Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 19:18

General

  • Target

    e30d968d97545bd477dcba4b4ddb5e1f720724a8f744e68a73d3115f25e30f37.exe

  • Size

    268KB

  • MD5

    8a589feb0a2b8e03e39272f963183619

  • SHA1

    629a3b45d8b922d24e85ed5b1cd221fc0dfb4321

  • SHA256

    e30d968d97545bd477dcba4b4ddb5e1f720724a8f744e68a73d3115f25e30f37

  • SHA512

    771eaa1f931290766121a8030c570c675cd0d2797fe39b575167144895356795bd7d488c45efccda87436baaf3a784843b58b0cfa1db3131a866db947fb64b7e

  • SSDEEP

    6144:Br7fILCKf0GxYvNZAzFQRd2FNGpMskFQH2Yp:xLI2KfpxmgCR4FURkFo2Y

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e30d968d97545bd477dcba4b4ddb5e1f720724a8f744e68a73d3115f25e30f37.exe
    "C:\Users\Admin\AppData\Local\Temp\e30d968d97545bd477dcba4b4ddb5e1f720724a8f744e68a73d3115f25e30f37.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4864
  • C:\Users\Admin\AppData\Local\Temp\5FC3.exe
    C:\Users\Admin\AppData\Local\Temp\5FC3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Rruwtqrefy.tmp",Uuhpdwiyer
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17229
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3440
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 532
      2⤵
      • Program crash
      PID:3040
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3360 -ip 3360
    1⤵
      PID:4868
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1516
      • C:\Users\Admin\AppData\Roaming\brievsf
        C:\Users\Admin\AppData\Roaming\brievsf
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:1264

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5FC3.exe

        Filesize

        1.1MB

        MD5

        0dcf30297b84f0b92ce574252bbf581a

        SHA1

        e5a143543efc1c6f8a2eddab2bd6962bcd3323f2

        SHA256

        17a7b2bcecfe6a6e95c0ce174459117ad1f3510212af673789692b2f2cbe0ddf

        SHA512

        70c18d30a12f829a68fb8a06faf01aeaa41905ebb058530b2cd91acf8ec88100205d1554effa2429b6849a6204944a058d72d9b555f05828504811a73518c504

      • C:\Users\Admin\AppData\Local\Temp\5FC3.exe

        Filesize

        1.1MB

        MD5

        0dcf30297b84f0b92ce574252bbf581a

        SHA1

        e5a143543efc1c6f8a2eddab2bd6962bcd3323f2

        SHA256

        17a7b2bcecfe6a6e95c0ce174459117ad1f3510212af673789692b2f2cbe0ddf

        SHA512

        70c18d30a12f829a68fb8a06faf01aeaa41905ebb058530b2cd91acf8ec88100205d1554effa2429b6849a6204944a058d72d9b555f05828504811a73518c504

      • C:\Users\Admin\AppData\Local\Temp\Rruwtqrefy.tmp

        Filesize

        805KB

        MD5

        44d724c9ad9ae3149d4997852eea3e96

        SHA1

        dcd92e1b704b3f25ba455e079004c5a5aaf903f9

        SHA256

        c5cd7d52ba95127c18556a2ddca64e4ef80a2945e6579545c0067abdab3a0ad0

        SHA512

        791c3b62685a475799a991b2f0f9535781c888d48d1dd47b5b2cd407ff46e15231247f07ceb63c012bd923bf88fffaecf29030186e3d569b9886048881012e44

      • C:\Users\Admin\AppData\Local\Temp\Rruwtqrefy.tmp

        Filesize

        805KB

        MD5

        44d724c9ad9ae3149d4997852eea3e96

        SHA1

        dcd92e1b704b3f25ba455e079004c5a5aaf903f9

        SHA256

        c5cd7d52ba95127c18556a2ddca64e4ef80a2945e6579545c0067abdab3a0ad0

        SHA512

        791c3b62685a475799a991b2f0f9535781c888d48d1dd47b5b2cd407ff46e15231247f07ceb63c012bd923bf88fffaecf29030186e3d569b9886048881012e44

      • C:\Users\Admin\AppData\Roaming\brievsf

        Filesize

        268KB

        MD5

        8a589feb0a2b8e03e39272f963183619

        SHA1

        629a3b45d8b922d24e85ed5b1cd221fc0dfb4321

        SHA256

        e30d968d97545bd477dcba4b4ddb5e1f720724a8f744e68a73d3115f25e30f37

        SHA512

        771eaa1f931290766121a8030c570c675cd0d2797fe39b575167144895356795bd7d488c45efccda87436baaf3a784843b58b0cfa1db3131a866db947fb64b7e

      • C:\Users\Admin\AppData\Roaming\brievsf

        Filesize

        268KB

        MD5

        8a589feb0a2b8e03e39272f963183619

        SHA1

        629a3b45d8b922d24e85ed5b1cd221fc0dfb4321

        SHA256

        e30d968d97545bd477dcba4b4ddb5e1f720724a8f744e68a73d3115f25e30f37

        SHA512

        771eaa1f931290766121a8030c570c675cd0d2797fe39b575167144895356795bd7d488c45efccda87436baaf3a784843b58b0cfa1db3131a866db947fb64b7e

      • memory/1264-165-0x0000000000400000-0x0000000002BAA000-memory.dmp

        Filesize

        39.7MB

      • memory/1264-164-0x0000000000400000-0x0000000002BAA000-memory.dmp

        Filesize

        39.7MB

      • memory/1264-163-0x0000000002CED000-0x0000000002CFE000-memory.dmp

        Filesize

        68KB

      • memory/1272-148-0x0000000004C30000-0x0000000004D70000-memory.dmp

        Filesize

        1.2MB

      • memory/1272-160-0x0000000005270000-0x0000000005D9F000-memory.dmp

        Filesize

        11.2MB

      • memory/1272-155-0x0000000004CA9000-0x0000000004CAB000-memory.dmp

        Filesize

        8KB

      • memory/1272-152-0x0000000004C30000-0x0000000004D70000-memory.dmp

        Filesize

        1.2MB

      • memory/1272-146-0x0000000005270000-0x0000000005D9F000-memory.dmp

        Filesize

        11.2MB

      • memory/1272-147-0x0000000005270000-0x0000000005D9F000-memory.dmp

        Filesize

        11.2MB

      • memory/1272-153-0x0000000004C30000-0x0000000004D70000-memory.dmp

        Filesize

        1.2MB

      • memory/1272-149-0x0000000004C30000-0x0000000004D70000-memory.dmp

        Filesize

        1.2MB

      • memory/1272-150-0x0000000004C30000-0x0000000004D70000-memory.dmp

        Filesize

        1.2MB

      • memory/1272-151-0x0000000004C30000-0x0000000004D70000-memory.dmp

        Filesize

        1.2MB

      • memory/3360-142-0x000000000493E000-0x0000000004A22000-memory.dmp

        Filesize

        912KB

      • memory/3360-145-0x0000000000400000-0x0000000002C7D000-memory.dmp

        Filesize

        40.5MB

      • memory/3360-144-0x0000000000400000-0x0000000002C7D000-memory.dmp

        Filesize

        40.5MB

      • memory/3360-143-0x0000000004A30000-0x0000000004B54000-memory.dmp

        Filesize

        1.1MB

      • memory/3440-158-0x0000000000C60000-0x0000000000EF8000-memory.dmp

        Filesize

        2.6MB

      • memory/3440-159-0x0000012A3E100000-0x0000012A3E3A9000-memory.dmp

        Filesize

        2.7MB

      • memory/3440-157-0x0000012A3F9C0000-0x0000012A3FB00000-memory.dmp

        Filesize

        1.2MB

      • memory/3440-156-0x0000012A3F9C0000-0x0000012A3FB00000-memory.dmp

        Filesize

        1.2MB

      • memory/4864-132-0x0000000002D8D000-0x0000000002D9D000-memory.dmp

        Filesize

        64KB

      • memory/4864-135-0x0000000000400000-0x0000000002BAA000-memory.dmp

        Filesize

        39.7MB

      • memory/4864-134-0x0000000000400000-0x0000000002BAA000-memory.dmp

        Filesize

        39.7MB

      • memory/4864-133-0x0000000002D40000-0x0000000002D49000-memory.dmp

        Filesize

        36KB