Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2022 00:36

General

  • Target

    file.exe

  • Size

    316KB

  • MD5

    aab9a89b440b4acd8da029dd7b4bbcdc

  • SHA1

    3d3d0b2d8c3c6e03ac2c9869c17cceda3032bfc9

  • SHA256

    ec715cf2382d818f116ffd7c8cb2c7f4f98298559cf3539ad44f88b231465eaf

  • SHA512

    684e19590b04aba0fd15d2b4f24d583476245c5d87af484ac441653668370d396eae86c9dfac330c408671efa5dc99f90923df6f8a2629555fb96cc51a173f68

  • SSDEEP

    6144:ltLcvJihMpm7x5BoFb9goRR0cSpQTtyzsduHNIv:ltgvJmM87rBYbJRR0TCtyYduHNI

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1944
  • C:\Users\Admin\AppData\Local\Temp\9F3.exe
    C:\Users\Admin\AppData\Local\Temp\9F3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp",Wuuitfqhpt
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4084
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17140
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 556
      2⤵
      • Program crash
      PID:4644
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2096 -ip 2096
    1⤵
      PID:552
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3816

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\9F3.exe

        Filesize

        1.1MB

        MD5

        fad710c44e1dba33cb1ff90e91f44dd8

        SHA1

        33bc81b3dbd23ddd186311b6a04c8eb6db1c7940

        SHA256

        a5ea31d4ea9ad0fb43cacea0051ff43609ba0079736e9c1193969ed460471bd9

        SHA512

        f538c8eecad0d0b86beef971af6546718f7b30e3a4d0f7982d8c5c56152fc1a07a789d57460cb44a2af9509f793e7fc1f8c8aa63b61822c8996f5a85660f8f7b

      • C:\Users\Admin\AppData\Local\Temp\9F3.exe

        Filesize

        1.1MB

        MD5

        fad710c44e1dba33cb1ff90e91f44dd8

        SHA1

        33bc81b3dbd23ddd186311b6a04c8eb6db1c7940

        SHA256

        a5ea31d4ea9ad0fb43cacea0051ff43609ba0079736e9c1193969ed460471bd9

        SHA512

        f538c8eecad0d0b86beef971af6546718f7b30e3a4d0f7982d8c5c56152fc1a07a789d57460cb44a2af9509f793e7fc1f8c8aa63b61822c8996f5a85660f8f7b

      • C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp

        Filesize

        730KB

        MD5

        8d039a703875733043526555982e4e60

        SHA1

        f583795e790e682db2feaa5f5b8d282216f581e2

        SHA256

        5cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a

        SHA512

        3e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e

      • C:\Users\Admin\AppData\Local\Temp\Oyiesauffusw.tmp

        Filesize

        730KB

        MD5

        8d039a703875733043526555982e4e60

        SHA1

        f583795e790e682db2feaa5f5b8d282216f581e2

        SHA256

        5cb8e52b000f84494627db8e8e700e7731c9bfa2eb9e6a8a8280d2311327e81a

        SHA512

        3e89ec3eb7e90aa93c0a3cc2d120521b1c2236a8a2169b2654fcc153f926b97e85267a177ef92f3ac3a7aa493a81a3a55c1b6b56ef8f8beb93b78bf3eb10373e

      • memory/1824-153-0x0000017D05060000-0x0000017D051A0000-memory.dmp

        Filesize

        1.2MB

      • memory/1824-156-0x0000017D03610000-0x0000017D038BC000-memory.dmp

        Filesize

        2.7MB

      • memory/1824-152-0x00007FF6D1AF6890-mapping.dmp

      • memory/1824-155-0x0000017D05060000-0x0000017D051A0000-memory.dmp

        Filesize

        1.2MB

      • memory/1824-154-0x0000000000280000-0x000000000051A000-memory.dmp

        Filesize

        2.6MB

      • memory/1944-134-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/1944-133-0x00000000005F0000-0x00000000005F9000-memory.dmp

        Filesize

        36KB

      • memory/1944-132-0x000000000063F000-0x0000000000654000-memory.dmp

        Filesize

        84KB

      • memory/1944-135-0x0000000000400000-0x0000000000455000-memory.dmp

        Filesize

        340KB

      • memory/2096-136-0x0000000000000000-mapping.dmp

      • memory/2096-140-0x00000000022C4000-0x00000000023A1000-memory.dmp

        Filesize

        884KB

      • memory/2096-141-0x00000000023B0000-0x00000000024CC000-memory.dmp

        Filesize

        1.1MB

      • memory/2096-142-0x0000000000400000-0x000000000051F000-memory.dmp

        Filesize

        1.1MB

      • memory/4084-146-0x0000000005340000-0x0000000005480000-memory.dmp

        Filesize

        1.2MB

      • memory/4084-150-0x0000000005340000-0x0000000005480000-memory.dmp

        Filesize

        1.2MB

      • memory/4084-151-0x0000000005340000-0x0000000005480000-memory.dmp

        Filesize

        1.2MB

      • memory/4084-149-0x0000000007280000-0x00000000073C0000-memory.dmp

        Filesize

        1.2MB

      • memory/4084-148-0x0000000007280000-0x00000000073C0000-memory.dmp

        Filesize

        1.2MB

      • memory/4084-147-0x0000000005340000-0x0000000005480000-memory.dmp

        Filesize

        1.2MB

      • memory/4084-145-0x00000000058B0000-0x0000000006412000-memory.dmp

        Filesize

        11.4MB

      • memory/4084-139-0x0000000000000000-mapping.dmp

      • memory/4084-157-0x00000000058B0000-0x0000000006412000-memory.dmp

        Filesize

        11.4MB