Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2023, 04:25
Behavioral task
behavioral1
Sample
0x0006000000015c2f-119.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0x0006000000015c2f-119.exe
Resource
win10v2004-20230703-en
General
-
Target
0x0006000000015c2f-119.exe
-
Size
41KB
-
MD5
966e3f87d18b25d0b2044e704e3ece7b
-
SHA1
67df29ea557d4897d35f65b76684bd5551f6570a
-
SHA256
2b97b07f0ebc338bbcbad650197f4e33e39523fc8ae01fbe4d5f7c3ef23ba5ae
-
SHA512
90548db33f7471cf2545f61480cbbae6094b028b05b76a232cc3dde3a3827a2471a057407f40ff6b4538dc6b4f90205a66b1d7bd28a7ad8467d6748e14346991
-
SSDEEP
384:K9VD6tee+qUOTd2opQTLAdz1SvNmhpdvOjT7PbA6HBiTSnjxZMdP05ldpRMaYIBI:k6Qe+qUv8zcqdvOXA6XkPslJvGaVW
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3956 8056.exe -
Loads dropped DLL 3 IoCs
pid Process 2460 rundll32.exe 2460 rundll32.exe 1020 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 0x0006000000015c2f-119.exe 852 0x0006000000015c2f-119.exe 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3208 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 852 0x0006000000015c2f-119.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3208 wrote to memory of 3956 3208 Process not Found 90 PID 3208 wrote to memory of 3956 3208 Process not Found 90 PID 3208 wrote to memory of 3956 3208 Process not Found 90 PID 3956 wrote to memory of 884 3956 8056.exe 91 PID 3956 wrote to memory of 884 3956 8056.exe 91 PID 3956 wrote to memory of 884 3956 8056.exe 91 PID 884 wrote to memory of 2460 884 control.exe 92 PID 884 wrote to memory of 2460 884 control.exe 92 PID 884 wrote to memory of 2460 884 control.exe 92 PID 2460 wrote to memory of 1440 2460 rundll32.exe 93 PID 2460 wrote to memory of 1440 2460 rundll32.exe 93 PID 1440 wrote to memory of 1020 1440 RunDll32.exe 94 PID 1440 wrote to memory of 1020 1440 RunDll32.exe 94 PID 1440 wrote to memory of 1020 1440 RunDll32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0006000000015c2f-119.exe"C:\Users\Admin\AppData\Local\Temp\0x0006000000015c2f-119.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:852
-
C:\Users\Admin\AppData\Local\Temp\8056.exeC:\Users\Admin\AppData\Local\Temp\8056.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\FYbFY.ZJN2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\FYbFY.ZJN3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\FYbFY.ZJN4⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\FYbFY.ZJN5⤵
- Loads dropped DLL
PID:1020
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5bcd04c210bcf815b5e1f30a522e00b23
SHA1be8afe6153b771cd460152dfe7c676ec369c6890
SHA256522f981d1b11461056cb59ddc8c6b9d959006b47a1f5680953649a88652640c3
SHA512f809454abd4ff8e20c17180888451df4a646917ff369e37dad63298bba253f407f5cb8f89577fff31dd9ea85077b559a01df6a01b738e5c80931c35a3bce2184
-
Filesize
2.5MB
MD5bcd04c210bcf815b5e1f30a522e00b23
SHA1be8afe6153b771cd460152dfe7c676ec369c6890
SHA256522f981d1b11461056cb59ddc8c6b9d959006b47a1f5680953649a88652640c3
SHA512f809454abd4ff8e20c17180888451df4a646917ff369e37dad63298bba253f407f5cb8f89577fff31dd9ea85077b559a01df6a01b738e5c80931c35a3bce2184
-
Filesize
2.3MB
MD5b3e2f91f483fd9f68bb4fd411dc3765d
SHA1218a41dbd904892300c990ec8a59a0eb0a0ff47d
SHA2562ae008326aa986aa077287858d1f6592526b47055f7a48e8ff2caf4759f09f2b
SHA512e68310996bfa3088d3e107473f8729791ec848f81f00d1a18bded4b4e14303029ca769e7c722c12e0e031aea0cf2c7a4e1355412ed5c7935b6e95e09827f8555
-
Filesize
2.3MB
MD5b3e2f91f483fd9f68bb4fd411dc3765d
SHA1218a41dbd904892300c990ec8a59a0eb0a0ff47d
SHA2562ae008326aa986aa077287858d1f6592526b47055f7a48e8ff2caf4759f09f2b
SHA512e68310996bfa3088d3e107473f8729791ec848f81f00d1a18bded4b4e14303029ca769e7c722c12e0e031aea0cf2c7a4e1355412ed5c7935b6e95e09827f8555
-
Filesize
2.3MB
MD5b3e2f91f483fd9f68bb4fd411dc3765d
SHA1218a41dbd904892300c990ec8a59a0eb0a0ff47d
SHA2562ae008326aa986aa077287858d1f6592526b47055f7a48e8ff2caf4759f09f2b
SHA512e68310996bfa3088d3e107473f8729791ec848f81f00d1a18bded4b4e14303029ca769e7c722c12e0e031aea0cf2c7a4e1355412ed5c7935b6e95e09827f8555
-
Filesize
2.3MB
MD5b3e2f91f483fd9f68bb4fd411dc3765d
SHA1218a41dbd904892300c990ec8a59a0eb0a0ff47d
SHA2562ae008326aa986aa077287858d1f6592526b47055f7a48e8ff2caf4759f09f2b
SHA512e68310996bfa3088d3e107473f8729791ec848f81f00d1a18bded4b4e14303029ca769e7c722c12e0e031aea0cf2c7a4e1355412ed5c7935b6e95e09827f8555