Analysis

  • max time kernel
    151s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 21:14

General

  • Target

    14a10fc4f2e38e3581b570c2cdc82fbdc084110d8849fee3161ac009ebd5baf3.exe

  • Size

    148KB

  • MD5

    3ed4b941f32af8f49c6d909298b7b905

  • SHA1

    1f6a142ea388e789d6624eccf9adf57876bf461d

  • SHA256

    14a10fc4f2e38e3581b570c2cdc82fbdc084110d8849fee3161ac009ebd5baf3

  • SHA512

    e1c1ff2f9ca9a88967ce777689aebe522832637cfc9e6567d5e55a549c40e47dcdcd7641fd1af6388994a21dcd7aaa04546dd329411cea9753f0a655b224c625

  • SSDEEP

    3072:1oCEa2RDyk0mn5VBOPdycwFkIR6CUk8EyOhYQq1M:7sDyk0qOPSkIEsyO3h

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14a10fc4f2e38e3581b570c2cdc82fbdc084110d8849fee3161ac009ebd5baf3.exe
    "C:\Users\Admin\AppData\Local\Temp\14a10fc4f2e38e3581b570c2cdc82fbdc084110d8849fee3161ac009ebd5baf3.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4872
  • C:\Users\Admin\AppData\Local\Temp\7EA6.exe
    C:\Users\Admin\AppData\Local\Temp\7EA6.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4360
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 13736
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4336
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:620
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:628
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 512
          2⤵
          • Program crash
          PID:1832
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1580 -ip 1580
        1⤵
          PID:4432
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:3956

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Defense Evasion

          Modify Registry

          1
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          Query Registry

          3
          T1012

          System Information Discovery

          3
          T1082

          Peripheral Device Discovery

          1
          T1120

          Collection

          Data from Local System

          1
          T1005

          Email Collection

          2
          T1114

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\7EA6.exe
            Filesize

            3.6MB

            MD5

            93628d556ca270cc82b312cbb50be70f

            SHA1

            f44aa3096bcdb8fdd4bc2a2e38e1f1d1d5e659a5

            SHA256

            0e46c94d2f6efcb74d42cbb7e8ec9736d62ab8b7d83caaa0a449122d169d3029

            SHA512

            b256386f6f7414a49069d03e52b07b93fb5864a618e07ecb65ea68ee4a282f22c254340ba73e7e11221eb7ad742ea4d78c0b036007fecd955f7d12c6ebfe28b9

          • C:\Users\Admin\AppData\Local\Temp\7EA6.exe
            Filesize

            3.6MB

            MD5

            93628d556ca270cc82b312cbb50be70f

            SHA1

            f44aa3096bcdb8fdd4bc2a2e38e1f1d1d5e659a5

            SHA256

            0e46c94d2f6efcb74d42cbb7e8ec9736d62ab8b7d83caaa0a449122d169d3029

            SHA512

            b256386f6f7414a49069d03e52b07b93fb5864a618e07ecb65ea68ee4a282f22c254340ba73e7e11221eb7ad742ea4d78c0b036007fecd955f7d12c6ebfe28b9

          • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
            Filesize

            4.3MB

            MD5

            dc71f028e12eeb89222feb8c7be3a2c9

            SHA1

            0e8e1ae90f79f5bacae03aff545c983c27288b11

            SHA256

            24e9acae07b99e759d6a5d0465703623de5d1308809126ee423450768da876b5

            SHA512

            04f24f773cba8376e0e217a56d364c1fbb528ccfa8a39e6fd1ae78284889121831c90e3bfb3d4b8ffb1a3fbd24ef324a9d0e74447c632b0e6ed7ec8d03a13b15

          • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
            Filesize

            4.3MB

            MD5

            dc71f028e12eeb89222feb8c7be3a2c9

            SHA1

            0e8e1ae90f79f5bacae03aff545c983c27288b11

            SHA256

            24e9acae07b99e759d6a5d0465703623de5d1308809126ee423450768da876b5

            SHA512

            04f24f773cba8376e0e217a56d364c1fbb528ccfa8a39e6fd1ae78284889121831c90e3bfb3d4b8ffb1a3fbd24ef324a9d0e74447c632b0e6ed7ec8d03a13b15

          • C:\Users\Admin\AppData\Local\Temp\Serpodtudpwhhta.dll
            Filesize

            4.3MB

            MD5

            dc71f028e12eeb89222feb8c7be3a2c9

            SHA1

            0e8e1ae90f79f5bacae03aff545c983c27288b11

            SHA256

            24e9acae07b99e759d6a5d0465703623de5d1308809126ee423450768da876b5

            SHA512

            04f24f773cba8376e0e217a56d364c1fbb528ccfa8a39e6fd1ae78284889121831c90e3bfb3d4b8ffb1a3fbd24ef324a9d0e74447c632b0e6ed7ec8d03a13b15

          • memory/620-164-0x0000000000000000-mapping.dmp
          • memory/628-166-0x0000000000000000-mapping.dmp
          • memory/1580-148-0x0000000000400000-0x00000000008F2000-memory.dmp
            Filesize

            4.9MB

          • memory/1580-140-0x0000000002A90000-0x0000000002F75000-memory.dmp
            Filesize

            4.9MB

          • memory/1580-141-0x0000000000400000-0x00000000008F2000-memory.dmp
            Filesize

            4.9MB

          • memory/1580-139-0x0000000002708000-0x0000000002A8D000-memory.dmp
            Filesize

            3.5MB

          • memory/1580-136-0x0000000000000000-mapping.dmp
          • memory/4336-163-0x0000023E4BF20000-0x0000023E4C1C8000-memory.dmp
            Filesize

            2.7MB

          • memory/4336-162-0x0000000000A40000-0x0000000000CD6000-memory.dmp
            Filesize

            2.6MB

          • memory/4336-161-0x0000023E4D7E0000-0x0000023E4D920000-memory.dmp
            Filesize

            1.2MB

          • memory/4336-160-0x0000023E4D7E0000-0x0000023E4D920000-memory.dmp
            Filesize

            1.2MB

          • memory/4336-159-0x00007FF6E7146890-mapping.dmp
          • memory/4360-152-0x00000000038A0000-0x00000000043ED000-memory.dmp
            Filesize

            11.3MB

          • memory/4360-158-0x00000000044B0000-0x00000000045F0000-memory.dmp
            Filesize

            1.2MB

          • memory/4360-151-0x00000000038A0000-0x00000000043ED000-memory.dmp
            Filesize

            11.3MB

          • memory/4360-149-0x0000000002400000-0x0000000002857000-memory.dmp
            Filesize

            4.3MB

          • memory/4360-154-0x00000000044B0000-0x00000000045F0000-memory.dmp
            Filesize

            1.2MB

          • memory/4360-153-0x00000000044B0000-0x00000000045F0000-memory.dmp
            Filesize

            1.2MB

          • memory/4360-155-0x00000000044B0000-0x00000000045F0000-memory.dmp
            Filesize

            1.2MB

          • memory/4360-156-0x00000000044B0000-0x00000000045F0000-memory.dmp
            Filesize

            1.2MB

          • memory/4360-157-0x00000000044B0000-0x00000000045F0000-memory.dmp
            Filesize

            1.2MB

          • memory/4360-150-0x00000000038A0000-0x00000000043ED000-memory.dmp
            Filesize

            11.3MB

          • memory/4360-165-0x00000000038A0000-0x00000000043ED000-memory.dmp
            Filesize

            11.3MB

          • memory/4360-147-0x0000000002400000-0x0000000002857000-memory.dmp
            Filesize

            4.3MB

          • memory/4360-146-0x0000000002400000-0x0000000002857000-memory.dmp
            Filesize

            4.3MB

          • memory/4360-142-0x0000000000000000-mapping.dmp
          • memory/4872-135-0x0000000000400000-0x0000000000AD7000-memory.dmp
            Filesize

            6.8MB

          • memory/4872-134-0x0000000000400000-0x0000000000AD7000-memory.dmp
            Filesize

            6.8MB

          • memory/4872-132-0x0000000000C9E000-0x0000000000CAF000-memory.dmp
            Filesize

            68KB

          • memory/4872-133-0x0000000000C70000-0x0000000000C79000-memory.dmp
            Filesize

            36KB