Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2023, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
066b02711e1f408bac89314fb7276995.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
066b02711e1f408bac89314fb7276995.exe
Resource
win10v2004-20230220-en
General
-
Target
066b02711e1f408bac89314fb7276995.exe
-
Size
197KB
-
MD5
066b02711e1f408bac89314fb7276995
-
SHA1
082c2bff03b9a8ab2d1b2c7ff99b2d0ad8474cba
-
SHA256
9bf7a5f2f86ef5ed1fec866ae9f9eb20148a0d27a0769eb9aaa9210393e4e38c
-
SHA512
5a5dd93cced144c4b31ae4a0a8a1aff98ad049450870edbd9f4b6648892f1dfa166ccfcbd2d6da488eaf9b72c057d99b5660bc07e2ba0255999a32193b82270f
-
SSDEEP
3072:/M28nc6SCINHc3G0EnrS8kT4c6U5GeI+GYG5totb4HW/bunrpXhOv2a6:028cr83/ErS8k4c60G5tST/s24
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
vidar
3.4
e749025c61b2caca10aa829a9e1a65a1
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
e749025c61b2caca10aa829a9e1a65a1
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 4CC8.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 52768030999771317306.exe -
Executes dropped EXE 4 IoCs
pid Process 3560 4CC8.exe 4716 00930151714078850565.exe 2036 52768030999771317306.exe 3884 svcservice.exe -
Loads dropped DLL 2 IoCs
pid Process 3560 4CC8.exe 3560 4CC8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x00020000000230e3-276.dat upx behavioral2/files/0x00020000000230e3-285.dat upx behavioral2/files/0x00020000000230e3-286.dat upx behavioral2/memory/4716-288-0x0000000000150000-0x0000000000FB3000-memory.dmp upx behavioral2/memory/4716-289-0x0000000000150000-0x0000000000FB3000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 52768030999771317306.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2036 52768030999771317306.exe 2036 52768030999771317306.exe 3884 svcservice.exe 3884 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3236 3560 WerFault.exe 91 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 066b02711e1f408bac89314fb7276995.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 066b02711e1f408bac89314fb7276995.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 066b02711e1f408bac89314fb7276995.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4CC8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4CC8.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4372 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 066b02711e1f408bac89314fb7276995.exe 2988 066b02711e1f408bac89314fb7276995.exe 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3140 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 2988 066b02711e1f408bac89314fb7276995.exe 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3560 3140 Process not Found 91 PID 3140 wrote to memory of 3560 3140 Process not Found 91 PID 3140 wrote to memory of 3560 3140 Process not Found 91 PID 3140 wrote to memory of 4728 3140 Process not Found 92 PID 3140 wrote to memory of 4728 3140 Process not Found 92 PID 3140 wrote to memory of 4728 3140 Process not Found 92 PID 3140 wrote to memory of 4728 3140 Process not Found 92 PID 3140 wrote to memory of 2260 3140 Process not Found 93 PID 3140 wrote to memory of 2260 3140 Process not Found 93 PID 3140 wrote to memory of 2260 3140 Process not Found 93 PID 3140 wrote to memory of 3512 3140 Process not Found 94 PID 3140 wrote to memory of 3512 3140 Process not Found 94 PID 3140 wrote to memory of 3512 3140 Process not Found 94 PID 3140 wrote to memory of 3512 3140 Process not Found 94 PID 3140 wrote to memory of 4432 3140 Process not Found 95 PID 3140 wrote to memory of 4432 3140 Process not Found 95 PID 3140 wrote to memory of 4432 3140 Process not Found 95 PID 3140 wrote to memory of 2776 3140 Process not Found 97 PID 3140 wrote to memory of 2776 3140 Process not Found 97 PID 3140 wrote to memory of 2776 3140 Process not Found 97 PID 3140 wrote to memory of 2776 3140 Process not Found 97 PID 3140 wrote to memory of 3404 3140 Process not Found 98 PID 3140 wrote to memory of 3404 3140 Process not Found 98 PID 3140 wrote to memory of 3404 3140 Process not Found 98 PID 3140 wrote to memory of 3404 3140 Process not Found 98 PID 3140 wrote to memory of 2376 3140 Process not Found 99 PID 3140 wrote to memory of 2376 3140 Process not Found 99 PID 3140 wrote to memory of 2376 3140 Process not Found 99 PID 3140 wrote to memory of 2376 3140 Process not Found 99 PID 3140 wrote to memory of 1056 3140 Process not Found 100 PID 3140 wrote to memory of 1056 3140 Process not Found 100 PID 3140 wrote to memory of 1056 3140 Process not Found 100 PID 3140 wrote to memory of 2808 3140 Process not Found 101 PID 3140 wrote to memory of 2808 3140 Process not Found 101 PID 3140 wrote to memory of 2808 3140 Process not Found 101 PID 3140 wrote to memory of 2808 3140 Process not Found 101 PID 3560 wrote to memory of 4716 3560 4CC8.exe 102 PID 3560 wrote to memory of 4716 3560 4CC8.exe 102 PID 4716 wrote to memory of 3148 4716 00930151714078850565.exe 104 PID 4716 wrote to memory of 3148 4716 00930151714078850565.exe 104 PID 3148 wrote to memory of 2304 3148 cmd.exe 106 PID 3148 wrote to memory of 2304 3148 cmd.exe 106 PID 3560 wrote to memory of 2036 3560 4CC8.exe 107 PID 3560 wrote to memory of 2036 3560 4CC8.exe 107 PID 3560 wrote to memory of 2036 3560 4CC8.exe 107 PID 3560 wrote to memory of 4928 3560 4CC8.exe 108 PID 3560 wrote to memory of 4928 3560 4CC8.exe 108 PID 3560 wrote to memory of 4928 3560 4CC8.exe 108 PID 4928 wrote to memory of 4372 4928 cmd.exe 112 PID 4928 wrote to memory of 4372 4928 cmd.exe 112 PID 4928 wrote to memory of 4372 4928 cmd.exe 112 PID 2036 wrote to memory of 3884 2036 52768030999771317306.exe 113 PID 2036 wrote to memory of 3884 2036 52768030999771317306.exe 113 PID 2036 wrote to memory of 3884 2036 52768030999771317306.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\066b02711e1f408bac89314fb7276995.exe"C:\Users\Admin\AppData\Local\Temp\066b02711e1f408bac89314fb7276995.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2988
-
C:\Users\Admin\AppData\Local\Temp\4CC8.exeC:\Users\Admin\AppData\Local\Temp\4CC8.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\ProgramData\00930151714078850565.exe"C:\ProgramData\00930151714078850565.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\00930151714078850565.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 04⤵PID:2304
-
-
-
-
C:\ProgramData\52768030999771317306.exe"C:\ProgramData\52768030999771317306.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4CC8.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:4372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 20882⤵
- Program crash
PID:3236
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4728
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2260
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3512
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4432
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2776
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3404
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2376
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1056
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3560 -ip 35601⤵PID:2464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
308KB
MD50f05baf410acbdb5472a53529bf2000b
SHA1109fe4c8b160e56cbdbcdb226b155013c2050b53
SHA256257f3227f28be3d46cbb43378f0c59bbbff01638b3935c704726ab7384e339cf
SHA512e9a23c9422227b9500392266c4c454f7a800579916e1d530037ac5185e1b5ff80cc035c449dc04e9cd382125ce166cf560adea5525798972143b18beb1b20713
-
Filesize
308KB
MD50f05baf410acbdb5472a53529bf2000b
SHA1109fe4c8b160e56cbdbcdb226b155013c2050b53
SHA256257f3227f28be3d46cbb43378f0c59bbbff01638b3935c704726ab7384e339cf
SHA512e9a23c9422227b9500392266c4c454f7a800579916e1d530037ac5185e1b5ff80cc035c449dc04e9cd382125ce166cf560adea5525798972143b18beb1b20713
-
Filesize
646.9MB
MD5672b441cd904184c2bdd5d05488d116b
SHA131c858559522838dec4c6abcfbaf48bc269dd727
SHA2567b9c194e9ee7ff74ed0ef9cd8b710353008a345dc6d3069dfc42000d12f17266
SHA512363a4622aa7d834c6cdd52a74f37c7b89756cd51cdbda616f6d1d107b50e8b51751e827763d21c5d7b1139f302b911df8112dbb274a71387780a772edcedc5f9
-
Filesize
640.3MB
MD5a7258d016665c81856abcf4581c68425
SHA158e0f4c265a1670f74be367155fc03c664440348
SHA2561b1f22b92b3cddb4ea78c6907ba7358ccc1d6726874c42b246302c26e869fd8e
SHA5127015f96f5e9acd628827657663db54e130c3eeb7c10fb5097af19752bafe730c165d0986639f7a1dbf100d9a34e4ccabcc242b961a5cfb0a8f55ece2e549f214