Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2023 09:38

General

  • Target

    b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034exe_JC.exe

  • Size

    252KB

  • MD5

    aa61de6ebd02482cd16996c6f42ba8ab

  • SHA1

    dea6f794cf98f0084bf14916d956818169a36b76

  • SHA256

    b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034

  • SHA512

    2c638be845bd245db502abee66de6eac9a96348f2e9f81e43bcf648e14caba3d2f075f4f25261ed1ae9ae542f268d36a6214bc08fec958b6eb9e6d8d42c952e3

  • SSDEEP

    3072:ajHIbQtMJSCTEKvAw2P7bhICAgYGlA5XFAf0jDb+:aEEtMJNEYAw2TCgvcX2MD

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034exe_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Users\Admin\AppData\Local\Temp\b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034exe_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034exe_JC.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3520
  • C:\Users\Admin\AppData\Roaming\gugtvfw
    C:\Users\Admin\AppData\Roaming\gugtvfw
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Users\Admin\AppData\Roaming\gugtvfw
      C:\Users\Admin\AppData\Roaming\gugtvfw
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gugtvfw

    Filesize

    252KB

    MD5

    aa61de6ebd02482cd16996c6f42ba8ab

    SHA1

    dea6f794cf98f0084bf14916d956818169a36b76

    SHA256

    b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034

    SHA512

    2c638be845bd245db502abee66de6eac9a96348f2e9f81e43bcf648e14caba3d2f075f4f25261ed1ae9ae542f268d36a6214bc08fec958b6eb9e6d8d42c952e3

  • C:\Users\Admin\AppData\Roaming\gugtvfw

    Filesize

    252KB

    MD5

    aa61de6ebd02482cd16996c6f42ba8ab

    SHA1

    dea6f794cf98f0084bf14916d956818169a36b76

    SHA256

    b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034

    SHA512

    2c638be845bd245db502abee66de6eac9a96348f2e9f81e43bcf648e14caba3d2f075f4f25261ed1ae9ae542f268d36a6214bc08fec958b6eb9e6d8d42c952e3

  • C:\Users\Admin\AppData\Roaming\gugtvfw

    Filesize

    252KB

    MD5

    aa61de6ebd02482cd16996c6f42ba8ab

    SHA1

    dea6f794cf98f0084bf14916d956818169a36b76

    SHA256

    b54f42b5b0d19670960eb10c6789968a30df7e8532519b32d5ef33bf155fc034

    SHA512

    2c638be845bd245db502abee66de6eac9a96348f2e9f81e43bcf648e14caba3d2f075f4f25261ed1ae9ae542f268d36a6214bc08fec958b6eb9e6d8d42c952e3

  • memory/460-1-0x00000000008A0000-0x00000000009A0000-memory.dmp

    Filesize

    1024KB

  • memory/460-2-0x0000000002450000-0x0000000002459000-memory.dmp

    Filesize

    36KB

  • memory/3288-48-0x00000000034C0000-0x00000000034D0000-memory.dmp

    Filesize

    64KB

  • memory/3288-18-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-16-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-94-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-17-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-93-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-19-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-20-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-24-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-23-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-22-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-25-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-26-0x00000000034C0000-0x00000000034D0000-memory.dmp

    Filesize

    64KB

  • memory/3288-27-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-28-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-30-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-32-0x00000000034A0000-0x00000000034B0000-memory.dmp

    Filesize

    64KB

  • memory/3288-31-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-29-0x00000000034C0000-0x00000000034D0000-memory.dmp

    Filesize

    64KB

  • memory/3288-34-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-35-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-36-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-38-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-37-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-39-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-40-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-42-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-41-0x00000000034C0000-0x00000000034D0000-memory.dmp

    Filesize

    64KB

  • memory/3288-43-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-44-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-45-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-46-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-47-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-13-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-15-0x00000000034A0000-0x00000000034B0000-memory.dmp

    Filesize

    64KB

  • memory/3288-92-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-14-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-91-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-5-0x0000000003040000-0x0000000003056000-memory.dmp

    Filesize

    88KB

  • memory/3288-55-0x00000000034C0000-0x00000000034D6000-memory.dmp

    Filesize

    88KB

  • memory/3288-88-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-61-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-62-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-63-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-64-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-65-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-66-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-69-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-68-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-67-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-71-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-72-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-73-0x00000000034F0000-0x0000000003500000-memory.dmp

    Filesize

    64KB

  • memory/3288-74-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-75-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-76-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-78-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-77-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-82-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-80-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-84-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-85-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-87-0x00000000034F0000-0x0000000003500000-memory.dmp

    Filesize

    64KB

  • memory/3288-86-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-89-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3288-90-0x0000000003480000-0x0000000003490000-memory.dmp

    Filesize

    64KB

  • memory/3520-6-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3520-4-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3520-3-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4420-56-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4724-52-0x0000000000A50000-0x0000000000B50000-memory.dmp

    Filesize

    1024KB