Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2022 08:18

General

  • Target

    afe397349912cff8044a95b3c5ec89643097044798490c366b36c4921553453e.exe

  • Size

    235KB

  • MD5

    5c242afb9e98da06edad4d5750b058bb

  • SHA1

    08c077e72a96552ace13b263bcc9faa694d39465

  • SHA256

    afe397349912cff8044a95b3c5ec89643097044798490c366b36c4921553453e

  • SHA512

    697283c8a5001c4732313add8136ea1517510737f2ad5e93c9e29d09e23a9afd090851f331a8299c076d7f0eab4ef9e65afc3e984682e8b6442aee9aadd13e2c

  • SSDEEP

    3072:urtL6TRWVqKlDfdiqwl/8b0sa1mLU8y5/LU8y5Fjwx3qB6xuqqb53y1teM:uL6qqKljdUlwho5orsRVx3E5

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 48 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afe397349912cff8044a95b3c5ec89643097044798490c366b36c4921553453e.exe
    "C:\Users\Admin\AppData\Local\Temp\afe397349912cff8044a95b3c5ec89643097044798490c366b36c4921553453e.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1044
  • C:\Users\Admin\AppData\Local\Temp\F7E2.exe
    C:\Users\Admin\AppData\Local\Temp\F7E2.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Local\Temp\Sppyteaet.exe
      "C:\Users\Admin\AppData\Local\Temp\Sppyteaet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3572
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Checks processor information in registry
      PID:2892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 1320
        3⤵
        • Program crash
        PID:1944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 1268
      2⤵
      • Program crash
      PID:4788
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2892 -ip 2892
    1⤵
      PID:1300
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"
      1⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Enumerates system info in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec93a4f50,0x7ffec93a4f60,0x7ffec93a4f70
        2⤵
          PID:4808
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,124776918347477934,10957025948407484523,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1668 /prefetch:2
          2⤵
            PID:3356
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1640,124776918347477934,10957025948407484523,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1968 /prefetch:8
            2⤵
              PID:3788
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1640,124776918347477934,10957025948407484523,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 /prefetch:8
              2⤵
                PID:2004
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 688 -s 3596
                2⤵
                • Program crash
                PID:3552
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:4772
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 224 -ip 224
                1⤵
                  PID:4492
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -pss -s 556 -p 688 -ip 688
                  1⤵
                    PID:1952
                  • C:\Users\Admin\AppData\Roaming\gdehsvf
                    C:\Users\Admin\AppData\Roaming\gdehsvf
                    1⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: MapViewOfSection
                    PID:2272

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\F7E2.exe

                    Filesize

                    5.5MB

                    MD5

                    3db18a14cdeece8c83c2b462a98f7f78

                    SHA1

                    784c8ee01a7447cb088cb436bd464ea6a4c33759

                    SHA256

                    08dbb04950436e675ff2bc75841a233420877ad0075e4ba15c47d8050eb336f7

                    SHA512

                    d5fc35613454766606cd7f46ddbc0bfae2d9922c834ec5ca20ef3c4b5c292d021bc5a518228f9c3b652a26b18254b2b351105f5581ea3dbf6b93b584551ed98b

                  • C:\Users\Admin\AppData\Local\Temp\F7E2.exe

                    Filesize

                    5.5MB

                    MD5

                    3db18a14cdeece8c83c2b462a98f7f78

                    SHA1

                    784c8ee01a7447cb088cb436bd464ea6a4c33759

                    SHA256

                    08dbb04950436e675ff2bc75841a233420877ad0075e4ba15c47d8050eb336f7

                    SHA512

                    d5fc35613454766606cd7f46ddbc0bfae2d9922c834ec5ca20ef3c4b5c292d021bc5a518228f9c3b652a26b18254b2b351105f5581ea3dbf6b93b584551ed98b

                  • C:\Users\Admin\AppData\Local\Temp\Sppyteaet.exe

                    Filesize

                    1.3MB

                    MD5

                    ff6a5732355485b459248f586c2b6945

                    SHA1

                    07da3f03ef18e2eaddfceb050b68e93fd533f7a3

                    SHA256

                    366ee3319c995b995fcfcc3f2228a18a09d0461a94964b4b4ad9a89dcbf669f4

                    SHA512

                    379fd03ebec85a9b15caf0aa8ba5a43c76199391ba3a2b29d20426501294e66d8f07c219e05355b47702e5a836d1a89015533f72da6bbe2ded57ee5d24056749

                  • C:\Users\Admin\AppData\Local\Temp\Sppyteaet.exe

                    Filesize

                    1.3MB

                    MD5

                    ff6a5732355485b459248f586c2b6945

                    SHA1

                    07da3f03ef18e2eaddfceb050b68e93fd533f7a3

                    SHA256

                    366ee3319c995b995fcfcc3f2228a18a09d0461a94964b4b4ad9a89dcbf669f4

                    SHA512

                    379fd03ebec85a9b15caf0aa8ba5a43c76199391ba3a2b29d20426501294e66d8f07c219e05355b47702e5a836d1a89015533f72da6bbe2ded57ee5d24056749

                  • C:\Users\Admin\AppData\Roaming\gdehsvf

                    Filesize

                    235KB

                    MD5

                    5c242afb9e98da06edad4d5750b058bb

                    SHA1

                    08c077e72a96552ace13b263bcc9faa694d39465

                    SHA256

                    afe397349912cff8044a95b3c5ec89643097044798490c366b36c4921553453e

                    SHA512

                    697283c8a5001c4732313add8136ea1517510737f2ad5e93c9e29d09e23a9afd090851f331a8299c076d7f0eab4ef9e65afc3e984682e8b6442aee9aadd13e2c

                  • C:\Users\Admin\AppData\Roaming\gdehsvf

                    Filesize

                    235KB

                    MD5

                    5c242afb9e98da06edad4d5750b058bb

                    SHA1

                    08c077e72a96552ace13b263bcc9faa694d39465

                    SHA256

                    afe397349912cff8044a95b3c5ec89643097044798490c366b36c4921553453e

                    SHA512

                    697283c8a5001c4732313add8136ea1517510737f2ad5e93c9e29d09e23a9afd090851f331a8299c076d7f0eab4ef9e65afc3e984682e8b6442aee9aadd13e2c

                  • memory/224-140-0x0000000002CB0000-0x0000000003263000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/224-163-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/224-141-0x0000000000400000-0x00000000009B4000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/224-139-0x0000000002749000-0x0000000002CAA000-memory.dmp

                    Filesize

                    5.4MB

                  • memory/224-164-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/224-177-0x0000000000400000-0x00000000009B4000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/224-165-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/224-158-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/224-161-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/224-160-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/224-179-0x0000000000400000-0x00000000009B4000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/224-178-0x0000000007140000-0x0000000007C84000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/224-162-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/224-157-0x0000000007140000-0x0000000007C84000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/224-156-0x0000000007140000-0x0000000007C84000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/224-159-0x0000000007EE0000-0x0000000008020000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/372-155-0x000000000AFD0000-0x000000000B0F8000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/372-180-0x000000000AFD0000-0x000000000B0F8000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/372-175-0x000000000AFD0000-0x000000000B0F8000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1044-132-0x0000000000618000-0x0000000000629000-memory.dmp

                    Filesize

                    68KB

                  • memory/1044-134-0x0000000000400000-0x000000000045F000-memory.dmp

                    Filesize

                    380KB

                  • memory/1044-135-0x0000000000400000-0x000000000045F000-memory.dmp

                    Filesize

                    380KB

                  • memory/1044-133-0x00000000005F0000-0x00000000005F9000-memory.dmp

                    Filesize

                    36KB

                  • memory/2272-183-0x0000000000748000-0x0000000000759000-memory.dmp

                    Filesize

                    68KB

                  • memory/2272-184-0x0000000000400000-0x000000000045F000-memory.dmp

                    Filesize

                    380KB

                  • memory/2272-185-0x0000000000400000-0x000000000045F000-memory.dmp

                    Filesize

                    380KB

                  • memory/2892-171-0x0000000003A30000-0x0000000003B70000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2892-170-0x0000000003A30000-0x0000000003B70000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2892-169-0x0000000002E20000-0x0000000003964000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/2892-172-0x0000000003A30000-0x0000000003B70000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2892-173-0x0000000003A30000-0x0000000003B70000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2892-174-0x0000000002E20000-0x0000000003964000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/2892-168-0x0000000002E20000-0x0000000003964000-memory.dmp

                    Filesize

                    11.3MB

                  • memory/2892-167-0x0000000000B80000-0x00000000015A5000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/3572-154-0x0000000000400000-0x0000000000534000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3572-153-0x0000000000400000-0x0000000000534000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3572-152-0x0000000000400000-0x0000000000534000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3572-151-0x0000000000400000-0x0000000000534000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3572-150-0x0000000000400000-0x0000000000534000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3572-149-0x0000000000400000-0x0000000000534000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3572-145-0x0000000000400000-0x0000000000534000-memory.dmp

                    Filesize

                    1.2MB