Resubmissions

04/01/2023, 23:55

230104-3ymjqsaa85 10

04/01/2023, 23:03

230104-21mrvadd8v 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2023, 23:03

General

  • Target

    715913ccfa78aae131126d5b2bfb80c74130a8273882064b6c7b5037a723a030.exe

  • Size

    365KB

  • MD5

    596d21bbe19d67ea9056ca1d63752fb3

  • SHA1

    431220aa4cde4cbaa161506e39b4835f3b3ae52e

  • SHA256

    715913ccfa78aae131126d5b2bfb80c74130a8273882064b6c7b5037a723a030

  • SHA512

    4dd9a2f386369779fef9bf38665bab113a4761b862c102c894f6d8605895a270f6c6048568524029e6910a153dd3cf4d1db09b91c5d2ae1698e2f382001fd3fa

  • SSDEEP

    3072:y6XMnvHLCVR14P5pPSs/djFiUq8diov2bdZF4F0zf8jdA4upFldiLLkGH/lPiXY9:9MfLCV4bndFiUqQepPfoxupmLz/jTl

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 23 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\715913ccfa78aae131126d5b2bfb80c74130a8273882064b6c7b5037a723a030.exe
    "C:\Users\Admin\AppData\Local\Temp\715913ccfa78aae131126d5b2bfb80c74130a8273882064b6c7b5037a723a030.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4648
  • C:\Users\Admin\AppData\Local\Temp\5A45.exe
    C:\Users\Admin\AppData\Local\Temp\5A45.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23982
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 528
      2⤵
      • Program crash
      PID:4072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3056 -ip 3056
    1⤵
      PID:4420
    • C:\Users\Admin\AppData\Local\Temp\9106.exe
      C:\Users\Admin\AppData\Local\Temp\9106.exe
      1⤵
      • Executes dropped EXE
      PID:3332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 944
        2⤵
        • Program crash
        PID:400
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3332 -ip 3332
      1⤵
        PID:404
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4888

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5A45.exe

                Filesize

                1.1MB

                MD5

                ab6b8e10f0960c2e57b77bf0b77e9b95

                SHA1

                0c8557f06a8a24baab1cee9bea2a950538dd184a

                SHA256

                798968a197fa819d7b3553877c7d7a707e2d6d7ad37afb33f16fb39594a12415

                SHA512

                967e1da24ddc6cec1f9132092f5eadd448a409608563aee0bcdefefb6177b62d188a1357508504ab70162da8c8cf198607ddf9dca373b0a6b747258f58903871

              • C:\Users\Admin\AppData\Local\Temp\5A45.exe

                Filesize

                1.1MB

                MD5

                ab6b8e10f0960c2e57b77bf0b77e9b95

                SHA1

                0c8557f06a8a24baab1cee9bea2a950538dd184a

                SHA256

                798968a197fa819d7b3553877c7d7a707e2d6d7ad37afb33f16fb39594a12415

                SHA512

                967e1da24ddc6cec1f9132092f5eadd448a409608563aee0bcdefefb6177b62d188a1357508504ab70162da8c8cf198607ddf9dca373b0a6b747258f58903871

              • C:\Users\Admin\AppData\Local\Temp\9106.exe

                Filesize

                383KB

                MD5

                de3e07d2b40ed154d4506ca774775843

                SHA1

                0ad7295632a6a5f507c63850a0c2496d5ea4946b

                SHA256

                8155d39e6697d47ea3464c2ff1c31a403c71813d72d30cfa7c4353e68eeafd4a

                SHA512

                22eabcd4e7246f005832461dd46098e460ad7b7c42790cf2ba50af999588f8f94cf81106e2d96c5030d55c5588b09e6ac9210ab0f048d09350d17a317e40a8f8

              • C:\Users\Admin\AppData\Local\Temp\9106.exe

                Filesize

                383KB

                MD5

                de3e07d2b40ed154d4506ca774775843

                SHA1

                0ad7295632a6a5f507c63850a0c2496d5ea4946b

                SHA256

                8155d39e6697d47ea3464c2ff1c31a403c71813d72d30cfa7c4353e68eeafd4a

                SHA512

                22eabcd4e7246f005832461dd46098e460ad7b7c42790cf2ba50af999588f8f94cf81106e2d96c5030d55c5588b09e6ac9210ab0f048d09350d17a317e40a8f8

              • C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp

                Filesize

                784KB

                MD5

                c50c2f17112b6c6b0892cb2c1f502108

                SHA1

                3dd1444384bf790f5aa90ae95ef7745fa4cfaf72

                SHA256

                20dc61c5456ea5756f432aebecf74660acebf5ace0f7c8d1b360757ed79075d8

                SHA512

                bfbfc3a13816a12e25c373f6739215b9dff559fecfdf26c3358a452bdc833b6eaa64bbae316f4b29b9e9ce802e9f50c66b533c8c3c1b372025a7f0b7d8b452f1

              • C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp

                Filesize

                784KB

                MD5

                c50c2f17112b6c6b0892cb2c1f502108

                SHA1

                3dd1444384bf790f5aa90ae95ef7745fa4cfaf72

                SHA256

                20dc61c5456ea5756f432aebecf74660acebf5ace0f7c8d1b360757ed79075d8

                SHA512

                bfbfc3a13816a12e25c373f6739215b9dff559fecfdf26c3358a452bdc833b6eaa64bbae316f4b29b9e9ce802e9f50c66b533c8c3c1b372025a7f0b7d8b452f1

              • memory/2348-159-0x0000000005C10000-0x0000000005D50000-memory.dmp

                Filesize

                1.2MB

              • memory/2348-160-0x0000000005C10000-0x0000000005D50000-memory.dmp

                Filesize

                1.2MB

              • memory/2348-167-0x0000000004FB0000-0x0000000005B02000-memory.dmp

                Filesize

                11.3MB

              • memory/2348-162-0x0000000005C89000-0x0000000005C8B000-memory.dmp

                Filesize

                8KB

              • memory/2348-158-0x0000000005C10000-0x0000000005D50000-memory.dmp

                Filesize

                1.2MB

              • memory/2348-157-0x0000000005C10000-0x0000000005D50000-memory.dmp

                Filesize

                1.2MB

              • memory/2348-155-0x0000000005C10000-0x0000000005D50000-memory.dmp

                Filesize

                1.2MB

              • memory/2348-154-0x0000000005C10000-0x0000000005D50000-memory.dmp

                Filesize

                1.2MB

              • memory/2348-152-0x0000000004FB0000-0x0000000005B02000-memory.dmp

                Filesize

                11.3MB

              • memory/2348-153-0x0000000004FB0000-0x0000000005B02000-memory.dmp

                Filesize

                11.3MB

              • memory/2532-163-0x000001893F260000-0x000001893F3A0000-memory.dmp

                Filesize

                1.2MB

              • memory/2532-164-0x000001893F260000-0x000001893F3A0000-memory.dmp

                Filesize

                1.2MB

              • memory/2532-165-0x00000000004B0000-0x000000000074B000-memory.dmp

                Filesize

                2.6MB

              • memory/2532-166-0x000001893D810000-0x000001893DABC000-memory.dmp

                Filesize

                2.7MB

              • memory/3056-145-0x0000000000400000-0x0000000002D11000-memory.dmp

                Filesize

                41.1MB

              • memory/3056-140-0x0000000004A60000-0x0000000004B72000-memory.dmp

                Filesize

                1.1MB

              • memory/3056-139-0x00000000031E0000-0x00000000032B8000-memory.dmp

                Filesize

                864KB

              • memory/3056-142-0x0000000000400000-0x0000000002D11000-memory.dmp

                Filesize

                41.1MB

              • memory/3332-156-0x0000000000400000-0x0000000002C52000-memory.dmp

                Filesize

                40.3MB

              • memory/3332-149-0x0000000002DE7000-0x0000000002E00000-memory.dmp

                Filesize

                100KB

              • memory/3332-151-0x0000000000400000-0x0000000002C52000-memory.dmp

                Filesize

                40.3MB

              • memory/3332-150-0x00000000030D0000-0x00000000030FA000-memory.dmp

                Filesize

                168KB

              • memory/4648-134-0x0000000000400000-0x0000000002C4E000-memory.dmp

                Filesize

                40.3MB

              • memory/4648-132-0x0000000002DA7000-0x0000000002DBC000-memory.dmp

                Filesize

                84KB

              • memory/4648-135-0x0000000000400000-0x0000000002C4E000-memory.dmp

                Filesize

                40.3MB

              • memory/4648-133-0x0000000002D60000-0x0000000002D69000-memory.dmp

                Filesize

                36KB