Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2022 10:26

General

  • Target

    cb910537eef3d2844095f2934bc16f00f602ac6efe384cc18a0f7667f2538d48.exe

  • Size

    231KB

  • MD5

    863a4e0dfafeb5d8c5e339485f001d91

  • SHA1

    5a0af906dae62411c187f2b9c1d4d65c37bda2eb

  • SHA256

    cb910537eef3d2844095f2934bc16f00f602ac6efe384cc18a0f7667f2538d48

  • SHA512

    8871d115825c0fcb194befdc09667df8c55368050e97aca2598bffd1de4878490be4f16588856fa34ce2d0870a2c78fecb71f53a34f1a3499a8732061d153b9b

  • SSDEEP

    3072:WuI/bLt4ZX5PJ2GIVD3O6wv7fbSyGVQ+3V8zkzlS1g/tK8AFsk7LrcSb54VIcVTk:iLt4ZlJ2leRv7GPVX8zCtK8qskXbIr

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb910537eef3d2844095f2934bc16f00f602ac6efe384cc18a0f7667f2538d48.exe
    "C:\Users\Admin\AppData\Local\Temp\cb910537eef3d2844095f2934bc16f00f602ac6efe384cc18a0f7667f2538d48.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1180
  • C:\Users\Admin\AppData\Local\Temp\A103.exe
    C:\Users\Admin\AppData\Local\Temp\A103.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp",Dioeeedresq
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:1184
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14033
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:536
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:2320
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:1388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 528
          2⤵
          • Program crash
          PID:4676
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2060 -ip 2060
        1⤵
          PID:2608
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4180

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\A103.exe

            Filesize

            1022KB

            MD5

            8e1fa9f186fde8e12741505d3a4bc629

            SHA1

            230996e3245dfa7a3352a1003defee1f096bf889

            SHA256

            88dde4d981cff40f7df3f21b095e8714ae6805e34db8fcc5e4de3e6ed3348970

            SHA512

            42762e72cdd4e694468166df618d82a9cc7212382b7718291142b3d6dc394faceb881287a7a0fe0aeeeb6972f611f47a627eee7b938df2086838ede740a9b423

          • C:\Users\Admin\AppData\Local\Temp\A103.exe

            Filesize

            1022KB

            MD5

            8e1fa9f186fde8e12741505d3a4bc629

            SHA1

            230996e3245dfa7a3352a1003defee1f096bf889

            SHA256

            88dde4d981cff40f7df3f21b095e8714ae6805e34db8fcc5e4de3e6ed3348970

            SHA512

            42762e72cdd4e694468166df618d82a9cc7212382b7718291142b3d6dc394faceb881287a7a0fe0aeeeb6972f611f47a627eee7b938df2086838ede740a9b423

          • C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

            Filesize

            792KB

            MD5

            822d3ead416a1a85cb96e65f65cd5ae2

            SHA1

            af32b69e2835d1cacdadb97ae6dfafccc32d1837

            SHA256

            72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

            SHA512

            48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

          • C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

            Filesize

            792KB

            MD5

            822d3ead416a1a85cb96e65f65cd5ae2

            SHA1

            af32b69e2835d1cacdadb97ae6dfafccc32d1837

            SHA256

            72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

            SHA512

            48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

          • memory/536-154-0x00000251533A0000-0x00000251534E0000-memory.dmp

            Filesize

            1.2MB

          • memory/536-157-0x0000025151930000-0x0000025151BDE000-memory.dmp

            Filesize

            2.7MB

          • memory/536-156-0x00000000006A0000-0x000000000093C000-memory.dmp

            Filesize

            2.6MB

          • memory/536-155-0x00000251533A0000-0x00000251534E0000-memory.dmp

            Filesize

            1.2MB

          • memory/536-153-0x00007FF647E26890-mapping.dmp

          • memory/1180-135-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/1180-132-0x000000000074D000-0x000000000075E000-memory.dmp

            Filesize

            68KB

          • memory/1180-134-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/1180-133-0x00000000006B0000-0x00000000006B9000-memory.dmp

            Filesize

            36KB

          • memory/1184-146-0x0000000005980000-0x00000000064DD000-memory.dmp

            Filesize

            11.4MB

          • memory/1184-140-0x0000000000000000-mapping.dmp

          • memory/1184-147-0x0000000005430000-0x0000000005570000-memory.dmp

            Filesize

            1.2MB

          • memory/1184-148-0x0000000005430000-0x0000000005570000-memory.dmp

            Filesize

            1.2MB

          • memory/1184-149-0x0000000007B80000-0x0000000007CC0000-memory.dmp

            Filesize

            1.2MB

          • memory/1184-150-0x0000000005430000-0x0000000005570000-memory.dmp

            Filesize

            1.2MB

          • memory/1184-152-0x0000000005430000-0x0000000005570000-memory.dmp

            Filesize

            1.2MB

          • memory/1184-145-0x0000000005980000-0x00000000064DD000-memory.dmp

            Filesize

            11.4MB

          • memory/1184-159-0x0000000005980000-0x00000000064DD000-memory.dmp

            Filesize

            11.4MB

          • memory/1184-151-0x0000000005430000-0x0000000005570000-memory.dmp

            Filesize

            1.2MB

          • memory/1388-160-0x0000000000000000-mapping.dmp

          • memory/2060-141-0x0000000002390000-0x00000000024A1000-memory.dmp

            Filesize

            1.1MB

          • memory/2060-139-0x00000000021F1000-0x00000000022C7000-memory.dmp

            Filesize

            856KB

          • memory/2060-136-0x0000000000000000-mapping.dmp

          • memory/2060-142-0x0000000000400000-0x0000000000524000-memory.dmp

            Filesize

            1.1MB

          • memory/2320-158-0x0000000000000000-mapping.dmp