Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2023 22:08

General

  • Target

    file.exe

  • Size

    366KB

  • MD5

    76438a3882c3141edf9cda1bf497e203

  • SHA1

    979a36b5783e189d02be67c09e77d37cdbeeaed5

  • SHA256

    33343c372f10b6b6d41dd72f30fdc59ca95cb324f3c0f0824cce1770b8f2f5c7

  • SHA512

    852d9eb94d265ee5a5761591ba039ff694572b241051071225a12d87ec30aa9390d6acd622bc3343661a04462701819a83ae1ba7f24e32c2ff41e2f0ce48e157

  • SSDEEP

    3072:zhXqv0L0HDoBJaD5pIeLBza6Ng0gfP2tLh06Qc8jdA4upFldiLLkD/DYjTis4g:hDL0HcrafIYr+xGde6JoxupmLEkjTl

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1168
  • C:\Users\Admin\AppData\Local\Temp\22E9.exe
    C:\Users\Admin\AppData\Local\Temp\22E9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23982
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 528
      2⤵
      • Program crash
      PID:4476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3024 -ip 3024
    1⤵
      PID:2780
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2436
      • C:\Users\Admin\AppData\Roaming\hfhwifa
        C:\Users\Admin\AppData\Roaming\hfhwifa
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:2432

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\22E9.exe

        Filesize

        1.1MB

        MD5

        f42414378240cb57eca9459954b7aedf

        SHA1

        0bad89a20f91996039630a49e6f53254cdc2dd43

        SHA256

        5fcdaaa83ef6e9283f9a81ce7c5bd037443203f5d0ca9ea95d13e7648437b536

        SHA512

        f74ea293e1dcc5ef995e8d62e61a4a32be890358fc36e2a1282c9640db8abb1e8098e19b166baee33fd9e7a5b188abab2ce73af6fefc68a900919217fd909b83

      • C:\Users\Admin\AppData\Local\Temp\22E9.exe

        Filesize

        1.1MB

        MD5

        f42414378240cb57eca9459954b7aedf

        SHA1

        0bad89a20f91996039630a49e6f53254cdc2dd43

        SHA256

        5fcdaaa83ef6e9283f9a81ce7c5bd037443203f5d0ca9ea95d13e7648437b536

        SHA512

        f74ea293e1dcc5ef995e8d62e61a4a32be890358fc36e2a1282c9640db8abb1e8098e19b166baee33fd9e7a5b188abab2ce73af6fefc68a900919217fd909b83

      • C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp

        Filesize

        784KB

        MD5

        c50c2f17112b6c6b0892cb2c1f502108

        SHA1

        3dd1444384bf790f5aa90ae95ef7745fa4cfaf72

        SHA256

        20dc61c5456ea5756f432aebecf74660acebf5ace0f7c8d1b360757ed79075d8

        SHA512

        bfbfc3a13816a12e25c373f6739215b9dff559fecfdf26c3358a452bdc833b6eaa64bbae316f4b29b9e9ce802e9f50c66b533c8c3c1b372025a7f0b7d8b452f1

      • C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp

        Filesize

        784KB

        MD5

        c50c2f17112b6c6b0892cb2c1f502108

        SHA1

        3dd1444384bf790f5aa90ae95ef7745fa4cfaf72

        SHA256

        20dc61c5456ea5756f432aebecf74660acebf5ace0f7c8d1b360757ed79075d8

        SHA512

        bfbfc3a13816a12e25c373f6739215b9dff559fecfdf26c3358a452bdc833b6eaa64bbae316f4b29b9e9ce802e9f50c66b533c8c3c1b372025a7f0b7d8b452f1

      • C:\Users\Admin\AppData\Roaming\hfhwifa

        Filesize

        366KB

        MD5

        76438a3882c3141edf9cda1bf497e203

        SHA1

        979a36b5783e189d02be67c09e77d37cdbeeaed5

        SHA256

        33343c372f10b6b6d41dd72f30fdc59ca95cb324f3c0f0824cce1770b8f2f5c7

        SHA512

        852d9eb94d265ee5a5761591ba039ff694572b241051071225a12d87ec30aa9390d6acd622bc3343661a04462701819a83ae1ba7f24e32c2ff41e2f0ce48e157

      • C:\Users\Admin\AppData\Roaming\hfhwifa

        Filesize

        366KB

        MD5

        76438a3882c3141edf9cda1bf497e203

        SHA1

        979a36b5783e189d02be67c09e77d37cdbeeaed5

        SHA256

        33343c372f10b6b6d41dd72f30fdc59ca95cb324f3c0f0824cce1770b8f2f5c7

        SHA512

        852d9eb94d265ee5a5761591ba039ff694572b241051071225a12d87ec30aa9390d6acd622bc3343661a04462701819a83ae1ba7f24e32c2ff41e2f0ce48e157

      • memory/1168-133-0x0000000003230000-0x0000000003239000-memory.dmp

        Filesize

        36KB

      • memory/1168-135-0x0000000000400000-0x0000000002C4E000-memory.dmp

        Filesize

        40.3MB

      • memory/1168-134-0x0000000000400000-0x0000000002C4E000-memory.dmp

        Filesize

        40.3MB

      • memory/1168-132-0x0000000002D77000-0x0000000002D8C000-memory.dmp

        Filesize

        84KB

      • memory/2432-161-0x0000000002D17000-0x0000000002D2C000-memory.dmp

        Filesize

        84KB

      • memory/2432-163-0x0000000000400000-0x0000000002C4E000-memory.dmp

        Filesize

        40.3MB

      • memory/2432-162-0x0000000000400000-0x0000000002C4E000-memory.dmp

        Filesize

        40.3MB

      • memory/2460-158-0x0000000004D20000-0x0000000005872000-memory.dmp

        Filesize

        11.3MB

      • memory/2460-145-0x0000000004D20000-0x0000000005872000-memory.dmp

        Filesize

        11.3MB

      • memory/2460-146-0x0000000004D20000-0x0000000005872000-memory.dmp

        Filesize

        11.3MB

      • memory/2460-147-0x0000000005AA0000-0x0000000005BE0000-memory.dmp

        Filesize

        1.2MB

      • memory/2460-148-0x0000000005AA0000-0x0000000005BE0000-memory.dmp

        Filesize

        1.2MB

      • memory/2460-149-0x0000000005AA0000-0x0000000005BE0000-memory.dmp

        Filesize

        1.2MB

      • memory/2460-150-0x0000000005AA0000-0x0000000005BE0000-memory.dmp

        Filesize

        1.2MB

      • memory/2460-151-0x0000000005AA0000-0x0000000005BE0000-memory.dmp

        Filesize

        1.2MB

      • memory/2460-152-0x0000000005AA0000-0x0000000005BE0000-memory.dmp

        Filesize

        1.2MB

      • memory/2460-139-0x0000000000000000-mapping.dmp

      • memory/3024-140-0x0000000003276000-0x000000000334E000-memory.dmp

        Filesize

        864KB

      • memory/3024-144-0x0000000000400000-0x0000000002D11000-memory.dmp

        Filesize

        41.1MB

      • memory/3024-141-0x0000000004AF0000-0x0000000004C02000-memory.dmp

        Filesize

        1.1MB

      • memory/3024-136-0x0000000000000000-mapping.dmp

      • memory/3952-156-0x0000000000040000-0x00000000002DB000-memory.dmp

        Filesize

        2.6MB

      • memory/3952-157-0x0000021ACC400000-0x0000021ACC6AC000-memory.dmp

        Filesize

        2.7MB

      • memory/3952-155-0x0000021ACDE50000-0x0000021ACDF90000-memory.dmp

        Filesize

        1.2MB

      • memory/3952-154-0x0000021ACDE50000-0x0000021ACDF90000-memory.dmp

        Filesize

        1.2MB

      • memory/3952-153-0x00007FF707086890-mapping.dmp