Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
295KB
-
MD5
16a3c84422b5e8933e27cb6b873746ab
-
SHA1
80d718e83454d9fee5832a1ce50d136e0645c00f
-
SHA256
766374196d4e79bd565eba19f4fa3a822f7451ff57ba9b3d9e13e24276d5edd5
-
SHA512
e70efe05ec3777f122b89391c896197f8ce6584d125d67aba8db164d8cf827d9c1f32d53197168f44732535dc61cc8022d7deb36b5985538dcdf7e60baf5a7ba
-
SSDEEP
3072:+eQlnqA8VNF9giHti/YeIe6M39TCLUF61+PHwmxEylbxyxFWYTgWvQfC:dMQLgiMYe3M1+/wmxpxG+
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
Processes:
rribfiupid process 4192 rribfiu -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
rribfiusetup.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rribfiu Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rribfiu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rribfiu -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
setup.exepid process 3536 setup.exe 3536 setup.exe 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3160 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
setup.exerribfiupid process 3536 setup.exe 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 3160 4192 rribfiu -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
description pid process target process PID 3160 wrote to memory of 3136 3160 explorer.exe PID 3160 wrote to memory of 3136 3160 explorer.exe PID 3160 wrote to memory of 3136 3160 explorer.exe PID 3160 wrote to memory of 3136 3160 explorer.exe PID 3160 wrote to memory of 4132 3160 explorer.exe PID 3160 wrote to memory of 4132 3160 explorer.exe PID 3160 wrote to memory of 4132 3160 explorer.exe PID 3160 wrote to memory of 4236 3160 explorer.exe PID 3160 wrote to memory of 4236 3160 explorer.exe PID 3160 wrote to memory of 4236 3160 explorer.exe PID 3160 wrote to memory of 4236 3160 explorer.exe PID 3160 wrote to memory of 5000 3160 explorer.exe PID 3160 wrote to memory of 5000 3160 explorer.exe PID 3160 wrote to memory of 5000 3160 explorer.exe PID 3160 wrote to memory of 3308 3160 explorer.exe PID 3160 wrote to memory of 3308 3160 explorer.exe PID 3160 wrote to memory of 3308 3160 explorer.exe PID 3160 wrote to memory of 3308 3160 explorer.exe PID 3160 wrote to memory of 2908 3160 explorer.exe PID 3160 wrote to memory of 2908 3160 explorer.exe PID 3160 wrote to memory of 2908 3160 explorer.exe PID 3160 wrote to memory of 2908 3160 explorer.exe PID 3160 wrote to memory of 3172 3160 explorer.exe PID 3160 wrote to memory of 3172 3160 explorer.exe PID 3160 wrote to memory of 3172 3160 explorer.exe PID 3160 wrote to memory of 3172 3160 explorer.exe PID 3160 wrote to memory of 4472 3160 explorer.exe PID 3160 wrote to memory of 4472 3160 explorer.exe PID 3160 wrote to memory of 4472 3160 explorer.exe PID 3160 wrote to memory of 2844 3160 explorer.exe PID 3160 wrote to memory of 2844 3160 explorer.exe PID 3160 wrote to memory of 2844 3160 explorer.exe PID 3160 wrote to memory of 2844 3160 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Roaming\rribfiuC:\Users\Admin\AppData\Roaming\rribfiu1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\rribfiuFilesize
295KB
MD516a3c84422b5e8933e27cb6b873746ab
SHA180d718e83454d9fee5832a1ce50d136e0645c00f
SHA256766374196d4e79bd565eba19f4fa3a822f7451ff57ba9b3d9e13e24276d5edd5
SHA512e70efe05ec3777f122b89391c896197f8ce6584d125d67aba8db164d8cf827d9c1f32d53197168f44732535dc61cc8022d7deb36b5985538dcdf7e60baf5a7ba
-
C:\Users\Admin\AppData\Roaming\rribfiuFilesize
295KB
MD516a3c84422b5e8933e27cb6b873746ab
SHA180d718e83454d9fee5832a1ce50d136e0645c00f
SHA256766374196d4e79bd565eba19f4fa3a822f7451ff57ba9b3d9e13e24276d5edd5
SHA512e70efe05ec3777f122b89391c896197f8ce6584d125d67aba8db164d8cf827d9c1f32d53197168f44732535dc61cc8022d7deb36b5985538dcdf7e60baf5a7ba
-
memory/2844-170-0x0000000000350000-0x000000000035B000-memory.dmpFilesize
44KB
-
memory/2844-177-0x0000000000620000-0x000000000062D000-memory.dmpFilesize
52KB
-
memory/2844-171-0x0000000000350000-0x000000000035B000-memory.dmpFilesize
44KB
-
memory/2908-161-0x0000000001450000-0x0000000001459000-memory.dmpFilesize
36KB
-
memory/2908-162-0x0000000000310000-0x0000000000337000-memory.dmpFilesize
156KB
-
memory/2908-174-0x0000000000310000-0x0000000000337000-memory.dmpFilesize
156KB
-
memory/2908-163-0x0000000001450000-0x0000000001459000-memory.dmpFilesize
36KB
-
memory/3136-148-0x0000000000BA0000-0x0000000000BAB000-memory.dmpFilesize
44KB
-
memory/3136-147-0x0000000002C50000-0x0000000002C59000-memory.dmpFilesize
36KB
-
memory/3136-146-0x0000000000BA0000-0x0000000000BAB000-memory.dmpFilesize
44KB
-
memory/3160-181-0x0000000002D20000-0x0000000002D36000-memory.dmpFilesize
88KB
-
memory/3160-135-0x0000000002CD0000-0x0000000002CE6000-memory.dmpFilesize
88KB
-
memory/3172-164-0x0000000000C50000-0x0000000000C5B000-memory.dmpFilesize
44KB
-
memory/3172-166-0x0000000000C50000-0x0000000000C5B000-memory.dmpFilesize
44KB
-
memory/3172-175-0x0000000001450000-0x0000000001459000-memory.dmpFilesize
36KB
-
memory/3172-165-0x0000000001450000-0x0000000001459000-memory.dmpFilesize
36KB
-
memory/3308-159-0x0000000000DE0000-0x0000000000DEC000-memory.dmpFilesize
48KB
-
memory/3308-160-0x0000000000310000-0x0000000000337000-memory.dmpFilesize
156KB
-
memory/3308-158-0x0000000000310000-0x0000000000337000-memory.dmpFilesize
156KB
-
memory/3536-134-0x0000000002C50000-0x0000000002C59000-memory.dmpFilesize
36KB
-
memory/3536-136-0x0000000000400000-0x0000000002B77000-memory.dmpFilesize
39.5MB
-
memory/4132-151-0x00000000003D0000-0x00000000003DF000-memory.dmpFilesize
60KB
-
memory/4132-149-0x00000000003D0000-0x00000000003DF000-memory.dmpFilesize
60KB
-
memory/4132-172-0x0000000000BA0000-0x0000000000BAB000-memory.dmpFilesize
44KB
-
memory/4132-150-0x0000000000BA0000-0x0000000000BAB000-memory.dmpFilesize
44KB
-
memory/4192-184-0x0000000000400000-0x0000000002B77000-memory.dmpFilesize
39.5MB
-
memory/4236-173-0x00000000003D0000-0x00000000003DF000-memory.dmpFilesize
60KB
-
memory/4236-154-0x00000000011D0000-0x00000000011D9000-memory.dmpFilesize
36KB
-
memory/4236-153-0x00000000003D0000-0x00000000003DF000-memory.dmpFilesize
60KB
-
memory/4236-152-0x00000000011D0000-0x00000000011D9000-memory.dmpFilesize
36KB
-
memory/4472-169-0x0000000000620000-0x000000000062D000-memory.dmpFilesize
52KB
-
memory/4472-168-0x0000000000C50000-0x0000000000C5B000-memory.dmpFilesize
44KB
-
memory/4472-167-0x0000000000620000-0x000000000062D000-memory.dmpFilesize
52KB
-
memory/4472-176-0x0000000000C50000-0x0000000000C5B000-memory.dmpFilesize
44KB
-
memory/5000-157-0x0000000000DE0000-0x0000000000DEC000-memory.dmpFilesize
48KB
-
memory/5000-156-0x00000000011D0000-0x00000000011D9000-memory.dmpFilesize
36KB
-
memory/5000-155-0x0000000000DE0000-0x0000000000DEC000-memory.dmpFilesize
48KB