Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:38

General

  • Target

    1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe

  • Size

    264KB

  • MD5

    5028754736b592a4ea2be83eb8351e2e

  • SHA1

    23dd444f6a05c07bb7fdd4a74417683199055283

  • SHA256

    1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19

  • SHA512

    63e3bf3bcf9369719f2c86cbbf3f22f802b77498db1ac47961f1865b99e0c600f50a23ab63e555b0f4c091d327bcc8e2e8fd997c515c29e2f33c79460c7539de

  • SSDEEP

    3072:79BRraw+dmuDhLQuGzIi7H+vsQODbQ1md7/+gQ6ke4bR+1MBexgbpd5iNZCU3wsd:nlawhuDhLK7+hEbWw72b6ke4t2MBQr3

Malware Config

Extracted

Family

smokeloader

Botnet

sprg

Extracted

Family

smokeloader

Version

2022

C2

http://hoh0aeghwugh2gie.com/

http://hie7doodohpae4na.com/

http://aek0aicifaloh1yo.com/

http://yic0oosaeiy7ahng.com/

http://wa5zu7sekai8xeih.com/

rc4.i32
rc4.i32

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe
    "C:\Users\Admin\AppData\Local\Temp\1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1932
  • C:\Users\Admin\AppData\Local\Temp\EE1E.exe
    C:\Users\Admin\AppData\Local\Temp\EE1E.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe
      "C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\BridgewebReviewsessionnet\AmORnHXXcM93nRrD.vbe"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3896
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\BridgewebReviewsessionnet\EkEJcrBOyegQfp.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\BridgewebReviewsessionnet\servernetdhcp.exe
            "C:\BridgewebReviewsessionnet\servernetdhcp.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3576
    • C:\Users\Admin\AppData\Local\Temp\EE1E.exe
      C:\Users\Admin\AppData\Local\Temp\EE1E.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:968
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:2680
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:1056
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:1172
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:3644
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:3816
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:3308
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:3464
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:2096
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:768
                    • C:\Users\Admin\AppData\Roaming\shiawse
                      C:\Users\Admin\AppData\Roaming\shiawse
                      1⤵
                      • Executes dropped EXE
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: MapViewOfSection
                      PID:1060

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Discovery

                    Query Registry

                    3
                    T1012

                    System Information Discovery

                    3
                    T1082

                    Peripheral Device Discovery

                    1
                    T1120

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\BridgewebReviewsessionnet\AmORnHXXcM93nRrD.vbe
                      Filesize

                      216B

                      MD5

                      82345b07f01234819a5e297e018b95e1

                      SHA1

                      cef47391abf644460ad11c2d62c36d17eeb04acc

                      SHA256

                      47648bbd2557c86df4bd8f8e87fe96756b65ad5caee4102b950febf8207cc6c9

                      SHA512

                      1b9936c397ff9f19b1b8eb7be386c9c05fb8628aacb740e47cb0a97b3296bd7bb7a4c7ab8206c3c48635878ceeefec698bea21ebd28d154b9c5664953cef0842

                    • C:\BridgewebReviewsessionnet\EkEJcrBOyegQfp.bat
                      Filesize

                      48B

                      MD5

                      a55711ded8f3fafd3b1d7f24f9e18c01

                      SHA1

                      472516155b494e0a377cb8b77da47bbd8209801e

                      SHA256

                      d1f6947794271b7579a65733fe5e40a2f965271b0d9677209d84e4f39d24f177

                      SHA512

                      29919810673fbb0c36618f64d64c7069fcaf83a1211ab7a5f57379937d01dc27ab5e58e7c665b3433beeb68040ca8732c713a0ab2d165b61bb62329ef573cfb4

                    • C:\BridgewebReviewsessionnet\servernetdhcp.exe
                      Filesize

                      488KB

                      MD5

                      a89b5f16ad2d43b328e47a0f52bae148

                      SHA1

                      0c9e5802eb5cad0464754df3433e6f227857f847

                      SHA256

                      8e22d996f05c15465c4ab92f4cee452419fdc1b569a63e0936e709a682df9123

                      SHA512

                      f920f840875cfca9f709f181bc3971ea6c23cb0b14ab83d46a09ef081c59eed1fc1cd08c29ee43eafc0f484d06ef16a7e44b3b59f859eb5dab260dfd7fc4577c

                    • C:\BridgewebReviewsessionnet\servernetdhcp.exe
                      Filesize

                      488KB

                      MD5

                      a89b5f16ad2d43b328e47a0f52bae148

                      SHA1

                      0c9e5802eb5cad0464754df3433e6f227857f847

                      SHA256

                      8e22d996f05c15465c4ab92f4cee452419fdc1b569a63e0936e709a682df9123

                      SHA512

                      f920f840875cfca9f709f181bc3971ea6c23cb0b14ab83d46a09ef081c59eed1fc1cd08c29ee43eafc0f484d06ef16a7e44b3b59f859eb5dab260dfd7fc4577c

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EE1E.exe.log
                      Filesize

                      1KB

                      MD5

                      777c191192611ccd3ad42445d9b4fbff

                      SHA1

                      7102e6210880506e7d72644490c653f0d63bef69

                      SHA256

                      c2c03dac7c91dd00f36b854abf0f004c5ac1b21a6799fe3d5c36c778c11ecec7

                      SHA512

                      1a153ac56d3d6c76df88da46a13062ce2ff2849926756ec4e58b11ff1090807e16c32092d9f6a432b721a4b1930d838fcf4404c91480c6c830b07ca18f38f324

                    • C:\Users\Admin\AppData\Local\Temp\EE1E.exe
                      Filesize

                      3.4MB

                      MD5

                      189f74645ef310147f25841e309a704d

                      SHA1

                      a05b78dae4dc3ea00f141beec6763c0e17de4f76

                      SHA256

                      a9f8ce22da0a86318879c5cf31feaa5ec6e77afd32eb2988b0f1e4630e64ab1e

                      SHA512

                      6ddbc29602fde4029cc1e2c73fcb893c7caf721f1811a6211808a3c09ec11856ddfdb3328e2181eac346fb12641e9929250e861c851f8802f549bf465970d5ad

                    • C:\Users\Admin\AppData\Local\Temp\EE1E.exe
                      Filesize

                      3.4MB

                      MD5

                      189f74645ef310147f25841e309a704d

                      SHA1

                      a05b78dae4dc3ea00f141beec6763c0e17de4f76

                      SHA256

                      a9f8ce22da0a86318879c5cf31feaa5ec6e77afd32eb2988b0f1e4630e64ab1e

                      SHA512

                      6ddbc29602fde4029cc1e2c73fcb893c7caf721f1811a6211808a3c09ec11856ddfdb3328e2181eac346fb12641e9929250e861c851f8802f549bf465970d5ad

                    • C:\Users\Admin\AppData\Local\Temp\EE1E.exe
                      Filesize

                      3.4MB

                      MD5

                      189f74645ef310147f25841e309a704d

                      SHA1

                      a05b78dae4dc3ea00f141beec6763c0e17de4f76

                      SHA256

                      a9f8ce22da0a86318879c5cf31feaa5ec6e77afd32eb2988b0f1e4630e64ab1e

                      SHA512

                      6ddbc29602fde4029cc1e2c73fcb893c7caf721f1811a6211808a3c09ec11856ddfdb3328e2181eac346fb12641e9929250e861c851f8802f549bf465970d5ad

                    • C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe
                      Filesize

                      797KB

                      MD5

                      4a42db55ac5a11c8e33ca17d26b815fd

                      SHA1

                      feae8594bd646974b6bbfddf238c07adc306724a

                      SHA256

                      de827e6c87dc9cc432a88ad110e469fedec378dde5db08a1125f0b1c81d43fa1

                      SHA512

                      da527ec42e4f9e95742d25a1e5a8e1f1fb620b58ae9215a83375f37282608203e3c350b92d2c0e08a822ba4574421cf7ce38b63fb5cb268d8a335e2ada2d0d80

                    • C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe
                      Filesize

                      797KB

                      MD5

                      4a42db55ac5a11c8e33ca17d26b815fd

                      SHA1

                      feae8594bd646974b6bbfddf238c07adc306724a

                      SHA256

                      de827e6c87dc9cc432a88ad110e469fedec378dde5db08a1125f0b1c81d43fa1

                      SHA512

                      da527ec42e4f9e95742d25a1e5a8e1f1fb620b58ae9215a83375f37282608203e3c350b92d2c0e08a822ba4574421cf7ce38b63fb5cb268d8a335e2ada2d0d80

                    • C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe
                      Filesize

                      797KB

                      MD5

                      4a42db55ac5a11c8e33ca17d26b815fd

                      SHA1

                      feae8594bd646974b6bbfddf238c07adc306724a

                      SHA256

                      de827e6c87dc9cc432a88ad110e469fedec378dde5db08a1125f0b1c81d43fa1

                      SHA512

                      da527ec42e4f9e95742d25a1e5a8e1f1fb620b58ae9215a83375f37282608203e3c350b92d2c0e08a822ba4574421cf7ce38b63fb5cb268d8a335e2ada2d0d80

                    • C:\Users\Admin\AppData\Roaming\shiawse
                      Filesize

                      264KB

                      MD5

                      5028754736b592a4ea2be83eb8351e2e

                      SHA1

                      23dd444f6a05c07bb7fdd4a74417683199055283

                      SHA256

                      1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19

                      SHA512

                      63e3bf3bcf9369719f2c86cbbf3f22f802b77498db1ac47961f1865b99e0c600f50a23ab63e555b0f4c091d327bcc8e2e8fd997c515c29e2f33c79460c7539de

                    • C:\Users\Admin\AppData\Roaming\shiawse
                      Filesize

                      264KB

                      MD5

                      5028754736b592a4ea2be83eb8351e2e

                      SHA1

                      23dd444f6a05c07bb7fdd4a74417683199055283

                      SHA256

                      1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19

                      SHA512

                      63e3bf3bcf9369719f2c86cbbf3f22f802b77498db1ac47961f1865b99e0c600f50a23ab63e555b0f4c091d327bcc8e2e8fd997c515c29e2f33c79460c7539de

                    • memory/768-220-0x0000000000DF0000-0x0000000000DFD000-memory.dmp
                      Filesize

                      52KB

                    • memory/768-204-0x0000000000150000-0x000000000015B000-memory.dmp
                      Filesize

                      44KB

                    • memory/768-203-0x0000000000150000-0x000000000015B000-memory.dmp
                      Filesize

                      44KB

                    • memory/968-199-0x0000000007590000-0x00000000075F6000-memory.dmp
                      Filesize

                      408KB

                    • memory/968-190-0x0000000003520000-0x0000000003530000-memory.dmp
                      Filesize

                      64KB

                    • memory/968-182-0x0000000006350000-0x00000000063A0000-memory.dmp
                      Filesize

                      320KB

                    • memory/968-214-0x0000000003520000-0x0000000003530000-memory.dmp
                      Filesize

                      64KB

                    • memory/968-175-0x0000000000400000-0x0000000000480000-memory.dmp
                      Filesize

                      512KB

                    • memory/1056-158-0x00000000006F0000-0x00000000006FF000-memory.dmp
                      Filesize

                      60KB

                    • memory/1056-157-0x0000000001260000-0x000000000126B000-memory.dmp
                      Filesize

                      44KB

                    • memory/1056-154-0x00000000006F0000-0x00000000006FF000-memory.dmp
                      Filesize

                      60KB

                    • memory/1056-211-0x0000000001260000-0x000000000126B000-memory.dmp
                      Filesize

                      44KB

                    • memory/1060-227-0x0000000000400000-0x0000000000705000-memory.dmp
                      Filesize

                      3.0MB

                    • memory/1172-162-0x0000000005B00000-0x0000000005B10000-memory.dmp
                      Filesize

                      64KB

                    • memory/1172-213-0x0000000005B00000-0x0000000005B10000-memory.dmp
                      Filesize

                      64KB

                    • memory/1172-160-0x0000000001200000-0x0000000001209000-memory.dmp
                      Filesize

                      36KB

                    • memory/1172-163-0x0000000001200000-0x0000000001209000-memory.dmp
                      Filesize

                      36KB

                    • memory/1932-136-0x0000000000400000-0x0000000000705000-memory.dmp
                      Filesize

                      3.0MB

                    • memory/1932-134-0x00000000008A0000-0x00000000008A9000-memory.dmp
                      Filesize

                      36KB

                    • memory/2096-218-0x0000000000720000-0x000000000072B000-memory.dmp
                      Filesize

                      44KB

                    • memory/2096-201-0x0000000000720000-0x000000000072B000-memory.dmp
                      Filesize

                      44KB

                    • memory/2096-202-0x0000000000DF0000-0x0000000000DFD000-memory.dmp
                      Filesize

                      52KB

                    • memory/2096-200-0x0000000000DF0000-0x0000000000DFD000-memory.dmp
                      Filesize

                      52KB

                    • memory/2680-151-0x0000000001260000-0x000000000126B000-memory.dmp
                      Filesize

                      44KB

                    • memory/2680-210-0x00000000008A0000-0x00000000008A9000-memory.dmp
                      Filesize

                      36KB

                    • memory/2680-155-0x00000000008A0000-0x00000000008A9000-memory.dmp
                      Filesize

                      36KB

                    • memory/2680-156-0x0000000001260000-0x000000000126B000-memory.dmp
                      Filesize

                      44KB

                    • memory/3284-224-0x0000000002B20000-0x0000000002B36000-memory.dmp
                      Filesize

                      88KB

                    • memory/3284-135-0x0000000002D60000-0x0000000002D76000-memory.dmp
                      Filesize

                      88KB

                    • memory/3308-195-0x0000000000D70000-0x0000000000D97000-memory.dmp
                      Filesize

                      156KB

                    • memory/3308-216-0x0000000000D70000-0x0000000000D97000-memory.dmp
                      Filesize

                      156KB

                    • memory/3308-196-0x0000000000760000-0x0000000000769000-memory.dmp
                      Filesize

                      36KB

                    • memory/3308-194-0x0000000000760000-0x0000000000769000-memory.dmp
                      Filesize

                      36KB

                    • memory/3464-197-0x0000000000720000-0x000000000072B000-memory.dmp
                      Filesize

                      44KB

                    • memory/3464-217-0x0000000000760000-0x0000000000769000-memory.dmp
                      Filesize

                      36KB

                    • memory/3464-198-0x0000000000720000-0x000000000072B000-memory.dmp
                      Filesize

                      44KB

                    • memory/3576-209-0x0000000000710000-0x0000000000790000-memory.dmp
                      Filesize

                      512KB

                    • memory/3576-212-0x0000000000F90000-0x0000000000FA0000-memory.dmp
                      Filesize

                      64KB

                    • memory/3644-171-0x0000000001200000-0x0000000001209000-memory.dmp
                      Filesize

                      36KB

                    • memory/3644-166-0x0000000000B40000-0x0000000000B4C000-memory.dmp
                      Filesize

                      48KB

                    • memory/3644-172-0x0000000000B40000-0x0000000000B4C000-memory.dmp
                      Filesize

                      48KB

                    • memory/3816-192-0x0000000000D70000-0x0000000000D97000-memory.dmp
                      Filesize

                      156KB

                    • memory/3816-215-0x0000000003520000-0x0000000003530000-memory.dmp
                      Filesize

                      64KB

                    • memory/3816-191-0x0000000003520000-0x0000000003530000-memory.dmp
                      Filesize

                      64KB

                    • memory/3816-180-0x0000000000D70000-0x0000000000D97000-memory.dmp
                      Filesize

                      156KB

                    • memory/3964-152-0x0000000005F70000-0x0000000006514000-memory.dmp
                      Filesize

                      5.6MB

                    • memory/3964-153-0x00000000058A0000-0x0000000005932000-memory.dmp
                      Filesize

                      584KB

                    • memory/3964-164-0x00000000076F0000-0x0000000007712000-memory.dmp
                      Filesize

                      136KB

                    • memory/3964-150-0x0000000000B60000-0x0000000000ECC000-memory.dmp
                      Filesize

                      3.4MB

                    • memory/3964-159-0x0000000005940000-0x000000000594A000-memory.dmp
                      Filesize

                      40KB

                    • memory/3964-161-0x0000000005B00000-0x0000000005B10000-memory.dmp
                      Filesize

                      64KB