Analysis

  • max time kernel
    150s
  • max time network
    107s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/04/2023, 03:05

General

  • Target

    15015df0f2162b04aa3ec51ba5564ded4798868fe4560128efab1a816449b306.exe

  • Size

    350KB

  • MD5

    c95c0e49090ef50b2756687ba45466d4

  • SHA1

    d233cba6b0d12aa2a1fc0dae01d312c03746ebbf

  • SHA256

    15015df0f2162b04aa3ec51ba5564ded4798868fe4560128efab1a816449b306

  • SHA512

    e12edec02fe96a017ef7ec38a7067c66689a738968fac79724388fc46990608f00d67b2974a0030bda5adbcad89dba8fcbd91f76ea3f6d5feb08098f21c76de4

  • SSDEEP

    3072:xMaLCAQ3zCb1gQ2Qfzdgi1DGickrlEPfIyOzbuDtW92SoNIUvSGL4Oy/D2Sv6dz:FLOCpD2at1D2IWDIJI4S4rTi

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32

Extracted

Family

rhadamanthys

C2

http://179.43.142.201/img/favicon.png

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15015df0f2162b04aa3ec51ba5564ded4798868fe4560128efab1a816449b306.exe
    "C:\Users\Admin\AppData\Local\Temp\15015df0f2162b04aa3ec51ba5564ded4798868fe4560128efab1a816449b306.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3848
  • C:\Users\Admin\AppData\Local\Temp\678.exe
    C:\Users\Admin\AppData\Local\Temp\678.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\system32\dllhost.exe
      "C:\Windows\system32\dllhost.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • outlook_office_path
      • outlook_win_path
      PID:4256

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\678.exe

          Filesize

          423KB

          MD5

          125d1cf1adccdd7c0e0058f02d7dcfc4

          SHA1

          31ae25eb8cc617c94335773eb0261614554d9e19

          SHA256

          a499e4d7f71cb83c442b02f45dc986a42c6fef18ffc0efb9a54287671e063cc2

          SHA512

          e9e0b496e8ae722c58952dae5dc3f0942b1b87f2792741c05106792ae9249a44b6689560cf1e8cb87bb32ac26a375aa6f249643c0093e4d205ddd733da02d601

        • C:\Users\Admin\AppData\Local\Temp\678.exe

          Filesize

          423KB

          MD5

          125d1cf1adccdd7c0e0058f02d7dcfc4

          SHA1

          31ae25eb8cc617c94335773eb0261614554d9e19

          SHA256

          a499e4d7f71cb83c442b02f45dc986a42c6fef18ffc0efb9a54287671e063cc2

          SHA512

          e9e0b496e8ae722c58952dae5dc3f0942b1b87f2792741c05106792ae9249a44b6689560cf1e8cb87bb32ac26a375aa6f249643c0093e4d205ddd733da02d601

        • memory/1840-138-0x00000000009D0000-0x00000000009EC000-memory.dmp

          Filesize

          112KB

        • memory/1840-146-0x0000000000400000-0x000000000080F000-memory.dmp

          Filesize

          4.1MB

        • memory/1840-131-0x0000000000860000-0x000000000088E000-memory.dmp

          Filesize

          184KB

        • memory/1840-132-0x0000000000400000-0x000000000080F000-memory.dmp

          Filesize

          4.1MB

        • memory/1840-135-0x00000000009D0000-0x00000000009EC000-memory.dmp

          Filesize

          112KB

        • memory/1840-136-0x00000000009D0000-0x00000000009EC000-memory.dmp

          Filesize

          112KB

        • memory/1840-137-0x0000000000890000-0x0000000000892000-memory.dmp

          Filesize

          8KB

        • memory/1840-140-0x0000000000890000-0x0000000000893000-memory.dmp

          Filesize

          12KB

        • memory/1840-147-0x00000000009D0000-0x00000000009EC000-memory.dmp

          Filesize

          112KB

        • memory/3152-119-0x0000000000FB0000-0x0000000000FC6000-memory.dmp

          Filesize

          88KB

        • memory/3848-118-0x0000000000930000-0x0000000000939000-memory.dmp

          Filesize

          36KB

        • memory/3848-120-0x0000000000400000-0x00000000007FD000-memory.dmp

          Filesize

          4.0MB

        • memory/4256-139-0x000001121AF20000-0x000001121AF21000-memory.dmp

          Filesize

          4KB

        • memory/4256-145-0x00007FF7102F0000-0x00007FF7103EA000-memory.dmp

          Filesize

          1000KB

        • memory/4256-142-0x00007FF7102F0000-0x00007FF7103EA000-memory.dmp

          Filesize

          1000KB

        • memory/4256-141-0x000001121AED0000-0x000001121AED7000-memory.dmp

          Filesize

          28KB

        • memory/4256-148-0x00007FF7102F0000-0x00007FF7103EA000-memory.dmp

          Filesize

          1000KB

        • memory/4256-149-0x00007FF7102F0000-0x00007FF7103EA000-memory.dmp

          Filesize

          1000KB

        • memory/4256-150-0x00007FF7102F0000-0x00007FF7103EA000-memory.dmp

          Filesize

          1000KB

        • memory/4256-151-0x00007FF7102F0000-0x00007FF7103EA000-memory.dmp

          Filesize

          1000KB