Analysis

  • max time kernel
    146s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2023 08:31

General

  • Target

    file.exe

  • Size

    316KB

  • MD5

    6e97a25f0258f7c08ea8ecf35262fd70

  • SHA1

    436f07c1757f8f7d82a4cc1f88fea5ab393151e3

  • SHA256

    2935b22cf4d1cd82e84031196d4fb50ab47f75bd0a4cf5d652a3a0c7a05630ec

  • SHA512

    f22c0df471490a107156152e3cca29e74fc12a8a30ec7f19c4cdec0d7425080e2f40cbd8f2304d49232572d575900c21f6f21cbf5460808570312daeb75a2e04

  • SSDEEP

    6144:KKL50V19SKzRAi9AJZMx9/CJTk637eQfnd5auB:Fi1wiy89CJb7d5

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4820
  • C:\Users\Admin\AppData\Local\Temp\11C3.exe
    C:\Users\Admin\AppData\Local\Temp\11C3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Rqdarrhtrsoihy.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14076
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 404
      2⤵
      • Program crash
      PID:3564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4916 -ip 4916
    1⤵
      PID:3452
    • C:\Users\Admin\AppData\Local\Temp\6A05.exe
      C:\Users\Admin\AppData\Local\Temp\6A05.exe
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
        C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
        2⤵
        • Executes dropped EXE
        PID:3088
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1732

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\11C3.exe

        Filesize

        3.2MB

        MD5

        a4700ec681179281e843ee627e9920ec

        SHA1

        4eb090bbf8cfbd9a117c00976d7df516f7c54c3b

        SHA256

        1d2deeb2342c39825ddf077c76b49fd06af36ad04aa04246258e8b07ca07e653

        SHA512

        07d0a3b24a00cc9d302b24f2832ed6910616362a3b8f5d341603a89841e767cd84acde78ed7ed00bacc0c758c4544b29aace677473c19c3a9b9f4da7a4b1a6da

      • C:\Users\Admin\AppData\Local\Temp\11C3.exe

        Filesize

        3.2MB

        MD5

        a4700ec681179281e843ee627e9920ec

        SHA1

        4eb090bbf8cfbd9a117c00976d7df516f7c54c3b

        SHA256

        1d2deeb2342c39825ddf077c76b49fd06af36ad04aa04246258e8b07ca07e653

        SHA512

        07d0a3b24a00cc9d302b24f2832ed6910616362a3b8f5d341603a89841e767cd84acde78ed7ed00bacc0c758c4544b29aace677473c19c3a9b9f4da7a4b1a6da

      • C:\Users\Admin\AppData\Local\Temp\6A05.exe

        Filesize

        1.9MB

        MD5

        63589fa4ff8152a1c42d4e842f7225ad

        SHA1

        699de2b96129b4b31fef9249dea15b51f978212f

        SHA256

        15cdd99ecee05ee297db2ad94c208dfa1901d9e55220bb7a77af69f4f83d1973

        SHA512

        b3ea8ef5569a68cf646d224dcbf5f913e74efa307330f2c442ca7f773a50c50221bb61c2af2acb436c613ad8b4d06d5f31cf1c84605f865a0c92df81c7870b58

      • C:\Users\Admin\AppData\Local\Temp\6A05.exe

        Filesize

        1.9MB

        MD5

        63589fa4ff8152a1c42d4e842f7225ad

        SHA1

        699de2b96129b4b31fef9249dea15b51f978212f

        SHA256

        15cdd99ecee05ee297db2ad94c208dfa1901d9e55220bb7a77af69f4f83d1973

        SHA512

        b3ea8ef5569a68cf646d224dcbf5f913e74efa307330f2c442ca7f773a50c50221bb61c2af2acb436c613ad8b4d06d5f31cf1c84605f865a0c92df81c7870b58

      • C:\Users\Admin\AppData\Local\Temp\Rqdarrhtrsoihy.dll

        Filesize

        4.3MB

        MD5

        1eb5dd6be222b0d6a9c975bee1352cad

        SHA1

        fa460168bde8502dcde6a77c98852f1367d3898e

        SHA256

        b2f8487f277a21abeed2e79e68b4d92afe25f77c02f90ce2b3162b2f40e3cdb7

        SHA512

        2b8c6334fc3a6c20669b2e0b0277e949bd9aeee15e63465d33a03c610ba17beb10db78401aadc78b6b5649ad9c2abae90a98375faae3b621daa42697750f8e2b

      • C:\Users\Admin\AppData\Local\Temp\Rqdarrhtrsoihy.dll

        Filesize

        4.3MB

        MD5

        1eb5dd6be222b0d6a9c975bee1352cad

        SHA1

        fa460168bde8502dcde6a77c98852f1367d3898e

        SHA256

        b2f8487f277a21abeed2e79e68b4d92afe25f77c02f90ce2b3162b2f40e3cdb7

        SHA512

        2b8c6334fc3a6c20669b2e0b0277e949bd9aeee15e63465d33a03c610ba17beb10db78401aadc78b6b5649ad9c2abae90a98375faae3b621daa42697750f8e2b

      • C:\Users\Admin\AppData\Local\Temp\Rqdarrhtrsoihy.dll

        Filesize

        4.3MB

        MD5

        1eb5dd6be222b0d6a9c975bee1352cad

        SHA1

        fa460168bde8502dcde6a77c98852f1367d3898e

        SHA256

        b2f8487f277a21abeed2e79e68b4d92afe25f77c02f90ce2b3162b2f40e3cdb7

        SHA512

        2b8c6334fc3a6c20669b2e0b0277e949bd9aeee15e63465d33a03c610ba17beb10db78401aadc78b6b5649ad9c2abae90a98375faae3b621daa42697750f8e2b

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        611.2MB

        MD5

        724d83f668b42f8999785cd0d3b75ef7

        SHA1

        24f6bfcf6950b0eee4b37856a2204064e7d60753

        SHA256

        94fce15e0bb920d6fab4e02b3bf4e48f46e7c5c76b76283d383429e5d5c6e265

        SHA512

        7fc2b3efb3f8ee1ff6db035832050e5493c18a9f56706681e0627802c7fa6d8f5c979e80a56a050dd4de8907f25b13cb2d2c6240ddfae91db3f5a34fd773bd73

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        613.4MB

        MD5

        b572d9457d1795df7217aea9064ce37a

        SHA1

        36ca8bf26411392dda40ff8e7cf8ed6615edad76

        SHA256

        f277aa7cc9e83b62bd1ba29b821ba5c5197ac114857468d131d99608c1f50402

        SHA512

        2a15064cccd195d06208dd55e7a7c60f1db7aa6ca9077c10420032c486376f763230f13915a45fd272ea2d85ceb36a8502a8b5b34a48a9dbf9d6ce0b0dfd5f76

      • memory/2992-154-0x00000000026C0000-0x0000000002A90000-memory.dmp

        Filesize

        3.8MB

      • memory/2992-155-0x0000000000400000-0x0000000000803000-memory.dmp

        Filesize

        4.0MB

      • memory/2992-172-0x0000000000400000-0x0000000000803000-memory.dmp

        Filesize

        4.0MB

      • memory/2992-153-0x000000000240F000-0x00000000025B9000-memory.dmp

        Filesize

        1.7MB

      • memory/3088-175-0x0000000000400000-0x0000000000803000-memory.dmp

        Filesize

        4.0MB

      • memory/3088-174-0x0000000002374000-0x000000000251E000-memory.dmp

        Filesize

        1.7MB

      • memory/3104-168-0x0000025C9DAA0000-0x0000025C9DD4C000-memory.dmp

        Filesize

        2.7MB

      • memory/3104-167-0x0000000000600000-0x000000000089B000-memory.dmp

        Filesize

        2.6MB

      • memory/3104-165-0x0000025C9F360000-0x0000025C9F4A0000-memory.dmp

        Filesize

        1.2MB

      • memory/3104-164-0x0000025C9F360000-0x0000025C9F4A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4140-166-0x00000000040C9000-0x00000000040CB000-memory.dmp

        Filesize

        8KB

      • memory/4140-146-0x0000000001F80000-0x00000000023CE000-memory.dmp

        Filesize

        4.3MB

      • memory/4140-156-0x0000000003460000-0x0000000003F90000-memory.dmp

        Filesize

        11.2MB

      • memory/4140-157-0x0000000004050000-0x0000000004190000-memory.dmp

        Filesize

        1.2MB

      • memory/4140-158-0x0000000004050000-0x0000000004190000-memory.dmp

        Filesize

        1.2MB

      • memory/4140-159-0x0000000004050000-0x0000000004190000-memory.dmp

        Filesize

        1.2MB

      • memory/4140-160-0x0000000004050000-0x0000000004190000-memory.dmp

        Filesize

        1.2MB

      • memory/4140-161-0x0000000004050000-0x0000000004190000-memory.dmp

        Filesize

        1.2MB

      • memory/4140-162-0x0000000004050000-0x0000000004190000-memory.dmp

        Filesize

        1.2MB

      • memory/4140-152-0x0000000003460000-0x0000000003F90000-memory.dmp

        Filesize

        11.2MB

      • memory/4140-151-0x0000000003460000-0x0000000003F90000-memory.dmp

        Filesize

        11.2MB

      • memory/4140-173-0x0000000003460000-0x0000000003F90000-memory.dmp

        Filesize

        11.2MB

      • memory/4820-135-0x0000000000400000-0x000000000046A000-memory.dmp

        Filesize

        424KB

      • memory/4820-134-0x0000000000400000-0x000000000046A000-memory.dmp

        Filesize

        424KB

      • memory/4820-133-0x00000000021A0000-0x00000000021A9000-memory.dmp

        Filesize

        36KB

      • memory/4820-132-0x000000000071D000-0x0000000000732000-memory.dmp

        Filesize

        84KB

      • memory/4916-147-0x0000000000400000-0x00000000007C3000-memory.dmp

        Filesize

        3.8MB

      • memory/4916-140-0x0000000002720000-0x0000000002AD7000-memory.dmp

        Filesize

        3.7MB

      • memory/4916-139-0x00000000022D7000-0x00000000025DA000-memory.dmp

        Filesize

        3.0MB

      • memory/4916-141-0x0000000000400000-0x00000000007C3000-memory.dmp

        Filesize

        3.8MB