Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2023 16:15

General

  • Target

    6Js1_JC.exe

  • Size

    618KB

  • MD5

    3f6d5376b6d40c82644287c7621dfc5b

  • SHA1

    f54b9ed42b60eb6793cd55ed25e6f2bd6120218f

  • SHA256

    94dbf6089ceccafd34ec1011941f18682361d71a9fbc54d1495dc0f9ec52169e

  • SHA512

    3ea3e7c045c015e8c455ed9f550784d7af75c2cba263913ffaa210652f74ed036a6541b71f95d11663ee6dd062059cbcad94c1148243852d01722dd8780d010c

  • SSDEEP

    12288:vbNq3U22k24PnuBvJTvfIVcmaBhIaQBanLFHL4UhnPtJHKFm5fto1XGTI:zI24PuvJTEYHLzhnPwU1cL

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://serverxlogs21.xyz/statweb255/

http://servxblog79.xyz/statweb255/

http://demblog289.xyz/statweb255/

http://admlogs77x.online/statweb255/

http://blogxstat38.xyz/statweb255/

http://blogxstat25.xyz/statweb255/

rc4.i32
rc4.i32

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin payload 2 IoCs
  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6Js1_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6Js1_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Local\Temp\6Js1_JC.exe
      C:\Users\Admin\AppData\Local\Temp\6Js1_JC.exe
      2⤵
        PID:4884
      • C:\Users\Admin\AppData\Local\Temp\6Js1_JC.exe
        C:\Users\Admin\AppData\Local\Temp\6Js1_JC.exe
        2⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2476
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:3796
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:2848
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:3696
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:3284
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:708
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:2768
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1984
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:2296
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:2824
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:1828
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:1248
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:4444
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:2208
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe
                              1⤵
                                PID:4140
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                1⤵
                                • Suspicious behavior: MapViewOfSection
                                PID:4440
                                • C:\Users\Admin\AppData\Local\Temp\F72C.tmp\svchost.exe
                                  C:\Users\Admin\AppData\Local\Temp\F72C.tmp\svchost.exe -debug
                                  2⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Writes to the Master Boot Record (MBR)
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4276
                                  • C:\Windows\SYSTEM32\rundll32.exe
                                    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\F72C.tmp\aa_nts.dll",run
                                    3⤵
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2356

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\F72C.tmp\aa_nts.dll

                                Filesize

                                902KB

                                MD5

                                480a66902e6e7cdafaa6711e8697ff8c

                                SHA1

                                6ac730962e7c1dba9e2ecc5733a506544f3c8d11

                                SHA256

                                7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

                                SHA512

                                7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

                              • C:\Users\Admin\AppData\Local\Temp\F72C.tmp\aa_nts.dll

                                Filesize

                                902KB

                                MD5

                                480a66902e6e7cdafaa6711e8697ff8c

                                SHA1

                                6ac730962e7c1dba9e2ecc5733a506544f3c8d11

                                SHA256

                                7eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5

                                SHA512

                                7d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5

                              • C:\Users\Admin\AppData\Local\Temp\F72C.tmp\aa_nts.msg

                                Filesize

                                46B

                                MD5

                                3f05819f995b4dafa1b5d55ce8d1f411

                                SHA1

                                404449b79a16bfc4f64f2fd55cd73d5d27a85d71

                                SHA256

                                7e0bf0cbd06a087500a9c3b50254df3a8a2c2980921ab6a62ab1121941c80fc0

                                SHA512

                                34abb7df8b3a68e1649ff0d2762576a4d4e65da548e74b1aa65c2b82c1b89f90d053ecddac67c614ca6084dc5b2cb552949250fb70f49b536f1bcb0057717026

                              • C:\Users\Admin\AppData\Local\Temp\F72C.tmp\svchost.exe

                                Filesize

                                798KB

                                MD5

                                90aadf2247149996ae443e2c82af3730

                                SHA1

                                050b7eba825412b24e3f02d76d7da5ae97e10502

                                SHA256

                                ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a

                                SHA512

                                eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be

                              • C:\Users\Admin\AppData\Local\Temp\F72C.tmp\svchost.exe

                                Filesize

                                798KB

                                MD5

                                90aadf2247149996ae443e2c82af3730

                                SHA1

                                050b7eba825412b24e3f02d76d7da5ae97e10502

                                SHA256

                                ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a

                                SHA512

                                eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be

                              • memory/412-8-0x0000000003380000-0x0000000003396000-memory.dmp

                                Filesize

                                88KB

                              • memory/708-55-0x0000000000EA0000-0x0000000000EAB000-memory.dmp

                                Filesize

                                44KB

                              • memory/708-54-0x0000000000EA0000-0x0000000000EAB000-memory.dmp

                                Filesize

                                44KB

                              • memory/708-70-0x0000000000350000-0x000000000035B000-memory.dmp

                                Filesize

                                44KB

                              • memory/1248-74-0x0000000000E40000-0x0000000000E67000-memory.dmp

                                Filesize

                                156KB

                              • memory/1248-75-0x0000000000E70000-0x0000000000E91000-memory.dmp

                                Filesize

                                132KB

                              • memory/1248-76-0x0000000000E40000-0x0000000000E67000-memory.dmp

                                Filesize

                                156KB

                              • memory/1248-104-0x0000000000E70000-0x0000000000E91000-memory.dmp

                                Filesize

                                132KB

                              • memory/1828-69-0x0000000000FF0000-0x0000000000FF9000-memory.dmp

                                Filesize

                                36KB

                              • memory/1828-71-0x0000000001280000-0x0000000001285000-memory.dmp

                                Filesize

                                20KB

                              • memory/1828-95-0x0000000001280000-0x0000000001285000-memory.dmp

                                Filesize

                                20KB

                              • memory/1828-72-0x0000000000FF0000-0x0000000000FF9000-memory.dmp

                                Filesize

                                36KB

                              • memory/1984-61-0x00000000012C0000-0x00000000012C9000-memory.dmp

                                Filesize

                                36KB

                              • memory/1984-59-0x00000000012D0000-0x00000000012D5000-memory.dmp

                                Filesize

                                20KB

                              • memory/1984-60-0x00000000012C0000-0x00000000012C9000-memory.dmp

                                Filesize

                                36KB

                              • memory/1984-77-0x00000000012D0000-0x00000000012D5000-memory.dmp

                                Filesize

                                20KB

                              • memory/2208-85-0x0000000000EB0000-0x0000000000EBB000-memory.dmp

                                Filesize

                                44KB

                              • memory/2208-86-0x0000000000130000-0x0000000000139000-memory.dmp

                                Filesize

                                36KB

                              • memory/2208-112-0x0000000000130000-0x0000000000139000-memory.dmp

                                Filesize

                                36KB

                              • memory/2208-87-0x0000000000EB0000-0x0000000000EBB000-memory.dmp

                                Filesize

                                44KB

                              • memory/2296-65-0x0000000000CC0000-0x0000000000CCC000-memory.dmp

                                Filesize

                                48KB

                              • memory/2296-62-0x0000000000CD0000-0x0000000000CD6000-memory.dmp

                                Filesize

                                24KB

                              • memory/2296-63-0x0000000000CC0000-0x0000000000CCC000-memory.dmp

                                Filesize

                                48KB

                              • memory/2356-137-0x0000000064200000-0x00000000642EE000-memory.dmp

                                Filesize

                                952KB

                              • memory/2476-9-0x0000000000400000-0x0000000000409000-memory.dmp

                                Filesize

                                36KB

                              • memory/2476-6-0x0000000000400000-0x0000000000409000-memory.dmp

                                Filesize

                                36KB

                              • memory/2476-4-0x0000000000400000-0x0000000000409000-memory.dmp

                                Filesize

                                36KB

                              • memory/2768-58-0x0000000000350000-0x000000000035F000-memory.dmp

                                Filesize

                                60KB

                              • memory/2768-73-0x0000000000360000-0x0000000000369000-memory.dmp

                                Filesize

                                36KB

                              • memory/2768-57-0x0000000000360000-0x0000000000369000-memory.dmp

                                Filesize

                                36KB

                              • memory/2768-56-0x0000000000350000-0x000000000035F000-memory.dmp

                                Filesize

                                60KB

                              • memory/2824-67-0x00000000010C0000-0x00000000010C4000-memory.dmp

                                Filesize

                                16KB

                              • memory/2824-68-0x00000000010B0000-0x00000000010B9000-memory.dmp

                                Filesize

                                36KB

                              • memory/2824-66-0x00000000010B0000-0x00000000010B9000-memory.dmp

                                Filesize

                                36KB

                              • memory/2824-89-0x00000000010C0000-0x00000000010C4000-memory.dmp

                                Filesize

                                16KB

                              • memory/2848-45-0x0000000000AE0000-0x0000000000AEC000-memory.dmp

                                Filesize

                                48KB

                              • memory/2848-43-0x0000000000AE0000-0x0000000000AEC000-memory.dmp

                                Filesize

                                48KB

                              • memory/2848-44-0x0000000000AF0000-0x0000000000AF7000-memory.dmp

                                Filesize

                                28KB

                              • memory/3284-51-0x0000000000350000-0x000000000035B000-memory.dmp

                                Filesize

                                44KB

                              • memory/3284-50-0x0000000000360000-0x000000000036A000-memory.dmp

                                Filesize

                                40KB

                              • memory/3284-53-0x0000000000350000-0x000000000035B000-memory.dmp

                                Filesize

                                44KB

                              • memory/3284-52-0x0000000000350000-0x000000000035B000-memory.dmp

                                Filesize

                                44KB

                              • memory/3696-64-0x00000000012B0000-0x00000000012B9000-memory.dmp

                                Filesize

                                36KB

                              • memory/3696-47-0x00000000012C0000-0x00000000012C4000-memory.dmp

                                Filesize

                                16KB

                              • memory/3696-49-0x00000000012B0000-0x00000000012B9000-memory.dmp

                                Filesize

                                36KB

                              • memory/3796-46-0x00000000010B0000-0x000000000111B000-memory.dmp

                                Filesize

                                428KB

                              • memory/3796-19-0x0000000001120000-0x0000000001195000-memory.dmp

                                Filesize

                                468KB

                              • memory/3796-21-0x00000000010B0000-0x000000000111B000-memory.dmp

                                Filesize

                                428KB

                              • memory/3796-20-0x00000000010B0000-0x000000000111B000-memory.dmp

                                Filesize

                                428KB

                              • memory/4140-116-0x0000000000EB0000-0x0000000000EBB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4140-88-0x0000000000100000-0x000000000010D000-memory.dmp

                                Filesize

                                52KB

                              • memory/4140-90-0x0000000000EB0000-0x0000000000EBB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4140-91-0x0000000000100000-0x000000000010D000-memory.dmp

                                Filesize

                                52KB

                              • memory/4188-0-0x0000000000270000-0x0000000000310000-memory.dmp

                                Filesize

                                640KB

                              • memory/4188-2-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4188-1-0x0000000075220000-0x00000000759D0000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/4188-3-0x0000000005570000-0x0000000005B14000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/4188-7-0x0000000075220000-0x00000000759D0000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/4276-133-0x00000000001D0000-0x00000000001DB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4276-106-0x00000000001D0000-0x00000000001DB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4276-105-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4276-103-0x00000000001D0000-0x00000000001DB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4276-109-0x0000000002720000-0x0000000002721000-memory.dmp

                                Filesize

                                4KB

                              • memory/4276-111-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                Filesize

                                4KB

                              • memory/4276-115-0x00000000001D0000-0x00000000001DB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4276-113-0x0000000002700000-0x0000000002701000-memory.dmp

                                Filesize

                                4KB

                              • memory/4440-96-0x0000000000400000-0x0000000000408000-memory.dmp

                                Filesize

                                32KB

                              • memory/4440-97-0x00000000001F0000-0x00000000001FB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4440-94-0x00000000001F0000-0x00000000001FB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4440-129-0x0000000000400000-0x0000000000408000-memory.dmp

                                Filesize

                                32KB

                              • memory/4444-108-0x0000000000140000-0x0000000000145000-memory.dmp

                                Filesize

                                20KB

                              • memory/4444-82-0x0000000000130000-0x0000000000139000-memory.dmp

                                Filesize

                                36KB

                              • memory/4444-81-0x0000000000140000-0x0000000000145000-memory.dmp

                                Filesize

                                20KB

                              • memory/4444-80-0x0000000000130000-0x0000000000139000-memory.dmp

                                Filesize

                                36KB