Analysis

  • max time kernel
    168s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 20:28

General

  • Target

    621ee658e70850994880217aa94f5ecaddea092aed3c8c0559b3a691fd3d10fe.exe

  • Size

    145KB

  • MD5

    c14678ef13cd46964aad37709243d78d

  • SHA1

    87e344bee6735eaff0d645b2a2bbee52cdc88d82

  • SHA256

    621ee658e70850994880217aa94f5ecaddea092aed3c8c0559b3a691fd3d10fe

  • SHA512

    778a8b4bdb1e1d3d5c8692212952365405b35223ad40c4824cc6d7687a0005500391d90007333b0a0cbca9c921d17f156594a8a180042990a4d642fc02bdf956

  • SSDEEP

    3072:GDLlTEGUMEK2+Np5cewHXesAfNtdJ7FGyO9m1z0avcr4fNFa:PG+K2w2XebfR5c4IaUrQDa

Malware Config

Signatures

  • Detects Smokeloader packer 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\621ee658e70850994880217aa94f5ecaddea092aed3c8c0559b3a691fd3d10fe.exe
    "C:\Users\Admin\AppData\Local\Temp\621ee658e70850994880217aa94f5ecaddea092aed3c8c0559b3a691fd3d10fe.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:5056
  • C:\Users\Admin\AppData\Roaming\uggutjc
    C:\Users\Admin\AppData\Roaming\uggutjc
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3848
  • C:\Users\Admin\AppData\Local\Temp\3592.exe
    C:\Users\Admin\AppData\Local\Temp\3592.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 13723
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 484
      2⤵
      • Program crash
      PID:4508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1256 -ip 1256
    1⤵
      PID:3344
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1000

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      3
      T1082

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\3592.exe
        Filesize

        3.6MB

        MD5

        436aca0cf4df2b5257b998af9edf9939

        SHA1

        c8f57f6f5276c0f7f4d47340d4c1901689e9bd21

        SHA256

        22b6fe769540adf92b2325e5dbb3fdce17be223d0facf0fb8d8ad5675386ec41

        SHA512

        070813ec95ba760ce33a4671b7310aded85a92501189b2a6d553d0e70e07a224a0b4919d5f1e8044196713f3d12bc147566b3fc5776b63566e358528dc6a7b84

      • C:\Users\Admin\AppData\Local\Temp\3592.exe
        Filesize

        3.6MB

        MD5

        436aca0cf4df2b5257b998af9edf9939

        SHA1

        c8f57f6f5276c0f7f4d47340d4c1901689e9bd21

        SHA256

        22b6fe769540adf92b2325e5dbb3fdce17be223d0facf0fb8d8ad5675386ec41

        SHA512

        070813ec95ba760ce33a4671b7310aded85a92501189b2a6d553d0e70e07a224a0b4919d5f1e8044196713f3d12bc147566b3fc5776b63566e358528dc6a7b84

      • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
        Filesize

        4.3MB

        MD5

        b240d148170c1f258f7b5290fc1a4ecb

        SHA1

        dea41207c49a42606075171f3d218e4a20692151

        SHA256

        76bbec2d3f11cab6460aa6bd87757fb08cff10797d2eb138de3391e7e3107ac7

        SHA512

        0aaeb7e50df75569534e1719873e15947f125a0700cba2592b56fe4657f897e53e259058c5b3ecf2afc8c6f03fe5aa8ca863bbb444fa377538db0b792a057198

      • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
        Filesize

        4.3MB

        MD5

        b240d148170c1f258f7b5290fc1a4ecb

        SHA1

        dea41207c49a42606075171f3d218e4a20692151

        SHA256

        76bbec2d3f11cab6460aa6bd87757fb08cff10797d2eb138de3391e7e3107ac7

        SHA512

        0aaeb7e50df75569534e1719873e15947f125a0700cba2592b56fe4657f897e53e259058c5b3ecf2afc8c6f03fe5aa8ca863bbb444fa377538db0b792a057198

      • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
        Filesize

        4.3MB

        MD5

        b240d148170c1f258f7b5290fc1a4ecb

        SHA1

        dea41207c49a42606075171f3d218e4a20692151

        SHA256

        76bbec2d3f11cab6460aa6bd87757fb08cff10797d2eb138de3391e7e3107ac7

        SHA512

        0aaeb7e50df75569534e1719873e15947f125a0700cba2592b56fe4657f897e53e259058c5b3ecf2afc8c6f03fe5aa8ca863bbb444fa377538db0b792a057198

      • C:\Users\Admin\AppData\Roaming\uggutjc
        Filesize

        145KB

        MD5

        c14678ef13cd46964aad37709243d78d

        SHA1

        87e344bee6735eaff0d645b2a2bbee52cdc88d82

        SHA256

        621ee658e70850994880217aa94f5ecaddea092aed3c8c0559b3a691fd3d10fe

        SHA512

        778a8b4bdb1e1d3d5c8692212952365405b35223ad40c4824cc6d7687a0005500391d90007333b0a0cbca9c921d17f156594a8a180042990a4d642fc02bdf956

      • C:\Users\Admin\AppData\Roaming\uggutjc
        Filesize

        145KB

        MD5

        c14678ef13cd46964aad37709243d78d

        SHA1

        87e344bee6735eaff0d645b2a2bbee52cdc88d82

        SHA256

        621ee658e70850994880217aa94f5ecaddea092aed3c8c0559b3a691fd3d10fe

        SHA512

        778a8b4bdb1e1d3d5c8692212952365405b35223ad40c4824cc6d7687a0005500391d90007333b0a0cbca9c921d17f156594a8a180042990a4d642fc02bdf956

      • memory/1256-149-0x0000000002960000-0x0000000002E45000-memory.dmp
        Filesize

        4.9MB

      • memory/1256-150-0x0000000000400000-0x00000000008F2000-memory.dmp
        Filesize

        4.9MB

      • memory/1256-145-0x0000000000000000-mapping.dmp
      • memory/1256-148-0x00000000025D5000-0x000000000295A000-memory.dmp
        Filesize

        3.5MB

      • memory/1256-151-0x0000000002960000-0x0000000002E45000-memory.dmp
        Filesize

        4.9MB

      • memory/1256-153-0x0000000000400000-0x00000000008F2000-memory.dmp
        Filesize

        4.9MB

      • memory/3848-143-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/3848-142-0x000000000071D000-0x000000000072E000-memory.dmp
        Filesize

        68KB

      • memory/3848-144-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/4572-167-0x0000000004390000-0x00000000044D0000-memory.dmp
        Filesize

        1.2MB

      • memory/4572-157-0x00000000024E0000-0x0000000002937000-memory.dmp
        Filesize

        4.3MB

      • memory/4572-160-0x0000000003780000-0x00000000042CD000-memory.dmp
        Filesize

        11.3MB

      • memory/4572-162-0x0000000003780000-0x00000000042CD000-memory.dmp
        Filesize

        11.3MB

      • memory/4572-152-0x0000000000000000-mapping.dmp
      • memory/4572-161-0x0000000003780000-0x00000000042CD000-memory.dmp
        Filesize

        11.3MB

      • memory/4572-172-0x0000000004409000-0x000000000440B000-memory.dmp
        Filesize

        8KB

      • memory/4572-165-0x0000000004390000-0x00000000044D0000-memory.dmp
        Filesize

        1.2MB

      • memory/4572-164-0x0000000004390000-0x00000000044D0000-memory.dmp
        Filesize

        1.2MB

      • memory/4572-168-0x0000000004390000-0x00000000044D0000-memory.dmp
        Filesize

        1.2MB

      • memory/4572-158-0x00000000024E0000-0x0000000002937000-memory.dmp
        Filesize

        4.3MB

      • memory/4572-159-0x00000000024E0000-0x0000000002937000-memory.dmp
        Filesize

        4.3MB

      • memory/4572-175-0x0000000003780000-0x00000000042CD000-memory.dmp
        Filesize

        11.3MB

      • memory/4572-163-0x0000000004390000-0x00000000044D0000-memory.dmp
        Filesize

        1.2MB

      • memory/4572-166-0x0000000004390000-0x00000000044D0000-memory.dmp
        Filesize

        1.2MB

      • memory/4928-173-0x00000000004A0000-0x0000000000736000-memory.dmp
        Filesize

        2.6MB

      • memory/4928-170-0x00000255351B0000-0x00000255352F0000-memory.dmp
        Filesize

        1.2MB

      • memory/4928-171-0x00000255351B0000-0x00000255352F0000-memory.dmp
        Filesize

        1.2MB

      • memory/4928-174-0x0000025533760000-0x0000025533A08000-memory.dmp
        Filesize

        2.7MB

      • memory/4928-169-0x00007FF647E26890-mapping.dmp
      • memory/5056-134-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/5056-132-0x000000000063D000-0x000000000064D000-memory.dmp
        Filesize

        64KB

      • memory/5056-133-0x00000000005F0000-0x00000000005F9000-memory.dmp
        Filesize

        36KB

      • memory/5056-139-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/5056-135-0x000000000063D000-0x000000000064D000-memory.dmp
        Filesize

        64KB

      • memory/5056-136-0x00000000005F0000-0x00000000005F9000-memory.dmp
        Filesize

        36KB

      • memory/5056-137-0x0000000000400000-0x000000000045A000-memory.dmp
        Filesize

        360KB

      • memory/5056-138-0x000000000063D000-0x000000000064D000-memory.dmp
        Filesize

        64KB