Analysis

  • max time kernel
    151s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 21:48

General

  • Target

    4dc0de570728f75f844c7afb84ac6c809ef4620dac3b12a884ff9916f5b5b0ee.exe

  • Size

    146KB

  • MD5

    1cf06beb83d2bd1afd1b9b62994e7549

  • SHA1

    88bd7da7668fb669b5503696ee0a9c0f2dbeceb7

  • SHA256

    4dc0de570728f75f844c7afb84ac6c809ef4620dac3b12a884ff9916f5b5b0ee

  • SHA512

    79196551edcb7850817c3132971d25423bd6861849e21926e03647b0d4ee76d3ee7cbe456c78d046167f196991e3d286c393a8abc22e8218ed148bc90090ffd9

  • SSDEEP

    3072:TD+CPq0Ubn6u2DUp5Gcw2FPOXDMMMMfq2SQw7Se1Ei4KY+NzfOFV:W0qln6u2I8q25wV4V+NzcV

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 27 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dc0de570728f75f844c7afb84ac6c809ef4620dac3b12a884ff9916f5b5b0ee.exe
    "C:\Users\Admin\AppData\Local\Temp\4dc0de570728f75f844c7afb84ac6c809ef4620dac3b12a884ff9916f5b5b0ee.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:988
  • C:\Users\Admin\AppData\Local\Temp\2422.exe
    C:\Users\Admin\AppData\Local\Temp\2422.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 13723
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 488
      2⤵
      • Program crash
      PID:2064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2212 -ip 2212
    1⤵
      PID:4228
    • C:\Users\Admin\AppData\Roaming\subftwh
      C:\Users\Admin\AppData\Roaming\subftwh
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:2304
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4140

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      3
      T1082

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\2422.exe
        Filesize

        3.6MB

        MD5

        93628d556ca270cc82b312cbb50be70f

        SHA1

        f44aa3096bcdb8fdd4bc2a2e38e1f1d1d5e659a5

        SHA256

        0e46c94d2f6efcb74d42cbb7e8ec9736d62ab8b7d83caaa0a449122d169d3029

        SHA512

        b256386f6f7414a49069d03e52b07b93fb5864a618e07ecb65ea68ee4a282f22c254340ba73e7e11221eb7ad742ea4d78c0b036007fecd955f7d12c6ebfe28b9

      • C:\Users\Admin\AppData\Local\Temp\2422.exe
        Filesize

        3.6MB

        MD5

        93628d556ca270cc82b312cbb50be70f

        SHA1

        f44aa3096bcdb8fdd4bc2a2e38e1f1d1d5e659a5

        SHA256

        0e46c94d2f6efcb74d42cbb7e8ec9736d62ab8b7d83caaa0a449122d169d3029

        SHA512

        b256386f6f7414a49069d03e52b07b93fb5864a618e07ecb65ea68ee4a282f22c254340ba73e7e11221eb7ad742ea4d78c0b036007fecd955f7d12c6ebfe28b9

      • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
        Filesize

        4.3MB

        MD5

        fd972945c722a6cbbfc782c58ac83d2b

        SHA1

        9de079611a76f7007788227503862be7bb069a01

        SHA256

        5a2009309f9b07b9e1b5331347d4413a7aed706e73be3a57ab1dfd60f04ffbc7

        SHA512

        1a8c599cfaba426c893eef1cdc1d1063b4c0856c8a5752a256c7631c51c4f294f4c8098aebdc75b20f354dfc88a83c3796ae2eb5406d18dd64b3776430e76068

      • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
        Filesize

        4.3MB

        MD5

        fd972945c722a6cbbfc782c58ac83d2b

        SHA1

        9de079611a76f7007788227503862be7bb069a01

        SHA256

        5a2009309f9b07b9e1b5331347d4413a7aed706e73be3a57ab1dfd60f04ffbc7

        SHA512

        1a8c599cfaba426c893eef1cdc1d1063b4c0856c8a5752a256c7631c51c4f294f4c8098aebdc75b20f354dfc88a83c3796ae2eb5406d18dd64b3776430e76068

      • C:\Users\Admin\AppData\Roaming\subftwh
        Filesize

        146KB

        MD5

        1cf06beb83d2bd1afd1b9b62994e7549

        SHA1

        88bd7da7668fb669b5503696ee0a9c0f2dbeceb7

        SHA256

        4dc0de570728f75f844c7afb84ac6c809ef4620dac3b12a884ff9916f5b5b0ee

        SHA512

        79196551edcb7850817c3132971d25423bd6861849e21926e03647b0d4ee76d3ee7cbe456c78d046167f196991e3d286c393a8abc22e8218ed148bc90090ffd9

      • C:\Users\Admin\AppData\Roaming\subftwh
        Filesize

        146KB

        MD5

        1cf06beb83d2bd1afd1b9b62994e7549

        SHA1

        88bd7da7668fb669b5503696ee0a9c0f2dbeceb7

        SHA256

        4dc0de570728f75f844c7afb84ac6c809ef4620dac3b12a884ff9916f5b5b0ee

        SHA512

        79196551edcb7850817c3132971d25423bd6861849e21926e03647b0d4ee76d3ee7cbe456c78d046167f196991e3d286c393a8abc22e8218ed148bc90090ffd9

      • memory/808-164-0x0000018DB8910000-0x0000018DB8BB8000-memory.dmp
        Filesize

        2.7MB

      • memory/808-163-0x0000000000580000-0x0000000000816000-memory.dmp
        Filesize

        2.6MB

      • memory/808-161-0x0000018DBA360000-0x0000018DBA4A0000-memory.dmp
        Filesize

        1.2MB

      • memory/808-160-0x0000018DBA360000-0x0000018DBA4A0000-memory.dmp
        Filesize

        1.2MB

      • memory/808-159-0x00007FF6CE666890-mapping.dmp
      • memory/988-136-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/988-135-0x00000000006AD000-0x00000000006BE000-memory.dmp
        Filesize

        68KB

      • memory/988-132-0x00000000006AD000-0x00000000006BE000-memory.dmp
        Filesize

        68KB

      • memory/988-134-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/988-133-0x0000000002050000-0x0000000002059000-memory.dmp
        Filesize

        36KB

      • memory/1876-150-0x0000000003ED0000-0x0000000004A1D000-memory.dmp
        Filesize

        11.3MB

      • memory/1876-155-0x0000000004AE0000-0x0000000004C20000-memory.dmp
        Filesize

        1.2MB

      • memory/1876-169-0x0000000003ED0000-0x0000000004A1D000-memory.dmp
        Filesize

        11.3MB

      • memory/1876-151-0x0000000003ED0000-0x0000000004A1D000-memory.dmp
        Filesize

        11.3MB

      • memory/1876-152-0x0000000003ED0000-0x0000000004A1D000-memory.dmp
        Filesize

        11.3MB

      • memory/1876-153-0x0000000004AE0000-0x0000000004C20000-memory.dmp
        Filesize

        1.2MB

      • memory/1876-154-0x0000000004AE0000-0x0000000004C20000-memory.dmp
        Filesize

        1.2MB

      • memory/1876-162-0x0000000004B59000-0x0000000004B5B000-memory.dmp
        Filesize

        8KB

      • memory/1876-156-0x0000000004AE0000-0x0000000004C20000-memory.dmp
        Filesize

        1.2MB

      • memory/1876-157-0x0000000004AE0000-0x0000000004C20000-memory.dmp
        Filesize

        1.2MB

      • memory/1876-158-0x0000000004AE0000-0x0000000004C20000-memory.dmp
        Filesize

        1.2MB

      • memory/1876-149-0x0000000000400000-0x0000000000857000-memory.dmp
        Filesize

        4.3MB

      • memory/1876-146-0x0000000000400000-0x0000000000857000-memory.dmp
        Filesize

        4.3MB

      • memory/1876-143-0x0000000000000000-mapping.dmp
      • memory/2212-147-0x00000000029F0000-0x0000000002ED5000-memory.dmp
        Filesize

        4.9MB

      • memory/2212-142-0x0000000000400000-0x00000000008F2000-memory.dmp
        Filesize

        4.9MB

      • memory/2212-141-0x00000000029F0000-0x0000000002ED5000-memory.dmp
        Filesize

        4.9MB

      • memory/2212-140-0x0000000002667000-0x00000000029EC000-memory.dmp
        Filesize

        3.5MB

      • memory/2212-137-0x0000000000000000-mapping.dmp
      • memory/2212-148-0x0000000000400000-0x00000000008F2000-memory.dmp
        Filesize

        4.9MB

      • memory/2304-167-0x000000000049D000-0x00000000004AE000-memory.dmp
        Filesize

        68KB

      • memory/2304-168-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/2304-170-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB