Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
23KB
-
MD5
9c09ebda9d22433c9046c7667d1d1751
-
SHA1
b290288fcdfae614731f1bcd371ae0c8bd6da04c
-
SHA256
387cb0c7adfffe604b16d02cad4c9fba30e4a497dd0f442fb41c00e45bc6274a
-
SHA512
bb36b4ee7e818090ee59f344362d1931747e9937a4a11dffe825c527d3d5ac1e9f7ea7a553800295d73ceb6733da71baf9dbb09d2b9e12fbc75479d4ba1be030
-
SSDEEP
96:Mur4zOh7DYHWdzlZNhcsPWlgBVCc0e6kqPIiZiRJWe3T3efgMnMMKqULmJsLmWMW:jrThfBNe0WSBQcnHqAiLOcmV
Malware Config
Extracted
smokeloader
2022
http://esplogem.ga/
http://poclecta.ga/
Signatures
-
Detects Smokeloader packer 3 IoCs
resource yara_rule behavioral2/memory/4340-162-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4340-164-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4340-166-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3172 set thread context of 4340 3172 tmp.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4464 powershell.exe 4464 powershell.exe 3172 tmp.exe 3172 tmp.exe 4340 tmp.exe 4340 tmp.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 Process not Found -
Suspicious behavior: MapViewOfSection 15 IoCs
pid Process 4340 tmp.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3172 tmp.exe Token: SeDebugPrivilege 4464 powershell.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 3172 wrote to memory of 4464 3172 tmp.exe 89 PID 3172 wrote to memory of 4464 3172 tmp.exe 89 PID 3172 wrote to memory of 4464 3172 tmp.exe 89 PID 3172 wrote to memory of 2188 3172 tmp.exe 95 PID 3172 wrote to memory of 2188 3172 tmp.exe 95 PID 3172 wrote to memory of 2188 3172 tmp.exe 95 PID 3172 wrote to memory of 4340 3172 tmp.exe 96 PID 3172 wrote to memory of 4340 3172 tmp.exe 96 PID 3172 wrote to memory of 4340 3172 tmp.exe 96 PID 3172 wrote to memory of 4340 3172 tmp.exe 96 PID 3172 wrote to memory of 4340 3172 tmp.exe 96 PID 3172 wrote to memory of 4340 3172 tmp.exe 96 PID 3156 wrote to memory of 444 3156 Process not Found 105 PID 3156 wrote to memory of 444 3156 Process not Found 105 PID 3156 wrote to memory of 444 3156 Process not Found 105 PID 3156 wrote to memory of 444 3156 Process not Found 105 PID 3156 wrote to memory of 2156 3156 Process not Found 106 PID 3156 wrote to memory of 2156 3156 Process not Found 106 PID 3156 wrote to memory of 2156 3156 Process not Found 106 PID 3156 wrote to memory of 460 3156 Process not Found 107 PID 3156 wrote to memory of 460 3156 Process not Found 107 PID 3156 wrote to memory of 460 3156 Process not Found 107 PID 3156 wrote to memory of 460 3156 Process not Found 107 PID 3156 wrote to memory of 4464 3156 Process not Found 108 PID 3156 wrote to memory of 4464 3156 Process not Found 108 PID 3156 wrote to memory of 4464 3156 Process not Found 108 PID 3156 wrote to memory of 4464 3156 Process not Found 108 PID 3156 wrote to memory of 3320 3156 Process not Found 109 PID 3156 wrote to memory of 3320 3156 Process not Found 109 PID 3156 wrote to memory of 3320 3156 Process not Found 109 PID 3156 wrote to memory of 1896 3156 Process not Found 110 PID 3156 wrote to memory of 1896 3156 Process not Found 110 PID 3156 wrote to memory of 1896 3156 Process not Found 110 PID 3156 wrote to memory of 1896 3156 Process not Found 110 PID 3156 wrote to memory of 4604 3156 Process not Found 111 PID 3156 wrote to memory of 4604 3156 Process not Found 111 PID 3156 wrote to memory of 4604 3156 Process not Found 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4340
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:444
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2156
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:460
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4464
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3320
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82