Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2023 01:09

General

  • Target

    d522a2afd51e06415121bdb9086b1184203f2d102d5e11f105942384a0fe6926.exe

  • Size

    252KB

  • MD5

    67e18e5dba3b7af185f1f5f555727f2a

  • SHA1

    d927f201c3f52341624da9414f4efdec1dbe191c

  • SHA256

    d522a2afd51e06415121bdb9086b1184203f2d102d5e11f105942384a0fe6926

  • SHA512

    ba03f854cf2753200d950a40b1b7af800efccf2fa28e7cb68b4913053095273ba73902b3bddd89aca3ba496b52e1fa9f921b75a6209d03911d185bbfef32eec6

  • SSDEEP

    3072:CbQnrBNL1pE1GBhboo4g0xg4nCmoiTq+G90xHHPV0v:0YrjLUGJv0tnCmRTW4HHK

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d522a2afd51e06415121bdb9086b1184203f2d102d5e11f105942384a0fe6926.exe
    "C:\Users\Admin\AppData\Local\Temp\d522a2afd51e06415121bdb9086b1184203f2d102d5e11f105942384a0fe6926.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4992
  • C:\Users\Admin\AppData\Roaming\civbsbb
    C:\Users\Admin\AppData\Roaming\civbsbb
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3892
  • C:\Users\Admin\AppData\Local\Temp\180C.exe
    C:\Users\Admin\AppData\Local\Temp\180C.exe
    1⤵
    • Executes dropped EXE
    PID:1216
  • C:\Users\Admin\AppData\Local\Temp\2D2B.exe
    C:\Users\Admin\AppData\Local\Temp\2D2B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 212
      2⤵
      • Program crash
      PID:2024
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:1296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3552 -ip 3552
      1⤵
        PID:2052
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:828
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:4240
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:4248
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:3452
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1004
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:4520
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:1848
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:1448

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\180C.exe

                        Filesize

                        4KB

                        MD5

                        9748489855d9dd82ab09da5e3e55b19e

                        SHA1

                        6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                        SHA256

                        05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                        SHA512

                        7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                      • C:\Users\Admin\AppData\Local\Temp\180C.exe

                        Filesize

                        4KB

                        MD5

                        9748489855d9dd82ab09da5e3e55b19e

                        SHA1

                        6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                        SHA256

                        05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                        SHA512

                        7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                      • C:\Users\Admin\AppData\Local\Temp\2D2B.exe

                        Filesize

                        1.2MB

                        MD5

                        dc27ef8aa9c5c53103d8fb56bbde1b29

                        SHA1

                        e38af16c0e9246bccce5b5dff0fd11a4f3c49f28

                        SHA256

                        67b26a8d7f192326203f250d49ba5ed085107cad937fa71aeae923969e6b27a7

                        SHA512

                        3ce6972af50a8e32a7327fc52e51a46593dcef017351b24777511b9d4fb2a748b0755978fd809a9788ba6af1dc4c7a8fb0580bf785326e9de0eed370281de1eb

                      • C:\Users\Admin\AppData\Local\Temp\2D2B.exe

                        Filesize

                        1.2MB

                        MD5

                        dc27ef8aa9c5c53103d8fb56bbde1b29

                        SHA1

                        e38af16c0e9246bccce5b5dff0fd11a4f3c49f28

                        SHA256

                        67b26a8d7f192326203f250d49ba5ed085107cad937fa71aeae923969e6b27a7

                        SHA512

                        3ce6972af50a8e32a7327fc52e51a46593dcef017351b24777511b9d4fb2a748b0755978fd809a9788ba6af1dc4c7a8fb0580bf785326e9de0eed370281de1eb

                      • C:\Users\Admin\AppData\Roaming\civbsbb

                        Filesize

                        252KB

                        MD5

                        67e18e5dba3b7af185f1f5f555727f2a

                        SHA1

                        d927f201c3f52341624da9414f4efdec1dbe191c

                        SHA256

                        d522a2afd51e06415121bdb9086b1184203f2d102d5e11f105942384a0fe6926

                        SHA512

                        ba03f854cf2753200d950a40b1b7af800efccf2fa28e7cb68b4913053095273ba73902b3bddd89aca3ba496b52e1fa9f921b75a6209d03911d185bbfef32eec6

                      • C:\Users\Admin\AppData\Roaming\civbsbb

                        Filesize

                        252KB

                        MD5

                        67e18e5dba3b7af185f1f5f555727f2a

                        SHA1

                        d927f201c3f52341624da9414f4efdec1dbe191c

                        SHA256

                        d522a2afd51e06415121bdb9086b1184203f2d102d5e11f105942384a0fe6926

                        SHA512

                        ba03f854cf2753200d950a40b1b7af800efccf2fa28e7cb68b4913053095273ba73902b3bddd89aca3ba496b52e1fa9f921b75a6209d03911d185bbfef32eec6

                      • memory/828-166-0x00000000007F0000-0x00000000007FF000-memory.dmp

                        Filesize

                        60KB

                      • memory/828-196-0x0000000000A80000-0x0000000000A89000-memory.dmp

                        Filesize

                        36KB

                      • memory/828-164-0x0000000000A80000-0x0000000000A89000-memory.dmp

                        Filesize

                        36KB

                      • memory/828-161-0x0000000000000000-mapping.dmp

                      • memory/1004-180-0x0000000000000000-mapping.dmp

                      • memory/1004-200-0x00000000006D0000-0x00000000006D5000-memory.dmp

                        Filesize

                        20KB

                      • memory/1004-184-0x00000000006D0000-0x00000000006D5000-memory.dmp

                        Filesize

                        20KB

                      • memory/1004-185-0x00000000006C0000-0x00000000006C9000-memory.dmp

                        Filesize

                        36KB

                      • memory/1216-141-0x0000000000000000-mapping.dmp

                      • memory/1216-145-0x00007FFB5D340000-0x00007FFB5DE01000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1216-144-0x00000000008D0000-0x00000000008D8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1296-195-0x0000000001650000-0x0000000001657000-memory.dmp

                        Filesize

                        28KB

                      • memory/1296-148-0x0000000000000000-mapping.dmp

                      • memory/1296-160-0x0000000001640000-0x000000000164B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1296-157-0x0000000001650000-0x0000000001657000-memory.dmp

                        Filesize

                        28KB

                      • memory/1448-192-0x0000000000000000-mapping.dmp

                      • memory/1448-194-0x00000000013D0000-0x00000000013DB000-memory.dmp

                        Filesize

                        44KB

                      • memory/1448-203-0x00000000013E0000-0x00000000013E8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1448-193-0x00000000013E0000-0x00000000013E8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1848-187-0x0000000000000000-mapping.dmp

                      • memory/1848-190-0x00000000010C0000-0x00000000010CD000-memory.dmp

                        Filesize

                        52KB

                      • memory/1848-202-0x00000000010D0000-0x00000000010D7000-memory.dmp

                        Filesize

                        28KB

                      • memory/1848-189-0x00000000010D0000-0x00000000010D7000-memory.dmp

                        Filesize

                        28KB

                      • memory/2428-172-0x0000000005EB0000-0x0000000005F42000-memory.dmp

                        Filesize

                        584KB

                      • memory/2428-163-0x0000000004F90000-0x0000000004FCC000-memory.dmp

                        Filesize

                        240KB

                      • memory/2428-167-0x0000000005330000-0x0000000005396000-memory.dmp

                        Filesize

                        408KB

                      • memory/2428-156-0x00000000054A0000-0x0000000005AB8000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/2428-162-0x0000000005060000-0x000000000516A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2428-150-0x0000000000000000-mapping.dmp

                      • memory/2428-171-0x0000000006370000-0x0000000006914000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2428-159-0x0000000004F30000-0x0000000004F42000-memory.dmp

                        Filesize

                        72KB

                      • memory/2428-173-0x0000000006130000-0x00000000061A6000-memory.dmp

                        Filesize

                        472KB

                      • memory/2428-151-0x00000000003B0000-0x00000000003F4000-memory.dmp

                        Filesize

                        272KB

                      • memory/2428-191-0x0000000006970000-0x00000000069C0000-memory.dmp

                        Filesize

                        320KB

                      • memory/2428-179-0x0000000006210000-0x000000000622E000-memory.dmp

                        Filesize

                        120KB

                      • memory/2428-177-0x0000000006AF0000-0x0000000006CB2000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/2428-178-0x00000000071F0000-0x000000000771C000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/3452-181-0x0000000000A90000-0x0000000000AB2000-memory.dmp

                        Filesize

                        136KB

                      • memory/3452-182-0x0000000000A60000-0x0000000000A87000-memory.dmp

                        Filesize

                        156KB

                      • memory/3452-174-0x0000000000000000-mapping.dmp

                      • memory/3452-199-0x0000000000A90000-0x0000000000AB2000-memory.dmp

                        Filesize

                        136KB

                      • memory/3552-146-0x0000000000000000-mapping.dmp

                      • memory/3552-158-0x0000000000120000-0x0000000000251000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/3892-138-0x000000000076E000-0x0000000000784000-memory.dmp

                        Filesize

                        88KB

                      • memory/3892-139-0x0000000000400000-0x00000000005D9000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/3892-140-0x0000000000400000-0x00000000005D9000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/4240-168-0x0000000000160000-0x0000000000165000-memory.dmp

                        Filesize

                        20KB

                      • memory/4240-170-0x0000000000150000-0x0000000000159000-memory.dmp

                        Filesize

                        36KB

                      • memory/4240-165-0x0000000000000000-mapping.dmp

                      • memory/4240-197-0x0000000000160000-0x0000000000165000-memory.dmp

                        Filesize

                        20KB

                      • memory/4248-169-0x0000000000000000-mapping.dmp

                      • memory/4248-175-0x0000000001080000-0x0000000001086000-memory.dmp

                        Filesize

                        24KB

                      • memory/4248-176-0x0000000000DF0000-0x0000000000DFC000-memory.dmp

                        Filesize

                        48KB

                      • memory/4248-198-0x0000000001080000-0x0000000001086000-memory.dmp

                        Filesize

                        24KB

                      • memory/4520-188-0x0000000000C60000-0x0000000000C66000-memory.dmp

                        Filesize

                        24KB

                      • memory/4520-183-0x0000000000000000-mapping.dmp

                      • memory/4520-186-0x0000000000C50000-0x0000000000C5B000-memory.dmp

                        Filesize

                        44KB

                      • memory/4520-201-0x0000000000C60000-0x0000000000C66000-memory.dmp

                        Filesize

                        24KB

                      • memory/4992-132-0x000000000072E000-0x0000000000743000-memory.dmp

                        Filesize

                        84KB

                      • memory/4992-135-0x0000000000400000-0x00000000005D9000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/4992-134-0x0000000000400000-0x00000000005D9000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/4992-133-0x00000000021D0000-0x00000000021D9000-memory.dmp

                        Filesize

                        36KB