Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2023, 09:20

General

  • Target

    file.exe

  • Size

    278KB

  • MD5

    6ea210bfd858868cd3d16e3c0e5284d4

  • SHA1

    1ed4eab42076ddbd524b701ab345b882a5c19eea

  • SHA256

    189b68dca1a8e4d0ec372e03b3442d09aff6b73928155ec9d4546ef6006427c3

  • SHA512

    961fd229491703fa0fb0619815b7ce80341ffa17b3994a272124d1ed85617c2b68c6de133c9827143bdc6c46db608f32479946ede83329923182dd8a389e6c3d

  • SSDEEP

    3072:7XOWy2p2EapL3dMel5cDX2mgJN4/R2nEYSSMSACdmEF2xU9Q/Wl:Tzp2E4LNF0U4ZK3dzF2xU9y

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 19 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1268
  • C:\Users\Admin\AppData\Local\Temp\DFF5.exe
    C:\Users\Admin\AppData\Local\Temp\DFF5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 15605
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 532
      2⤵
      • Program crash
      PID:3160
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4868 -ip 4868
    1⤵
      PID:4824
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4076

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\DFF5.exe

              Filesize

              1.0MB

              MD5

              15120b5b2109dcf3810dc75867859605

              SHA1

              408c22d623f4f6001e1d6a0711cc8610498df428

              SHA256

              64a7eb6bb893da24b6af8e00c58a4934b74c6941e58c4573d6e882ea9d1207c6

              SHA512

              a0dda18d2f304b6d92f64b676acbd0ccf4000e8c29d77fb624241e0e9f9dce60718a66b6ec256d24cb19deef0ce0e6839159565b862f08f8bfe5c8ecf7201876

            • C:\Users\Admin\AppData\Local\Temp\DFF5.exe

              Filesize

              1.0MB

              MD5

              15120b5b2109dcf3810dc75867859605

              SHA1

              408c22d623f4f6001e1d6a0711cc8610498df428

              SHA256

              64a7eb6bb893da24b6af8e00c58a4934b74c6941e58c4573d6e882ea9d1207c6

              SHA512

              a0dda18d2f304b6d92f64b676acbd0ccf4000e8c29d77fb624241e0e9f9dce60718a66b6ec256d24cb19deef0ce0e6839159565b862f08f8bfe5c8ecf7201876

            • C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp

              Filesize

              714KB

              MD5

              9dd70d24b2657a9254b9fd536a4d06d5

              SHA1

              348a1d210d7c4daef8ecdb692eadf3975971e8ee

              SHA256

              d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd

              SHA512

              dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6

            • C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp

              Filesize

              714KB

              MD5

              9dd70d24b2657a9254b9fd536a4d06d5

              SHA1

              348a1d210d7c4daef8ecdb692eadf3975971e8ee

              SHA256

              d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd

              SHA512

              dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6

            • memory/1268-135-0x0000000000400000-0x0000000003008000-memory.dmp

              Filesize

              44.0MB

            • memory/1268-134-0x0000000000400000-0x0000000003008000-memory.dmp

              Filesize

              44.0MB

            • memory/1268-132-0x000000000328D000-0x00000000032A3000-memory.dmp

              Filesize

              88KB

            • memory/1268-133-0x0000000003260000-0x0000000003269000-memory.dmp

              Filesize

              36KB

            • memory/1940-158-0x0000000000BA0000-0x0000000000E41000-memory.dmp

              Filesize

              2.6MB

            • memory/1940-155-0x00000298EC950000-0x00000298ECA90000-memory.dmp

              Filesize

              1.2MB

            • memory/1940-157-0x00000298EAEF0000-0x00000298EB1A2000-memory.dmp

              Filesize

              2.7MB

            • memory/1940-156-0x00000298EC950000-0x00000298ECA90000-memory.dmp

              Filesize

              1.2MB

            • memory/1940-159-0x00000298EAEF0000-0x00000298EB1A2000-memory.dmp

              Filesize

              2.7MB

            • memory/4868-144-0x0000000000400000-0x00000000030C7000-memory.dmp

              Filesize

              44.8MB

            • memory/4868-143-0x0000000004E60000-0x0000000004F75000-memory.dmp

              Filesize

              1.1MB

            • memory/4868-141-0x0000000004CF1000-0x0000000004DC5000-memory.dmp

              Filesize

              848KB

            • memory/4880-151-0x0000000004220000-0x0000000004360000-memory.dmp

              Filesize

              1.2MB

            • memory/4880-152-0x0000000004220000-0x0000000004360000-memory.dmp

              Filesize

              1.2MB

            • memory/4880-150-0x0000000004220000-0x0000000004360000-memory.dmp

              Filesize

              1.2MB

            • memory/4880-154-0x0000000004299000-0x000000000429B000-memory.dmp

              Filesize

              8KB

            • memory/4880-149-0x0000000004220000-0x0000000004360000-memory.dmp

              Filesize

              1.2MB

            • memory/4880-148-0x0000000004220000-0x0000000004360000-memory.dmp

              Filesize

              1.2MB

            • memory/4880-147-0x0000000004220000-0x0000000004360000-memory.dmp

              Filesize

              1.2MB

            • memory/4880-146-0x0000000004820000-0x0000000005361000-memory.dmp

              Filesize

              11.3MB

            • memory/4880-145-0x0000000004820000-0x0000000005361000-memory.dmp

              Filesize

              11.3MB

            • memory/4880-160-0x0000000004820000-0x0000000005361000-memory.dmp

              Filesize

              11.3MB