe
    C:\Users\Admin\AppData\Local\Temp\B268.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:732
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp",Rrptfe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:3836
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14205
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3208
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4452
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 528
          2⤵
          • Program crash
          PID:2292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 732 -ip 732
        1⤵
          PID:4356
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:1728

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\B268.exe

            Filesize

            1.0MB

            MD5

            fa2a659cad814b52712b6a6da9cb2bdd

            SHA1

            35727a7a482ce7a0195ae029be8e27483d4fe6ab

            SHA256

            a24f5e85bee0d0f377bbd985eaf2618e676bc7528cf1a3746f3e54f7953aee45

            SHA512

            d471d7617deb3b0e3554b315bcca47278d01dd99a46cf0d78c85e140c725db3a1936e209dbc990e73e6708447e6cfe0e6eac5761ffb39363591d1d37e316c963

          • C:\Users\Admin\AppData\Local\Temp\B268.exe

            Filesize

            1.0MB

            MD5

            fa2a659cad814b52712b6a6da9cb2bdd

            SHA1

            35727a7a482ce7a0195ae029be8e27483d4fe6ab

            SHA256

            a24f5e85bee0d0f377bbd985eaf2618e676bc7528cf1a3746f3e54f7953aee45

            SHA512

            d471d7617deb3b0e3554b315bcca47278d01dd99a46cf0d78c85e140c725db3a1936e209dbc990e73e6708447e6cfe0e6eac5761ffb39363591d1d37e316c963

          • C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp

            Filesize

            774KB

            MD5

            d5e88f35e214f2dff51a7d494316bac2

            SHA1

            6306dfa71c4e32dede210631cf90732693c0afcf

            SHA256

            f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

            SHA512

            ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

          • C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp

            Filesize

            774KB

            MD5

            d5e88f35e214f2dff51a7d494316bac2

            SHA1

            6306dfa71c4e32dede210631cf90732693c0afcf

            SHA256

            f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

            SHA512

            ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

          • memory/732-141-0x0000000000400000-0x000000000071E000-memory.dmp

            Filesize

            3.1MB

          • memory/732-136-0x0000000000000000-mapping.dmp

          • memory/732-139-0x0000000002370000-0x0000000002452000-memory.dmp

            Filesize

            904KB

          • memory/732-140-0x0000000002560000-0x0000000002685000-memory.dmp

            Filesize

            1.1MB

          • memory/732-145-0x0000000000400000-0x000000000071E000-memory.dmp

            Filesize

            3.1MB

          • memory/3208-156-0x000001EA47D70000-0x000001EA47EB0000-memory.dmp

            Filesize

            1.2MB

          • memory/3208-154-0x00007FF725F36890-mapping.dmp

          • memory/3208-155-0x000001EA47D70000-0x000001EA47EB0000-memory.dmp

            Filesize

            1.2MB

          • memory/3208-157-0x0000000000070000-0x0000000000302000-memory.dmp

            Filesize

            2.6MB

          • memory/3208-158-0x000001EA464B0000-0x000001EA46754000-memory.dmp

            Filesize

            2.6MB

          • memory/3836-146-0x00000000052F0000-0x0000000005E51000-memory.dmp

            Filesize

            11.4MB

          • memory/3836-153-0x0000000004A40000-0x0000000004B80000-memory.dmp

            Filesize

            1.2MB

          • memory/3836-148-0x0000000004A40000-0x0000000004B80000-memory.dmp

            Filesize

            1.2MB

          • memory/3836-149-0x0000000004A40000-0x0000000004B80000-memory.dmp

            Filesize

            1.2MB

          • memory/3836-150-0x0000000004A40000-0x0000000004B80000-memory.dmp

            Filesize

            1.2MB

          • memory/3836-151-0x0000000004A40000-0x0000000004B80000-memory.dmp

            Filesize

            1.2MB

          • memory/3836-152-0x0000000004A40000-0x0000000004B80000-memory.dmp

            Filesize

            1.2MB

          • memory/3836-147-0x00000000052F0000-0x0000000005E51000-memory.dmp

            Filesize

            11.4MB

          • memory/3836-159-0x00000000052F0000-0x0000000005E51000-memory.dmp

            Filesize

            11.4MB

          • memory/3836-142-0x0000000000000000-mapping.dmp

          • memory/4452-160-0x0000000000000000-mapping.dmp

          • memory/4564-161-0x0000000000000000-mapping.dmp

          • memory/5060-135-0x0000000000400000-0x000000000064C000-memory.dmp

            Filesize

            2.3MB

          • memory/5060-134-0x0000000000400000-0x000000000064C000-memory.dmp

            Filesize

            2.3MB

          • memory/5060-133-0x0000000000710000-0x0000000000719000-memory.dmp

            Filesize

            36KB

          • memory/5060-132-0x000000000076D000-0x000000000077E000-memory.dmp

            Filesize

            68KB