Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-03-2023 17:25

General

  • Target

    78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe

  • Size

    181KB

  • MD5

    ea1c1109d75b12a3bda3e308c3dd8960

  • SHA1

    417b5f689cdb85829e4bdd1b5ef97de9aa96c2e0

  • SHA256

    78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a

  • SHA512

    ff345a5250b1d753d9802a8932bf5f497add0cfd017b530f942ab488b22a9b38c0c9027d9ec61a2fa026a44a28db732bb6643658f17d8ed8da6361f983002d19

  • SSDEEP

    3072:Pn3xqHXBBgXfGYVDkBkM+OovzlsRIPXgeNja/JI0Kx:J2XngXf9aBGjzlsRIPweNUC0K

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://hoh0aeghwugh2gie.com/

http://hie7doodohpae4na.com/

http://aek0aicifaloh1yo.com/

http://yic0oosaeiy7ahng.com/

http://wa5zu7sekai8xeih.com/

rc4.i32
rc4.i32

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe
    "C:\Users\Admin\AppData\Local\Temp\78e426a4a1152fcd664359dc397c34d8ad637725dafe18ef262a9f700e0bdf7a.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1260
  • C:\Users\Admin\AppData\Local\Temp\E37F.exe
    C:\Users\Admin\AppData\Local\Temp\E37F.exe
    1⤵
    • Executes dropped EXE
    PID:4380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 288
      2⤵
      • Program crash
      PID:2136
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:4564
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:4728
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:1892
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:3960
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:548
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4380 -ip 4380
              1⤵
                PID:3412
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:5048
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:2908
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:3664
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:1280

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\E37F.exe

                        Filesize

                        180KB

                        MD5

                        60b55a03146e3388672a9578fa5626a9

                        SHA1

                        f59712dde5092fe6d2fccbf421b387abf9dfcfb5

                        SHA256

                        bf021a868b03fa52ae398181b986f44784c734daafb0aaca8aee6d810bf08b9b

                        SHA512

                        87ea61e46abbd0f0c30b98084a4b500b777a2cb3462f667c04d46ecbc67e743b339cbc8ad369c0f02f43e4035a814266a7121e39c40a01aaf451c3dd85c30d34

                      • C:\Users\Admin\AppData\Local\Temp\E37F.exe

                        Filesize

                        180KB

                        MD5

                        60b55a03146e3388672a9578fa5626a9

                        SHA1

                        f59712dde5092fe6d2fccbf421b387abf9dfcfb5

                        SHA256

                        bf021a868b03fa52ae398181b986f44784c734daafb0aaca8aee6d810bf08b9b

                        SHA512

                        87ea61e46abbd0f0c30b98084a4b500b777a2cb3462f667c04d46ecbc67e743b339cbc8ad369c0f02f43e4035a814266a7121e39c40a01aaf451c3dd85c30d34

                      • memory/548-164-0x00000000005C0000-0x00000000005CC000-memory.dmp

                        Filesize

                        48KB

                      • memory/548-163-0x0000000000490000-0x00000000004B7000-memory.dmp

                        Filesize

                        156KB

                      • memory/548-165-0x0000000000490000-0x00000000004B7000-memory.dmp

                        Filesize

                        156KB

                      • memory/732-135-0x0000000001200000-0x0000000001216000-memory.dmp

                        Filesize

                        88KB

                      • memory/1260-136-0x0000000000400000-0x0000000000571000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/1260-134-0x00000000006D0000-0x00000000006D9000-memory.dmp

                        Filesize

                        36KB

                      • memory/1280-176-0x0000000000780000-0x000000000078B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1280-177-0x0000000000780000-0x000000000078B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1280-183-0x0000000000620000-0x000000000062D000-memory.dmp

                        Filesize

                        52KB

                      • memory/1892-158-0x0000000001410000-0x0000000001419000-memory.dmp

                        Filesize

                        36KB

                      • memory/1892-159-0x0000000000310000-0x000000000031F000-memory.dmp

                        Filesize

                        60KB

                      • memory/1892-160-0x0000000001410000-0x0000000001419000-memory.dmp

                        Filesize

                        36KB

                      • memory/1892-180-0x0000000000310000-0x000000000031F000-memory.dmp

                        Filesize

                        60KB

                      • memory/2908-172-0x0000000000690000-0x000000000069B000-memory.dmp

                        Filesize

                        44KB

                      • memory/2908-171-0x0000000001410000-0x0000000001419000-memory.dmp

                        Filesize

                        36KB

                      • memory/2908-170-0x0000000000690000-0x000000000069B000-memory.dmp

                        Filesize

                        44KB

                      • memory/3664-173-0x0000000000620000-0x000000000062D000-memory.dmp

                        Filesize

                        52KB

                      • memory/3664-175-0x0000000000620000-0x000000000062D000-memory.dmp

                        Filesize

                        52KB

                      • memory/3664-174-0x0000000000690000-0x000000000069B000-memory.dmp

                        Filesize

                        44KB

                      • memory/3960-161-0x00000000005C0000-0x00000000005CC000-memory.dmp

                        Filesize

                        48KB

                      • memory/3960-181-0x0000000001410000-0x0000000001419000-memory.dmp

                        Filesize

                        36KB

                      • memory/3960-162-0x00000000005C0000-0x00000000005CC000-memory.dmp

                        Filesize

                        48KB

                      • memory/4380-155-0x00000000006D0000-0x00000000006D8000-memory.dmp

                        Filesize

                        32KB

                      • memory/4380-169-0x0000000000400000-0x0000000000571000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/4380-156-0x00000000006E0000-0x00000000006E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4564-151-0x00000000006D0000-0x00000000006D9000-memory.dmp

                        Filesize

                        36KB

                      • memory/4564-152-0x0000000000850000-0x000000000085B000-memory.dmp

                        Filesize

                        44KB

                      • memory/4564-178-0x00000000006D0000-0x00000000006D9000-memory.dmp

                        Filesize

                        36KB

                      • memory/4564-150-0x0000000000850000-0x000000000085B000-memory.dmp

                        Filesize

                        44KB

                      • memory/4728-154-0x0000000000310000-0x000000000031F000-memory.dmp

                        Filesize

                        60KB

                      • memory/4728-179-0x00000000006E0000-0x00000000006E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4728-157-0x0000000000310000-0x000000000031F000-memory.dmp

                        Filesize

                        60KB

                      • memory/5048-168-0x0000000001410000-0x0000000001419000-memory.dmp

                        Filesize

                        36KB

                      • memory/5048-167-0x0000000000490000-0x00000000004B7000-memory.dmp

                        Filesize

                        156KB

                      • memory/5048-166-0x0000000001410000-0x0000000001419000-memory.dmp

                        Filesize

                        36KB

                      • memory/5048-182-0x0000000000490000-0x00000000004B7000-memory.dmp

                        Filesize

                        156KB