Analysis
-
max time kernel
150s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2023 10:15
Static task
static1
Behavioral task
behavioral1
Sample
68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe
Resource
win10v2004-20230221-en
General
-
Target
68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe
-
Size
167KB
-
MD5
1345f8eb15a6270dc2813925e753f298
-
SHA1
25bedbfa4934c2d91058a9b1f1d2c2703e7bdc2f
-
SHA256
68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628
-
SHA512
c1b6e60566d6388d7e656c28afd241a0678666b5efca431ff8d1173631eb511e27877d2047d356ccad1ef38fa3b5ceec958840021d4e580be576e006c7004ded
-
SSDEEP
3072:UKruHcjlP82XYPNp/3SGuaLkvoqh9WmF4PKSRlL7o15YwKm1kiC4+99zXmUhs5fG:UUuHcmjlp/iGu7v5ePKSjvo1TKmWR4+z
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1144-134-0x0000000000800000-0x0000000000809000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 30 4588 rundll32.exe 32 4588 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
E67D.exepid process 3080 E67D.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4588 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 4588 set thread context of 3404 4588 rundll32.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4852 3080 WerFault.exe E67D.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe -
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" -
Modifies registry class 30 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000055560b5a100054656d7000003a0009000400efbe55564a165556105a2e00000000000000000000000000000000000000000000000000a8671e01540065006d007000000014000000 Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 760 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exepid process 1144 68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe 1144 68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 760 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 760 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exepid process 1144 68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 Token: SeShutdownPrivilege 760 Token: SeCreatePagefilePrivilege 760 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 3404 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pid process 760 760 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
E67D.exerundll32.exedescription pid process target process PID 760 wrote to memory of 3080 760 E67D.exe PID 760 wrote to memory of 3080 760 E67D.exe PID 760 wrote to memory of 3080 760 E67D.exe PID 3080 wrote to memory of 4588 3080 E67D.exe rundll32.exe PID 3080 wrote to memory of 4588 3080 E67D.exe rundll32.exe PID 3080 wrote to memory of 4588 3080 E67D.exe rundll32.exe PID 4588 wrote to memory of 3404 4588 rundll32.exe rundll32.exe PID 4588 wrote to memory of 3404 4588 rundll32.exe rundll32.exe PID 4588 wrote to memory of 3404 4588 rundll32.exe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe"C:\Users\Admin\AppData\Local\Temp\68e00e2f71b7ae7c1124426680d387223bdde400865d1c5a6b90b296f7fcc628.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1144
-
C:\Users\Admin\AppData\Local\Temp\E67D.exeC:\Users\Admin\AppData\Local\Temp\E67D.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Qruhaepdediwhf.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 309073⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 4602⤵
- Program crash
PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3080 -ip 30801⤵PID:4600
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD5c176beec7f2220954469193969c3bcf9
SHA1f811f77f5b53c13a06b43b10eb6189513f66d2a2
SHA256e4f5ee78cf7f8147ab5d5286f4af31dc94cfced6913f3f5f5dad8d87a8cbca7c
SHA512d573b1dcd9a41fbd9699abe28e0eb3bac4b4eab371de5e6fbef95238286d9e0a1e5a895e91bf5e623ae5eb5012881b973fd873f2c1fa27f9ddcb5438deb28439
-
Filesize
4.7MB
MD5c176beec7f2220954469193969c3bcf9
SHA1f811f77f5b53c13a06b43b10eb6189513f66d2a2
SHA256e4f5ee78cf7f8147ab5d5286f4af31dc94cfced6913f3f5f5dad8d87a8cbca7c
SHA512d573b1dcd9a41fbd9699abe28e0eb3bac4b4eab371de5e6fbef95238286d9e0a1e5a895e91bf5e623ae5eb5012881b973fd873f2c1fa27f9ddcb5438deb28439
-
Filesize
5.5MB
MD5a97da92f8f7ea0cb1e5b416190f50643
SHA19a74ababa9ada15b1af2767ceae6875ebd2d1bf7
SHA25655ba8b7c5dcd9d5b995b8ae97cd33615f278d431fb1bf43ca18c7383fdb1fd7e
SHA5120e4405fed4d14bf4e73ac0bf4c72f52d1d5edbb8b80220ce2cd60aceedea4a3778c65924b9a675b45cf087344f898be20a6466b6509828a99271c88911a4629d
-
Filesize
5.5MB
MD5a97da92f8f7ea0cb1e5b416190f50643
SHA19a74ababa9ada15b1af2767ceae6875ebd2d1bf7
SHA25655ba8b7c5dcd9d5b995b8ae97cd33615f278d431fb1bf43ca18c7383fdb1fd7e
SHA5120e4405fed4d14bf4e73ac0bf4c72f52d1d5edbb8b80220ce2cd60aceedea4a3778c65924b9a675b45cf087344f898be20a6466b6509828a99271c88911a4629d
-
Filesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
Filesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58