Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2023, 11:35

General

  • Target

    decaa53dfe4684d0d4aa1ebfcda3a589c5328056117f31d53cfb8998ca182148.exe

  • Size

    195KB

  • MD5

    5fb7c7cd72e34ddd1d3705ee5293c5d0

  • SHA1

    0c31ac2f62b347c386a23eebe45e43d761df8044

  • SHA256

    decaa53dfe4684d0d4aa1ebfcda3a589c5328056117f31d53cfb8998ca182148

  • SHA512

    138559d29fbc5f7227ad4262bc052c2f161f6b0c858418874313e22543e63597b602a26d644484a70cb2616745300f72977680b0629a7bd0a7e19250c515715a

  • SSDEEP

    3072:trH6my7CYONNSEhkQao85deBz/SihYCd+8SNv8kR52S2VEjV:tD6cYONNNSFo8yMCd/2v8kH2Sjj

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\decaa53dfe4684d0d4aa1ebfcda3a589c5328056117f31d53cfb8998ca182148.exe
    "C:\Users\Admin\AppData\Local\Temp\decaa53dfe4684d0d4aa1ebfcda3a589c5328056117f31d53cfb8998ca182148.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4400
  • C:\Users\Admin\AppData\Local\Temp\5F75.exe
    C:\Users\Admin\AppData\Local\Temp\5F75.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14177
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 696
      2⤵
      • Program crash
      PID:764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3112 -ip 3112
    1⤵
      PID:3000
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3388

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5F75.exe

        Filesize

        3.6MB

        MD5

        78f6713100b8857defaf4426ee337535

        SHA1

        85eeb2b16d6e01a12badb3f7bf1d7564b31c1c69

        SHA256

        ef0717bb59204e9f4de07c202a9581414aca433d647588c83ac7f19dee8388a3

        SHA512

        c6632f28f75d008b1d81125bd7424b670740caae6fcdd659202abe6b6dfcf8f28b086218bb83b540857428da7d1fe9147278a43110517e79d82d2473590f182f

      • C:\Users\Admin\AppData\Local\Temp\5F75.exe

        Filesize

        3.6MB

        MD5

        78f6713100b8857defaf4426ee337535

        SHA1

        85eeb2b16d6e01a12badb3f7bf1d7564b31c1c69

        SHA256

        ef0717bb59204e9f4de07c202a9581414aca433d647588c83ac7f19dee8388a3

        SHA512

        c6632f28f75d008b1d81125bd7424b670740caae6fcdd659202abe6b6dfcf8f28b086218bb83b540857428da7d1fe9147278a43110517e79d82d2473590f182f

      • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

        Filesize

        4.3MB

        MD5

        0ab9c507cda0f962daa8bf006cc94a98

        SHA1

        60d7d844e93721639c5d9db5069ca577bd10384a

        SHA256

        c217eebfef5524a2ba830653657ddbbfee92865abd84275d0376200995470480

        SHA512

        3053192ccb55430f008cc6796e460f3d9b51770539c90240b03675253da1a374f2124093db02eb9b11f987e6a9e4f8f0cbd0fb5de7192c51a8efc518c89bfe0b

      • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

        Filesize

        4.3MB

        MD5

        0ab9c507cda0f962daa8bf006cc94a98

        SHA1

        60d7d844e93721639c5d9db5069ca577bd10384a

        SHA256

        c217eebfef5524a2ba830653657ddbbfee92865abd84275d0376200995470480

        SHA512

        3053192ccb55430f008cc6796e460f3d9b51770539c90240b03675253da1a374f2124093db02eb9b11f987e6a9e4f8f0cbd0fb5de7192c51a8efc518c89bfe0b

      • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

        Filesize

        4.3MB

        MD5

        0ab9c507cda0f962daa8bf006cc94a98

        SHA1

        60d7d844e93721639c5d9db5069ca577bd10384a

        SHA256

        c217eebfef5524a2ba830653657ddbbfee92865abd84275d0376200995470480

        SHA512

        3053192ccb55430f008cc6796e460f3d9b51770539c90240b03675253da1a374f2124093db02eb9b11f987e6a9e4f8f0cbd0fb5de7192c51a8efc518c89bfe0b

      • memory/632-157-0x0000000003FE0000-0x0000000004120000-memory.dmp

        Filesize

        1.2MB

      • memory/632-150-0x00000000033D0000-0x0000000003F1D000-memory.dmp

        Filesize

        11.3MB

      • memory/632-155-0x0000000003FE0000-0x0000000004120000-memory.dmp

        Filesize

        1.2MB

      • memory/632-154-0x0000000003FE0000-0x0000000004120000-memory.dmp

        Filesize

        1.2MB

      • memory/632-153-0x0000000003FE0000-0x0000000004120000-memory.dmp

        Filesize

        1.2MB

      • memory/632-152-0x0000000003FE0000-0x0000000004120000-memory.dmp

        Filesize

        1.2MB

      • memory/632-158-0x0000000003FE0000-0x0000000004120000-memory.dmp

        Filesize

        1.2MB

      • memory/632-156-0x0000000004059000-0x000000000405B000-memory.dmp

        Filesize

        8KB

      • memory/632-164-0x00000000033D0000-0x0000000003F1D000-memory.dmp

        Filesize

        11.3MB

      • memory/632-147-0x0000000002280000-0x00000000026D5000-memory.dmp

        Filesize

        4.3MB

      • memory/632-151-0x00000000033D0000-0x0000000003F1D000-memory.dmp

        Filesize

        11.3MB

      • memory/632-149-0x00000000033D0000-0x0000000003F1D000-memory.dmp

        Filesize

        11.3MB

      • memory/3112-140-0x0000000002950000-0x0000000002E3A000-memory.dmp

        Filesize

        4.9MB

      • memory/3112-142-0x0000000000400000-0x00000000008F6000-memory.dmp

        Filesize

        5.0MB

      • memory/3112-141-0x0000000000400000-0x00000000008F6000-memory.dmp

        Filesize

        5.0MB

      • memory/3112-148-0x0000000000400000-0x00000000008F6000-memory.dmp

        Filesize

        5.0MB

      • memory/3112-139-0x00000000025C7000-0x000000000294F000-memory.dmp

        Filesize

        3.5MB

      • memory/3568-161-0x000001BD78890000-0x000001BD789D0000-memory.dmp

        Filesize

        1.2MB

      • memory/3568-163-0x000001BD76E40000-0x000001BD770E9000-memory.dmp

        Filesize

        2.7MB

      • memory/3568-162-0x0000000000B50000-0x0000000000DE7000-memory.dmp

        Filesize

        2.6MB

      • memory/3568-160-0x000001BD78890000-0x000001BD789D0000-memory.dmp

        Filesize

        1.2MB

      • memory/4400-132-0x0000000000778000-0x000000000078B000-memory.dmp

        Filesize

        76KB

      • memory/4400-134-0x0000000000400000-0x0000000000562000-memory.dmp

        Filesize

        1.4MB

      • memory/4400-135-0x0000000000400000-0x0000000000562000-memory.dmp

        Filesize

        1.4MB

      • memory/4400-133-0x0000000000700000-0x0000000000709000-memory.dmp

        Filesize

        36KB