Analysis
-
max time kernel
157s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
497KB
-
MD5
f06f0f0288cdc3abca062037eed25964
-
SHA1
0b13302622c80b36385bedce93b999081ed20d87
-
SHA256
f991e808ed44c731fea1758fd6a275ec4e3ee66a5a691dbf1f9414a5faa144a1
-
SHA512
d40993a93ad0a92570a80f96d33d55f8a44157a5a0a8bf83f1044394c5eface950c5be763b331e50dbc121890b70ab2bc72ca29096601d1c2952f242c8c44394
-
SSDEEP
12288:OnDOS1B4EjNHiBWOB3o5GzxUiuJZHOifD:ODOojNHi0Mo5GzCTJM
Malware Config
Extracted
amadey
3.83
45.9.74.80/0bjdn2Z/index.php
Extracted
smokeloader
pub5
Extracted
smokeloader
2022
http://greenbi.net/tmp/
http://speakdyn.com/tmp/
http://pik96.ru/tmp/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 5 IoCs
pid Process 4908 cb5946c8.exe 3888 newplayer.exe 2220 oneetx.exe 3856 oneetx.exe 3976 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3308 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4908 cb5946c8.exe 4908 cb5946c8.exe 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 684 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4908 cb5946c8.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found Token: SeShutdownPrivilege 684 Process not Found Token: SeCreatePagefilePrivilege 684 Process not Found -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3888 newplayer.exe 684 Process not Found 684 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4908 2236 tmp.exe 86 PID 2236 wrote to memory of 4908 2236 tmp.exe 86 PID 2236 wrote to memory of 4908 2236 tmp.exe 86 PID 2236 wrote to memory of 3888 2236 tmp.exe 87 PID 2236 wrote to memory of 3888 2236 tmp.exe 87 PID 2236 wrote to memory of 3888 2236 tmp.exe 87 PID 3888 wrote to memory of 2220 3888 newplayer.exe 88 PID 3888 wrote to memory of 2220 3888 newplayer.exe 88 PID 3888 wrote to memory of 2220 3888 newplayer.exe 88 PID 2220 wrote to memory of 3308 2220 oneetx.exe 89 PID 2220 wrote to memory of 3308 2220 oneetx.exe 89 PID 2220 wrote to memory of 3308 2220 oneetx.exe 89 PID 2220 wrote to memory of 3588 2220 oneetx.exe 91 PID 2220 wrote to memory of 3588 2220 oneetx.exe 91 PID 2220 wrote to memory of 3588 2220 oneetx.exe 91 PID 3588 wrote to memory of 4304 3588 cmd.exe 93 PID 3588 wrote to memory of 4304 3588 cmd.exe 93 PID 3588 wrote to memory of 4304 3588 cmd.exe 93 PID 3588 wrote to memory of 2224 3588 cmd.exe 94 PID 3588 wrote to memory of 2224 3588 cmd.exe 94 PID 3588 wrote to memory of 2224 3588 cmd.exe 94 PID 3588 wrote to memory of 2272 3588 cmd.exe 95 PID 3588 wrote to memory of 2272 3588 cmd.exe 95 PID 3588 wrote to memory of 2272 3588 cmd.exe 95 PID 3588 wrote to memory of 4576 3588 cmd.exe 96 PID 3588 wrote to memory of 4576 3588 cmd.exe 96 PID 3588 wrote to memory of 4576 3588 cmd.exe 96 PID 3588 wrote to memory of 3076 3588 cmd.exe 97 PID 3588 wrote to memory of 3076 3588 cmd.exe 97 PID 3588 wrote to memory of 3076 3588 cmd.exe 97 PID 3588 wrote to memory of 3788 3588 cmd.exe 98 PID 3588 wrote to memory of 3788 3588 cmd.exe 98 PID 3588 wrote to memory of 3788 3588 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\cb5946c8.exe"C:\Users\Admin\AppData\Local\Temp\cb5946c8.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\newplayer.exe"C:\Users\Admin\AppData\Local\Temp\newplayer.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"5⤵PID:3076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E5⤵PID:3788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:3856
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5f0033521f40c06dec473854c7d98fa8b
SHA128dadfe642a0c308e1f744b0d87a6d22dd6cd55a
SHA2564458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
SHA512f6758814fd20b613fe6f3df7a0a60488dcae59680c3487344a701f59dca972acbb1dd8041bd3fa8d3f97279193796dab9c7f98f1cab3e25686ca34c65e349217
-
Filesize
198KB
MD5f0033521f40c06dec473854c7d98fa8b
SHA128dadfe642a0c308e1f744b0d87a6d22dd6cd55a
SHA2564458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
SHA512f6758814fd20b613fe6f3df7a0a60488dcae59680c3487344a701f59dca972acbb1dd8041bd3fa8d3f97279193796dab9c7f98f1cab3e25686ca34c65e349217
-
Filesize
198KB
MD5f0033521f40c06dec473854c7d98fa8b
SHA128dadfe642a0c308e1f744b0d87a6d22dd6cd55a
SHA2564458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
SHA512f6758814fd20b613fe6f3df7a0a60488dcae59680c3487344a701f59dca972acbb1dd8041bd3fa8d3f97279193796dab9c7f98f1cab3e25686ca34c65e349217
-
Filesize
198KB
MD5f0033521f40c06dec473854c7d98fa8b
SHA128dadfe642a0c308e1f744b0d87a6d22dd6cd55a
SHA2564458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
SHA512f6758814fd20b613fe6f3df7a0a60488dcae59680c3487344a701f59dca972acbb1dd8041bd3fa8d3f97279193796dab9c7f98f1cab3e25686ca34c65e349217
-
Filesize
288KB
MD5d35bb0807817a206e1c5ae04f1ffd126
SHA14c0e8530e2a03207d83e265e83c0b80b77909069
SHA2564326cdc00eaa0dec92978fb6c14d5a49e08e63905b2f99df8a5c11253a2a6197
SHA512a3446457306b50da210498447f4410aae6037b88206983da287e43a9f447b76d1909bdf7e16763f7a415a2dbe54fd98353181a6b3d1b5f9796111491d80ebf2d
-
Filesize
288KB
MD5d35bb0807817a206e1c5ae04f1ffd126
SHA14c0e8530e2a03207d83e265e83c0b80b77909069
SHA2564326cdc00eaa0dec92978fb6c14d5a49e08e63905b2f99df8a5c11253a2a6197
SHA512a3446457306b50da210498447f4410aae6037b88206983da287e43a9f447b76d1909bdf7e16763f7a415a2dbe54fd98353181a6b3d1b5f9796111491d80ebf2d
-
Filesize
288KB
MD5d35bb0807817a206e1c5ae04f1ffd126
SHA14c0e8530e2a03207d83e265e83c0b80b77909069
SHA2564326cdc00eaa0dec92978fb6c14d5a49e08e63905b2f99df8a5c11253a2a6197
SHA512a3446457306b50da210498447f4410aae6037b88206983da287e43a9f447b76d1909bdf7e16763f7a415a2dbe54fd98353181a6b3d1b5f9796111491d80ebf2d
-
Filesize
198KB
MD5f0033521f40c06dec473854c7d98fa8b
SHA128dadfe642a0c308e1f744b0d87a6d22dd6cd55a
SHA2564458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
SHA512f6758814fd20b613fe6f3df7a0a60488dcae59680c3487344a701f59dca972acbb1dd8041bd3fa8d3f97279193796dab9c7f98f1cab3e25686ca34c65e349217
-
Filesize
198KB
MD5f0033521f40c06dec473854c7d98fa8b
SHA128dadfe642a0c308e1f744b0d87a6d22dd6cd55a
SHA2564458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
SHA512f6758814fd20b613fe6f3df7a0a60488dcae59680c3487344a701f59dca972acbb1dd8041bd3fa8d3f97279193796dab9c7f98f1cab3e25686ca34c65e349217
-
Filesize
198KB
MD5f0033521f40c06dec473854c7d98fa8b
SHA128dadfe642a0c308e1f744b0d87a6d22dd6cd55a
SHA2564458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
SHA512f6758814fd20b613fe6f3df7a0a60488dcae59680c3487344a701f59dca972acbb1dd8041bd3fa8d3f97279193796dab9c7f98f1cab3e25686ca34c65e349217