Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2022, 05:05

General

  • Target

    file.exe

  • Size

    223KB

  • MD5

    48c2031b82e27f60b5c07b84ab3ccfe5

  • SHA1

    d7ac785078d95d63b221e508bdc22e41dfb709cd

  • SHA256

    932ba1468220264f7f2991e8ca915a6ba3c2bc9a37b747a16c50d983fe89c5d2

  • SHA512

    3058f2bb1f77bae27717b581ec5e81e474f0ef21ac6980ac4c8061a69883f1aa9c09e7a52bb8dbeb066ad666fb381fd2864e00e9a6f331bbf95e3907bf0c57df

  • SSDEEP

    3072:ZDn7pjqKLTU5sSc3/pHfO3fdomGiHs02GauDrkf/ln:LjqKLTtScPp/YfdomGzGaMq

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 19 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2064
  • C:\Users\Admin\AppData\Local\Temp\127E.exe
    C:\Users\Admin\AppData\Local\Temp\127E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp",Dsdupihuqo
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 22354
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 540
      2⤵
      • Program crash
      PID:4980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2384 -ip 2384
    1⤵
      PID:4880
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5080

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\127E.exe

              Filesize

              1.1MB

              MD5

              508915087ec0d6ddd748e6909d4ce2c2

              SHA1

              48b9f1ba1850b00b6c70ab8fb5f90ad95974388e

              SHA256

              57fc707035ee2b9c7efcc96750d7c7f733798d502971478e0f8b9c682cf1c0de

              SHA512

              803f5178cbe530a5ba5b92ea6fe94bc471ef089c884714fb45b8f95fe2cd68a5ea3c21f09473fb9a3bb458922014e379fe30e7e4a91870105f45777c6938a438

            • C:\Users\Admin\AppData\Local\Temp\127E.exe

              Filesize

              1.1MB

              MD5

              508915087ec0d6ddd748e6909d4ce2c2

              SHA1

              48b9f1ba1850b00b6c70ab8fb5f90ad95974388e

              SHA256

              57fc707035ee2b9c7efcc96750d7c7f733798d502971478e0f8b9c682cf1c0de

              SHA512

              803f5178cbe530a5ba5b92ea6fe94bc471ef089c884714fb45b8f95fe2cd68a5ea3c21f09473fb9a3bb458922014e379fe30e7e4a91870105f45777c6938a438

            • C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp

              Filesize

              792KB

              MD5

              9e3ff54c77c7d43bfdf8cff1d31c3c51

              SHA1

              9681f127f0300093ac15d8a3fc16c289f0b9c045

              SHA256

              2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

              SHA512

              d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

            • C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp

              Filesize

              792KB

              MD5

              9e3ff54c77c7d43bfdf8cff1d31c3c51

              SHA1

              9681f127f0300093ac15d8a3fc16c289f0b9c045

              SHA256

              2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

              SHA512

              d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

            • memory/2064-133-0x00000000006F0000-0x00000000006F9000-memory.dmp

              Filesize

              36KB

            • memory/2064-134-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2064-135-0x0000000000400000-0x000000000045C000-memory.dmp

              Filesize

              368KB

            • memory/2064-132-0x000000000077D000-0x000000000078E000-memory.dmp

              Filesize

              68KB

            • memory/2236-146-0x0000000004AA0000-0x00000000055F7000-memory.dmp

              Filesize

              11.3MB

            • memory/2236-149-0x0000000005780000-0x00000000058C0000-memory.dmp

              Filesize

              1.2MB

            • memory/2236-159-0x0000000004AA0000-0x00000000055F7000-memory.dmp

              Filesize

              11.3MB

            • memory/2236-156-0x00000000057F9000-0x00000000057FB000-memory.dmp

              Filesize

              8KB

            • memory/2236-152-0x0000000005780000-0x00000000058C0000-memory.dmp

              Filesize

              1.2MB

            • memory/2236-145-0x0000000004AA0000-0x00000000055F7000-memory.dmp

              Filesize

              11.3MB

            • memory/2236-151-0x0000000005780000-0x00000000058C0000-memory.dmp

              Filesize

              1.2MB

            • memory/2236-147-0x0000000005780000-0x00000000058C0000-memory.dmp

              Filesize

              1.2MB

            • memory/2236-148-0x0000000005780000-0x00000000058C0000-memory.dmp

              Filesize

              1.2MB

            • memory/2236-150-0x0000000005780000-0x00000000058C0000-memory.dmp

              Filesize

              1.2MB

            • memory/2384-144-0x0000000000400000-0x0000000000538000-memory.dmp

              Filesize

              1.2MB

            • memory/2384-143-0x0000000002410000-0x0000000002542000-memory.dmp

              Filesize

              1.2MB

            • memory/2384-142-0x0000000002315000-0x0000000002401000-memory.dmp

              Filesize

              944KB

            • memory/3624-154-0x0000019CEE5B0000-0x0000019CEE6F0000-memory.dmp

              Filesize

              1.2MB

            • memory/3624-155-0x0000019CEE5B0000-0x0000019CEE6F0000-memory.dmp

              Filesize

              1.2MB

            • memory/3624-157-0x00000000008A0000-0x0000000000B4E000-memory.dmp

              Filesize

              2.7MB

            • memory/3624-158-0x0000019CECB30000-0x0000019CECDEF000-memory.dmp

              Filesize

              2.7MB