Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/01/2023, 00:41

General

  • Target

    c0d782ee403dd8a6a15f90840686e4928ab16e676fc2c9c7c4711996f0f026ac.exe

  • Size

    213KB

  • MD5

    acbd935bcd9c14549499ff705c4d3f53

  • SHA1

    440a6c2858ed7527e00ad77489316ba94a15945d

  • SHA256

    c0d782ee403dd8a6a15f90840686e4928ab16e676fc2c9c7c4711996f0f026ac

  • SHA512

    612ea4171a0dbbe08c5905b20f85f54aa8801a043f924eea50f71e717775da5c3a86d13789ec03466f6e508e93a2b64ce28ec8062a5e8a5ad13714df866c1065

  • SSDEEP

    3072:f9XhQXHOL6efw1zFkK51lSMax1H80kS7bPlKXU+uI:f51L671zFks3aT8b2xK7

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d782ee403dd8a6a15f90840686e4928ab16e676fc2c9c7c4711996f0f026ac.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d782ee403dd8a6a15f90840686e4928ab16e676fc2c9c7c4711996f0f026ac.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2660
  • C:\Users\Admin\AppData\Local\Temp\DA28.exe
    C:\Users\Admin\AppData\Local\Temp\DA28.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Rewurtuihyfrtty.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14106
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4528
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3240

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DA28.exe

      Filesize

      3.7MB

      MD5

      41572c531be01b24497e688b7149f124

      SHA1

      04cd03487cb2d0954f17f69149e09559bca2115e

      SHA256

      a7bd2a08efcf8a113cf8a08c6be697a3c83fa234a35af66bd5bab9cfd9b99c19

      SHA512

      211f0c6f501457b29fe7c2e7095a0f99121e9a823cf04acbb8b04f7415d6e1da6e75b7ed971f96ea3e765edf209912a50b4ae948b3b1eeb0c37e4701fd133d4f

    • C:\Users\Admin\AppData\Local\Temp\DA28.exe

      Filesize

      3.7MB

      MD5

      41572c531be01b24497e688b7149f124

      SHA1

      04cd03487cb2d0954f17f69149e09559bca2115e

      SHA256

      a7bd2a08efcf8a113cf8a08c6be697a3c83fa234a35af66bd5bab9cfd9b99c19

      SHA512

      211f0c6f501457b29fe7c2e7095a0f99121e9a823cf04acbb8b04f7415d6e1da6e75b7ed971f96ea3e765edf209912a50b4ae948b3b1eeb0c37e4701fd133d4f

    • C:\Users\Admin\AppData\Local\Temp\Rewurtuihyfrtty.dll

      Filesize

      4.3MB

      MD5

      8026ab4e1970183f8bd630c845fb8435

      SHA1

      166f0ab8a4ee08a5aa35af82c3cd41a96e7a9d4e

      SHA256

      b57dac1afcf5cd2b7209c029d303db178a3f77660789ed615fb4081fbd9ef867

      SHA512

      b096eee69f9312ed417a7bb33c818f6beecc5be72a5d39fc0f7105575b02d4027ee5c1bf8a3f5eb2e5221b68f67f2a811bb505838af8b83fa20f5e8ecfc5f718

    • \Users\Admin\AppData\Local\Temp\Rewurtuihyfrtty.dll

      Filesize

      4.3MB

      MD5

      8026ab4e1970183f8bd630c845fb8435

      SHA1

      166f0ab8a4ee08a5aa35af82c3cd41a96e7a9d4e

      SHA256

      b57dac1afcf5cd2b7209c029d303db178a3f77660789ed615fb4081fbd9ef867

      SHA512

      b096eee69f9312ed417a7bb33c818f6beecc5be72a5d39fc0f7105575b02d4027ee5c1bf8a3f5eb2e5221b68f67f2a811bb505838af8b83fa20f5e8ecfc5f718

    • \Users\Admin\AppData\Local\Temp\Rewurtuihyfrtty.dll

      Filesize

      4.3MB

      MD5

      8026ab4e1970183f8bd630c845fb8435

      SHA1

      166f0ab8a4ee08a5aa35af82c3cd41a96e7a9d4e

      SHA256

      b57dac1afcf5cd2b7209c029d303db178a3f77660789ed615fb4081fbd9ef867

      SHA512

      b096eee69f9312ed417a7bb33c818f6beecc5be72a5d39fc0f7105575b02d4027ee5c1bf8a3f5eb2e5221b68f67f2a811bb505838af8b83fa20f5e8ecfc5f718

    • memory/2660-135-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-130-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-118-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-119-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-120-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-121-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-122-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-123-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-124-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-125-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-126-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-127-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-128-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-140-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-131-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-139-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-132-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-133-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-134-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-116-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-136-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-137-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-117-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-138-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-129-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-141-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-142-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-143-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-144-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-145-0x0000000002EDA000-0x0000000002EEB000-memory.dmp

      Filesize

      68KB

    • memory/2660-147-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-148-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-146-0x0000000002D00000-0x0000000002D09000-memory.dmp

      Filesize

      36KB

    • memory/2660-149-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-150-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/2660-151-0x0000000000400000-0x0000000002B9D000-memory.dmp

      Filesize

      39.6MB

    • memory/2660-152-0x0000000002EDA000-0x0000000002EEB000-memory.dmp

      Filesize

      68KB

    • memory/2660-153-0x0000000000400000-0x0000000002B9D000-memory.dmp

      Filesize

      39.6MB

    • memory/2660-115-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4344-337-0x0000000005610000-0x0000000006196000-memory.dmp

      Filesize

      11.5MB

    • memory/4344-334-0x0000000006239000-0x000000000623B000-memory.dmp

      Filesize

      8KB

    • memory/4344-320-0x0000000005610000-0x0000000006196000-memory.dmp

      Filesize

      11.5MB

    • memory/4344-304-0x00000000042F0000-0x000000000473F000-memory.dmp

      Filesize

      4.3MB

    • memory/4344-267-0x00000000042F0000-0x000000000473F000-memory.dmp

      Filesize

      4.3MB

    • memory/4408-184-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-164-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-165-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-166-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-167-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-168-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-169-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-170-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-171-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-172-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-173-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-174-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-175-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-176-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-177-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-179-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-180-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-181-0x0000000004BF0000-0x0000000004F83000-memory.dmp

      Filesize

      3.6MB

    • memory/4408-182-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-183-0x0000000004F90000-0x0000000005470000-memory.dmp

      Filesize

      4.9MB

    • memory/4408-162-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-185-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-186-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-187-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-188-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-189-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-209-0x0000000000400000-0x0000000002F10000-memory.dmp

      Filesize

      43.1MB

    • memory/4408-210-0x0000000004BF0000-0x0000000004F83000-memory.dmp

      Filesize

      3.6MB

    • memory/4408-211-0x0000000004F90000-0x0000000005470000-memory.dmp

      Filesize

      4.9MB

    • memory/4408-161-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-160-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-159-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-158-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-212-0x0000000000400000-0x0000000002F10000-memory.dmp

      Filesize

      43.1MB

    • memory/4408-223-0x0000000000400000-0x0000000002F10000-memory.dmp

      Filesize

      43.1MB

    • memory/4408-156-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4408-157-0x0000000077A00000-0x0000000077B8E000-memory.dmp

      Filesize

      1.6MB

    • memory/4528-335-0x0000000000850000-0x0000000000AF2000-memory.dmp

      Filesize

      2.6MB

    • memory/4528-336-0x0000010685CA0000-0x0000010685F53000-memory.dmp

      Filesize

      2.7MB