Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29/08/2023, 15:34
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
30KB
-
MD5
35a15fad3767597b01a20d75c3c6889a
-
SHA1
eef19e2757667578f73c4b5720cf94c2ab6e60c8
-
SHA256
90ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
-
SHA512
c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
SSDEEP
384:K9VD6tee+qUOTd2opQTLAdz1SvNmhpdvOjT7PbA6HBiTSnjxZMdP05ldpRMaYIBI:k6Qe+qUv8zcqdvOXA6XkPslJvGaVW
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1264 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 3020 711B.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1900 tmp.exe 1900 tmp.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1900 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1264 Process not Found -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3020 1264 Process not Found 30 PID 1264 wrote to memory of 3020 1264 Process not Found 30 PID 1264 wrote to memory of 3020 1264 Process not Found 30 PID 1264 wrote to memory of 3020 1264 Process not Found 30 PID 3020 wrote to memory of 2736 3020 711B.exe 31 PID 3020 wrote to memory of 2736 3020 711B.exe 31 PID 3020 wrote to memory of 2736 3020 711B.exe 31 PID 3020 wrote to memory of 2736 3020 711B.exe 31 PID 3020 wrote to memory of 2736 3020 711B.exe 31 PID 3020 wrote to memory of 2736 3020 711B.exe 31 PID 3020 wrote to memory of 2736 3020 711B.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1900
-
C:\Users\Admin\AppData\Local\Temp\711B.exeC:\Users\Admin\AppData\Local\Temp\711B.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /u EKbLw8.S -S2⤵
- Loads dropped DLL
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD58e28480f46d96df481b8b1fd2bb86b80
SHA1d1460bb42885a64597cbb150cf0188510893d3fc
SHA2564a7bfd4be9c6237cfcb79e75f3448d12695eb6e601325cd52693cb2918b0dd5f
SHA5126663fb58db24713b8717752e9631577d4576ca12a8f2659519186aae68d31f613082751d7881215cc7b4c3ebf1225943861c86643cffc507090e4ad28ae3e25a
-
Filesize
2.9MB
MD58e28480f46d96df481b8b1fd2bb86b80
SHA1d1460bb42885a64597cbb150cf0188510893d3fc
SHA2564a7bfd4be9c6237cfcb79e75f3448d12695eb6e601325cd52693cb2918b0dd5f
SHA5126663fb58db24713b8717752e9631577d4576ca12a8f2659519186aae68d31f613082751d7881215cc7b4c3ebf1225943861c86643cffc507090e4ad28ae3e25a
-
Filesize
2.6MB
MD55ddcf83e32289ba201ed4f506d2931d1
SHA1df1757e8c529343ce5c0cdc757859fa2903fcb01
SHA2562b45a4b650ea3ff1368fa5bc5f01ef6d0941e675c05721736f94d7b3f4bbcffc
SHA5125ff5b0b417db4ca8524b02a0c8a35e9f3428f495b1ae1344dc8310576650fc928b07382d33f4b54aa7bbe18b5c2a157170b3f4a0209be5d76337b5b82bbf5d0c
-
Filesize
2.6MB
MD55ddcf83e32289ba201ed4f506d2931d1
SHA1df1757e8c529343ce5c0cdc757859fa2903fcb01
SHA2562b45a4b650ea3ff1368fa5bc5f01ef6d0941e675c05721736f94d7b3f4bbcffc
SHA5125ff5b0b417db4ca8524b02a0c8a35e9f3428f495b1ae1344dc8310576650fc928b07382d33f4b54aa7bbe18b5c2a157170b3f4a0209be5d76337b5b82bbf5d0c