Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 03:21
Behavioral task
behavioral1
Sample
049dba940ae82f0854bf40c8b4e797c2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
049dba940ae82f0854bf40c8b4e797c2.exe
Resource
win10v2004-20230824-en
General
-
Target
049dba940ae82f0854bf40c8b4e797c2.exe
-
Size
47KB
-
MD5
049dba940ae82f0854bf40c8b4e797c2
-
SHA1
66fb9bb6e60c5c3a8b98a373fa447815f04e5542
-
SHA256
dbdec713237cbedbd00b8918ab933922e00df0a115bdbcbaa75cbedd1f47cb97
-
SHA512
4a11d38fccfc853591d75e12a6734403aedd64c691274a4d348eb08a60521928abbcef0b32fa4952d1da5a073f21abf6e672432b77b02347576e64e6d32ce2f4
-
SSDEEP
384:K9VD6tee+qUOTd2opQTLAdz1SvNmhpdvOjT7PbA6HBiTSnjxZMdP05ldpRMaYIBI:k6Qe+qUv8zcqdvOXA6XkPslJvGaVW
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4212 12F.exe -
Loads dropped DLL 4 IoCs
pid Process 2416 rundll32.exe 2416 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\Local Settings 12F.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2168 049dba940ae82f0854bf40c8b4e797c2.exe 2168 049dba940ae82f0854bf40c8b4e797c2.exe 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found 3124 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3124 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2168 049dba940ae82f0854bf40c8b4e797c2.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found Token: SeShutdownPrivilege 3124 Process not Found Token: SeCreatePagefilePrivilege 3124 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3124 Process not Found -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4212 3124 Process not Found 87 PID 3124 wrote to memory of 4212 3124 Process not Found 87 PID 3124 wrote to memory of 4212 3124 Process not Found 87 PID 4212 wrote to memory of 3496 4212 12F.exe 88 PID 4212 wrote to memory of 3496 4212 12F.exe 88 PID 4212 wrote to memory of 3496 4212 12F.exe 88 PID 3496 wrote to memory of 2416 3496 control.exe 90 PID 3496 wrote to memory of 2416 3496 control.exe 90 PID 3496 wrote to memory of 2416 3496 control.exe 90 PID 2416 wrote to memory of 2792 2416 rundll32.exe 91 PID 2416 wrote to memory of 2792 2416 rundll32.exe 91 PID 2792 wrote to memory of 2832 2792 RunDll32.exe 92 PID 2792 wrote to memory of 2832 2792 RunDll32.exe 92 PID 2792 wrote to memory of 2832 2792 RunDll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\049dba940ae82f0854bf40c8b4e797c2.exe"C:\Users\Admin\AppData\Local\Temp\049dba940ae82f0854bf40c8b4e797c2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2168
-
C:\Users\Admin\AppData\Local\Temp\12F.exeC:\Users\Admin\AppData\Local\Temp\12F.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\kz8NPr.Cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\kz8NPr.Cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\kz8NPr.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\kz8NPr.Cpl",5⤵
- Loads dropped DLL
PID:2832
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD506273016cd8622e9e2d9f618518210f2
SHA1a228914a8f237af573ceb8f60166e2dc84f65832
SHA2563c595fbce58f85755fe9f1ee89747434de2c5977539503c35994c7f1d417cf8e
SHA512eec2d3802d257a5baae7c8f618755520f1b0392c36f26b902f6bf6b88f07ebc5b5add3af230c1feac259df35b574d7ff8743b5fcb0be92605766ff1230752deb
-
Filesize
2.7MB
MD506273016cd8622e9e2d9f618518210f2
SHA1a228914a8f237af573ceb8f60166e2dc84f65832
SHA2563c595fbce58f85755fe9f1ee89747434de2c5977539503c35994c7f1d417cf8e
SHA512eec2d3802d257a5baae7c8f618755520f1b0392c36f26b902f6bf6b88f07ebc5b5add3af230c1feac259df35b574d7ff8743b5fcb0be92605766ff1230752deb
-
Filesize
2.6MB
MD5e6218bdf25e21ff48f66d283e229b5b3
SHA17da740a44abfb81f43be2d7b18f6062481bf31c8
SHA256aa6c2b6710be3ba86eea07083bdcce5f3d5a869403f25fb3c7a6f8b12ce45b43
SHA5127653cc51eeb5d31802f1f3e9e51abf2dafd9c83bdfbcde4d4c3a2bfa9f70c059ddf13c1aed4a28b3ec44c9dca4d99761c36a230c0830be931f551f08e27a095b
-
Filesize
2.6MB
MD5e6218bdf25e21ff48f66d283e229b5b3
SHA17da740a44abfb81f43be2d7b18f6062481bf31c8
SHA256aa6c2b6710be3ba86eea07083bdcce5f3d5a869403f25fb3c7a6f8b12ce45b43
SHA5127653cc51eeb5d31802f1f3e9e51abf2dafd9c83bdfbcde4d4c3a2bfa9f70c059ddf13c1aed4a28b3ec44c9dca4d99761c36a230c0830be931f551f08e27a095b
-
Filesize
2.6MB
MD5e6218bdf25e21ff48f66d283e229b5b3
SHA17da740a44abfb81f43be2d7b18f6062481bf31c8
SHA256aa6c2b6710be3ba86eea07083bdcce5f3d5a869403f25fb3c7a6f8b12ce45b43
SHA5127653cc51eeb5d31802f1f3e9e51abf2dafd9c83bdfbcde4d4c3a2bfa9f70c059ddf13c1aed4a28b3ec44c9dca4d99761c36a230c0830be931f551f08e27a095b
-
Filesize
2.6MB
MD5e6218bdf25e21ff48f66d283e229b5b3
SHA17da740a44abfb81f43be2d7b18f6062481bf31c8
SHA256aa6c2b6710be3ba86eea07083bdcce5f3d5a869403f25fb3c7a6f8b12ce45b43
SHA5127653cc51eeb5d31802f1f3e9e51abf2dafd9c83bdfbcde4d4c3a2bfa9f70c059ddf13c1aed4a28b3ec44c9dca4d99761c36a230c0830be931f551f08e27a095b
-
Filesize
2.6MB
MD5e6218bdf25e21ff48f66d283e229b5b3
SHA17da740a44abfb81f43be2d7b18f6062481bf31c8
SHA256aa6c2b6710be3ba86eea07083bdcce5f3d5a869403f25fb3c7a6f8b12ce45b43
SHA5127653cc51eeb5d31802f1f3e9e51abf2dafd9c83bdfbcde4d4c3a2bfa9f70c059ddf13c1aed4a28b3ec44c9dca4d99761c36a230c0830be931f551f08e27a095b
-
Filesize
2.6MB
MD5e6218bdf25e21ff48f66d283e229b5b3
SHA17da740a44abfb81f43be2d7b18f6062481bf31c8
SHA256aa6c2b6710be3ba86eea07083bdcce5f3d5a869403f25fb3c7a6f8b12ce45b43
SHA5127653cc51eeb5d31802f1f3e9e51abf2dafd9c83bdfbcde4d4c3a2bfa9f70c059ddf13c1aed4a28b3ec44c9dca4d99761c36a230c0830be931f551f08e27a095b