Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2022 20:11

General

  • Target

    e73ca8ae1135189de67f9cc132ab43578c3d34141f080eb936e6aab82c0cf021.exe

  • Size

    316KB

  • MD5

    c699ec8c7082761b49bdb613c2a96728

  • SHA1

    f8f1618417446712d6609615f2832757fbc17222

  • SHA256

    e73ca8ae1135189de67f9cc132ab43578c3d34141f080eb936e6aab82c0cf021

  • SHA512

    c7788205afac4f2e6b397d40ca86e16506f4b9b4c6c32e6d96a9bbed7f7f7944c2c4a2dba0d1a426253deb79287d1967126d3d8ac190c56f28b82a67255f0873

  • SSDEEP

    6144:vI9LAP/wIoWfpTESxuCRVVrkkiRR0cSpQTtyzsduHNIv:w9kP/wIxNESxusV9iRR0TCtyYduHNI

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e73ca8ae1135189de67f9cc132ab43578c3d34141f080eb936e6aab82c0cf021.exe
    "C:\Users\Admin\AppData\Local\Temp\e73ca8ae1135189de67f9cc132ab43578c3d34141f080eb936e6aab82c0cf021.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1952
  • C:\Users\Admin\AppData\Local\Temp\F4A6.exe
    C:\Users\Admin\AppData\Local\Temp\F4A6.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp",Wuuitfqhpt
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:1840
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17103
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2192
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4900
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4412
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 528
          2⤵
          • Program crash
          PID:2488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4524 -ip 4524
        1⤵
          PID:2576
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:1828

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\F4A6.exe

            Filesize

            1.1MB

            MD5

            c75278c7981cdbbb1001943ee773881a

            SHA1

            cf053ea65c3de7dd072f8f16988bbd05fa8a4042

            SHA256

            72e7ce868f59fa8ed5fe7400def17a893aa03dbd397033a6320f7206f1656e3a

            SHA512

            ff8152a22e4892ed186bb92dc7bfcfb063d4aaec61cfa788e1667e167353dbea03e9afc88696054f31c8e888450ea91a7145d8cf30a48190b9abd9f04b93c6c7

          • C:\Users\Admin\AppData\Local\Temp\F4A6.exe

            Filesize

            1.1MB

            MD5

            c75278c7981cdbbb1001943ee773881a

            SHA1

            cf053ea65c3de7dd072f8f16988bbd05fa8a4042

            SHA256

            72e7ce868f59fa8ed5fe7400def17a893aa03dbd397033a6320f7206f1656e3a

            SHA512

            ff8152a22e4892ed186bb92dc7bfcfb063d4aaec61cfa788e1667e167353dbea03e9afc88696054f31c8e888450ea91a7145d8cf30a48190b9abd9f04b93c6c7

          • C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp

            Filesize

            730KB

            MD5

            8d039a703875733043526555982e4e60

            SHA1

            f583795e790e682db2feaa5f5b8d282216f581e2

            SHA256

            5cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a

            SHA512

            3e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e

          • C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp

            Filesize

            730KB

            MD5

            8d039a703875733043526555982e4e60

            SHA1

            f583795e790e682db2feaa5f5b8d282216f581e2

            SHA256

            5cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a

            SHA512

            3e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e

          • memory/1840-146-0x0000000004C40000-0x00000000057A2000-memory.dmp

            Filesize

            11.4MB

          • memory/1840-147-0x0000000004740000-0x0000000004880000-memory.dmp

            Filesize

            1.2MB

          • memory/1840-149-0x0000000006580000-0x00000000066C0000-memory.dmp

            Filesize

            1.2MB

          • memory/1840-150-0x0000000006580000-0x00000000066C0000-memory.dmp

            Filesize

            1.2MB

          • memory/1840-148-0x0000000004740000-0x0000000004880000-memory.dmp

            Filesize

            1.2MB

          • memory/1840-159-0x0000000004C40000-0x00000000057A2000-memory.dmp

            Filesize

            11.4MB

          • memory/1840-152-0x0000000004740000-0x0000000004880000-memory.dmp

            Filesize

            1.2MB

          • memory/1840-151-0x0000000004740000-0x0000000004880000-memory.dmp

            Filesize

            1.2MB

          • memory/1840-145-0x0000000004C40000-0x00000000057A2000-memory.dmp

            Filesize

            11.4MB

          • memory/1952-134-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/1952-132-0x000000000068E000-0x00000000006A4000-memory.dmp

            Filesize

            88KB

          • memory/1952-133-0x00000000005B0000-0x00000000005B9000-memory.dmp

            Filesize

            36KB

          • memory/1952-135-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/2192-155-0x00000286A8EC0000-0x00000286A9000000-memory.dmp

            Filesize

            1.2MB

          • memory/2192-154-0x00000286A8EC0000-0x00000286A9000000-memory.dmp

            Filesize

            1.2MB

          • memory/2192-156-0x0000000000BF0000-0x0000000000E8A000-memory.dmp

            Filesize

            2.6MB

          • memory/2192-157-0x00000286A9040000-0x00000286A92EC000-memory.dmp

            Filesize

            2.7MB

          • memory/4524-144-0x0000000000400000-0x000000000051F000-memory.dmp

            Filesize

            1.1MB

          • memory/4524-143-0x00000000022F0000-0x000000000240C000-memory.dmp

            Filesize

            1.1MB

          • memory/4524-142-0x000000000216F000-0x000000000224C000-memory.dmp

            Filesize

            884KB