Analysis

  • max time kernel
    150s
  • max time network
    106s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-12-2022 04:31

General

  • Target

    c68c67eef80ea7562cd171bf1fb6d490ecd6792ce2bd7024cbd9e033ac903250.exe

  • Size

    273KB

  • MD5

    53d204a62546fa06daf4a00bb2bbaa07

  • SHA1

    6b1a911774a3140a74affbbd71b83913df3abf44

  • SHA256

    c68c67eef80ea7562cd171bf1fb6d490ecd6792ce2bd7024cbd9e033ac903250

  • SHA512

    d681217c28fa3aef0a7ec3195a909182f98ebe3cd5ef1ad330a32412838cd903f2e44b6812f94ce251e57c0b31c3d3ef37b5ec5dffe3098ec80bec1f3d6837b9

  • SSDEEP

    3072:86XVFWYw4VlTIyXVIWR5F9Fn99Lr7ddN/TWoQYiVRvJTcpuqGZj0sqYgV2qs64j:8a/EyXVxpDvZqoQYIDcAqMoVS

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c68c67eef80ea7562cd171bf1fb6d490ecd6792ce2bd7024cbd9e033ac903250.exe
    "C:\Users\Admin\AppData\Local\Temp\c68c67eef80ea7562cd171bf1fb6d490ecd6792ce2bd7024cbd9e033ac903250.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2108
  • C:\Users\Admin\AppData\Local\Temp\251C.exe
    C:\Users\Admin\AppData\Local\Temp\251C.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp",Qiysidaatietut
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4224
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17207
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3148
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:5000
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:1160
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4828

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        3
        T1012

        System Information Discovery

        3
        T1082

        Peripheral Device Discovery

        1
        T1120

        Collection

        Data from Local System

        1
        T1005

        Email Collection

        2
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\251C.exe
          Filesize

          1.1MB

          MD5

          c9d86b8af2b6aa83f5ab8698b4dac416

          SHA1

          c0f65732321e8512b4b7096ba827a2920106968e

          SHA256

          209623f82b569fb476fdef4b1b84b253fd7b224ec5161867e134783a1ae30740

          SHA512

          eeca416617d692d788fba0042a1bc1477a5783d88f6621f159a49644ac718faac7392845c226ad43aed2310c73445bcd7765874579d3d17acdaa36bfdc0a9a15

        • C:\Users\Admin\AppData\Local\Temp\251C.exe
          Filesize

          1.1MB

          MD5

          c9d86b8af2b6aa83f5ab8698b4dac416

          SHA1

          c0f65732321e8512b4b7096ba827a2920106968e

          SHA256

          209623f82b569fb476fdef4b1b84b253fd7b224ec5161867e134783a1ae30740

          SHA512

          eeca416617d692d788fba0042a1bc1477a5783d88f6621f159a49644ac718faac7392845c226ad43aed2310c73445bcd7765874579d3d17acdaa36bfdc0a9a15

        • C:\Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp
          Filesize

          768KB

          MD5

          96655ec3277ef2e9ea4b5723f60f5b04

          SHA1

          b29e9005cedc5e0d63981e59b05a12f006bd8640

          SHA256

          36cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d

          SHA512

          cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c

        • \Users\Admin\AppData\Local\Temp\Eshwsfeuryqqffi.tmp
          Filesize

          768KB

          MD5

          96655ec3277ef2e9ea4b5723f60f5b04

          SHA1

          b29e9005cedc5e0d63981e59b05a12f006bd8640

          SHA256

          36cb491e91dc40d4a24f25944c5dca41195e1e7eb9788028f72e38b08789616d

          SHA512

          cb151e071426cba0ec433b4ff8b173a9e07fc922e2b9d9d9359bcd5367a79e5bb996e8afbbfe4dd11bde1a33724b7f70479ac248762f5c9d17f3e0d7d67c151c

        • memory/1116-185-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-181-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-161-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-210-0x0000000000400000-0x0000000000531000-memory.dmp
          Filesize

          1.2MB

        • memory/1116-190-0x0000000000400000-0x0000000000531000-memory.dmp
          Filesize

          1.2MB

        • memory/1116-195-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-194-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-193-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-192-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-191-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-189-0x0000000002320000-0x0000000002440000-memory.dmp
          Filesize

          1.1MB

        • memory/1116-188-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-186-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-187-0x0000000002120000-0x0000000002206000-memory.dmp
          Filesize

          920KB

        • memory/1116-184-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-166-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-183-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-182-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-180-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-162-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-179-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-178-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-177-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-174-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-175-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-173-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-172-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-169-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-171-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-170-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-165-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-163-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-168-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-158-0x0000000000000000-mapping.dmp
        • memory/1116-164-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1116-160-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/1160-371-0x0000000000000000-mapping.dmp
        • memory/2108-147-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-139-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-124-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-156-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-157-0x0000000000400000-0x0000000000462000-memory.dmp
          Filesize

          392KB

        • memory/2108-141-0x00000000005C0000-0x000000000070A000-memory.dmp
          Filesize

          1.3MB

        • memory/2108-155-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-153-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-154-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-152-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-151-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-150-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-149-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-148-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-146-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-125-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-145-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-143-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-144-0x0000000000400000-0x0000000000462000-memory.dmp
          Filesize

          392KB

        • memory/2108-142-0x0000000000590000-0x0000000000599000-memory.dmp
          Filesize

          36KB

        • memory/2108-140-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-123-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-120-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-138-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-137-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-136-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-134-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-133-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-132-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-131-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-130-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-129-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-127-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-126-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-128-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-122-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/2108-121-0x00000000779E0000-0x0000000077B6E000-memory.dmp
          Filesize

          1.6MB

        • memory/3148-316-0x00007FF6E4105FD0-mapping.dmp
        • memory/3148-322-0x0000022F7D540000-0x0000022F7D7E5000-memory.dmp
          Filesize

          2.6MB

        • memory/3148-321-0x00000000000E0000-0x0000000000373000-memory.dmp
          Filesize

          2.6MB

        • memory/4224-307-0x0000000006660000-0x00000000071C2000-memory.dmp
          Filesize

          11.4MB

        • memory/4224-341-0x0000000006660000-0x00000000071C2000-memory.dmp
          Filesize

          11.4MB

        • memory/4224-206-0x0000000000000000-mapping.dmp
        • memory/5000-353-0x0000000000000000-mapping.dmp