Analysis

  • max time kernel
    144s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 13:00

General

  • Target

    8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe

  • Size

    269KB

  • MD5

    7026e3aa9f50316cae3b6011c9203154

  • SHA1

    b03356e80698e90ac1548a4086d8ebf84daf12d1

  • SHA256

    8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73

  • SHA512

    3de786fb21f2717ec49fb49705dd23f141293eb2d1437a7be4e20dc30f95d749e69473d22ea279c8d9bc76fe0282a030070cf68e1d1e7055ec2d77639c62e951

  • SSDEEP

    6144:VVqctlMQMY6Vo++E0R6gFAOzTEtftXg35:VVRtiQMYlXVT+Fw35

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe
    "C:\Users\Admin\AppData\Local\Temp\8433f5b093e4f920b53f3456df2f996e8f480ad451bdcdc88ebaddda4abd8a73.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 284
      2⤵
      • Program crash
      PID:4520
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4840 -ip 4840
    1⤵
      PID:4344
    • C:\Users\Admin\AppData\Local\Temp\3B0B.exe
      C:\Users\Admin\AppData\Local\Temp\3B0B.exe
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id0lE5gq.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id0lE5gq.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4112
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EB2Lt7XE.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EB2Lt7XE.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4408
    • C:\Users\Admin\AppData\Local\Temp\59A0.exe
      C:\Users\Admin\AppData\Local\Temp\59A0.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 260
          2⤵
          • Program crash
          PID:944
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7E60.bat" "
        1⤵
          PID:3408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aL7mS8rQ.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aL7mS8rQ.exe
          1⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3088
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\un8KV1YE.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\un8KV1YE.exe
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4940
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cZ68Kj8.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cZ68Kj8.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1904
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                  PID:2336
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  4⤵
                    PID:3572
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 540
                      5⤵
                      • Program crash
                      PID:1740
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 588
                    4⤵
                    • Program crash
                    PID:3068
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1700 -ip 1700
              1⤵
                PID:4824
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1904 -ip 1904
                1⤵
                  PID:4616
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3572 -ip 3572
                  1⤵
                    PID:4780
                  • C:\Users\Admin\AppData\Local\Temp\8882.exe
                    C:\Users\Admin\AppData\Local\Temp\8882.exe
                    1⤵
                    • Executes dropped EXE
                    PID:5096
                  • C:\Users\Admin\AppData\Local\Temp\C3F6.exe
                    C:\Users\Admin\AppData\Local\Temp\C3F6.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4628

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\3B0B.exe

                          Filesize

                          1.5MB

                          MD5

                          56fcedfe48689db7130a5fb8d84e8814

                          SHA1

                          5fdac0203525289cdcdfdb1db14bf8e21129f523

                          SHA256

                          3d6164a9eb5885649da48382f721496ab1ce65ae0f5407ff0c593b43ef44da20

                          SHA512

                          48056f6b1cc1944ea2ff392a8a4ee451cf321410832f88df850cb5448edfeb0d5e0fa5f1941249735687a196805da996789e2593ceac32f7d2d26d2a5cd8c522

                        • C:\Users\Admin\AppData\Local\Temp\3B0B.exe

                          Filesize

                          1.5MB

                          MD5

                          56fcedfe48689db7130a5fb8d84e8814

                          SHA1

                          5fdac0203525289cdcdfdb1db14bf8e21129f523

                          SHA256

                          3d6164a9eb5885649da48382f721496ab1ce65ae0f5407ff0c593b43ef44da20

                          SHA512

                          48056f6b1cc1944ea2ff392a8a4ee451cf321410832f88df850cb5448edfeb0d5e0fa5f1941249735687a196805da996789e2593ceac32f7d2d26d2a5cd8c522

                        • C:\Users\Admin\AppData\Local\Temp\59A0.exe

                          Filesize

                          1.1MB

                          MD5

                          eaeb7e3a0db40a34947bbdb91f493dfb

                          SHA1

                          800548abdd6a327c3d573110f042996c83f29141

                          SHA256

                          a11bcec98fc3b4a85e8ebd8ad85dc882a4310a47778bd150c2ad3cf027caf6b8

                          SHA512

                          b488e4a4e0fc1efc68bc4143bbd9b0d83fff0763dc8b2d7d53e7480176166d7d88eab92c488238acd35cbcb2b00d047560d596f2b9ee94736278ee6b31964951

                        • C:\Users\Admin\AppData\Local\Temp\59A0.exe

                          Filesize

                          1.1MB

                          MD5

                          eaeb7e3a0db40a34947bbdb91f493dfb

                          SHA1

                          800548abdd6a327c3d573110f042996c83f29141

                          SHA256

                          a11bcec98fc3b4a85e8ebd8ad85dc882a4310a47778bd150c2ad3cf027caf6b8

                          SHA512

                          b488e4a4e0fc1efc68bc4143bbd9b0d83fff0763dc8b2d7d53e7480176166d7d88eab92c488238acd35cbcb2b00d047560d596f2b9ee94736278ee6b31964951

                        • C:\Users\Admin\AppData\Local\Temp\7E60.bat

                          Filesize

                          79B

                          MD5

                          403991c4d18ac84521ba17f264fa79f2

                          SHA1

                          850cc068de0963854b0fe8f485d951072474fd45

                          SHA256

                          ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f

                          SHA512

                          a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576

                        • C:\Users\Admin\AppData\Local\Temp\8882.exe

                          Filesize

                          1.2MB

                          MD5

                          ed54dbd154b0a8362e82d30bb25ad293

                          SHA1

                          2bbfa4f28f8426142083729e897e78374fe2a5ca

                          SHA256

                          a4fe888caf85939c8879dc7e83bce22bcbb08aa39039b6c4b047a460db5af08d

                          SHA512

                          df3969c11d7c0691a0880349207a221d58394f9d894e37010f27cd086e24246d7917a11320689838181d6ebc4f728166a5f9cec9607656967a5220f4dbfd7e95

                        • C:\Users\Admin\AppData\Local\Temp\C3F6.exe

                          Filesize

                          21KB

                          MD5

                          57543bf9a439bf01773d3d508a221fda

                          SHA1

                          5728a0b9f1856aa5183d15ba00774428be720c35

                          SHA256

                          70d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e

                          SHA512

                          28f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20

                        • C:\Users\Admin\AppData\Local\Temp\C3F6.exe

                          Filesize

                          21KB

                          MD5

                          57543bf9a439bf01773d3d508a221fda

                          SHA1

                          5728a0b9f1856aa5183d15ba00774428be720c35

                          SHA256

                          70d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e

                          SHA512

                          28f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id0lE5gq.exe

                          Filesize

                          1.4MB

                          MD5

                          3a0ccfbce36fa75a6c94e87859a2fd9b

                          SHA1

                          7d1296a7cbaa8f26003bbbabe81336b28d02e271

                          SHA256

                          941a0d55c3b2bd7a0e47c0ab3ebf6893f4dd12d9cce239d3dd8e199c65d52e8f

                          SHA512

                          cc59f6ea4ac236465e3bc45f2eeef8db05d44426a1998b34d2d7f679274448ec27295340e3d5ce0822401f160fdc503f2a27f2d4990e45337fdc2ad55e9d9882

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id0lE5gq.exe

                          Filesize

                          1.4MB

                          MD5

                          3a0ccfbce36fa75a6c94e87859a2fd9b

                          SHA1

                          7d1296a7cbaa8f26003bbbabe81336b28d02e271

                          SHA256

                          941a0d55c3b2bd7a0e47c0ab3ebf6893f4dd12d9cce239d3dd8e199c65d52e8f

                          SHA512

                          cc59f6ea4ac236465e3bc45f2eeef8db05d44426a1998b34d2d7f679274448ec27295340e3d5ce0822401f160fdc503f2a27f2d4990e45337fdc2ad55e9d9882

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EB2Lt7XE.exe

                          Filesize

                          1.2MB

                          MD5

                          44bfa18b62f2025a0d3176b50c6ec81e

                          SHA1

                          65bc2309239968d34ffbb8a25e63b7c57dbdaf80

                          SHA256

                          833b77aa91f77cf5dcdd7203746ee33ea8faf203862dde915cf48fe7876761ea

                          SHA512

                          71ab78cecbd6b332b262b1bd8438c426239d268767e92183327874fbd6aad6153dca9df872a8bbdcfb89f442068b49c8c775e2c976d1bda99617cb71a5da1cea

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EB2Lt7XE.exe

                          Filesize

                          1.2MB

                          MD5

                          44bfa18b62f2025a0d3176b50c6ec81e

                          SHA1

                          65bc2309239968d34ffbb8a25e63b7c57dbdaf80

                          SHA256

                          833b77aa91f77cf5dcdd7203746ee33ea8faf203862dde915cf48fe7876761ea

                          SHA512

                          71ab78cecbd6b332b262b1bd8438c426239d268767e92183327874fbd6aad6153dca9df872a8bbdcfb89f442068b49c8c775e2c976d1bda99617cb71a5da1cea

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aL7mS8rQ.exe

                          Filesize

                          776KB

                          MD5

                          39d45892237ae9f0b8e51135e3e672be

                          SHA1

                          f22c9a788a65e2797c0c96c5ca20a474341c7b40

                          SHA256

                          e46538b70611b7fb0c0402ab463b7b19b96f58d636b83d6e84d73473244ee8ab

                          SHA512

                          2369cb81184f0ea1e1be93241d919bfd9184c74121c1540e56e630cd2ed0773728c08f06357c02063011aab3bf7a1646e786128e379bbdfee907dd195486eb44

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aL7mS8rQ.exe

                          Filesize

                          776KB

                          MD5

                          39d45892237ae9f0b8e51135e3e672be

                          SHA1

                          f22c9a788a65e2797c0c96c5ca20a474341c7b40

                          SHA256

                          e46538b70611b7fb0c0402ab463b7b19b96f58d636b83d6e84d73473244ee8ab

                          SHA512

                          2369cb81184f0ea1e1be93241d919bfd9184c74121c1540e56e630cd2ed0773728c08f06357c02063011aab3bf7a1646e786128e379bbdfee907dd195486eb44

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\un8KV1YE.exe

                          Filesize

                          580KB

                          MD5

                          06e1e8757b7a212470f5362e774ed49f

                          SHA1

                          8a706d44309e37ba4fc5c59cae2ec656b6b6c8ee

                          SHA256

                          3f8f9db3c4c4b45611504245289ec884854d652d01b827723c0953a8e8f83273

                          SHA512

                          25bbabde001f013de974890994cf6f00d1b5c835e17443eebaaa606dbdb4ea9e0b707a12804a98e72c83804dabac00c08beb1bac13e811e199813b6cc75c27f9

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\un8KV1YE.exe

                          Filesize

                          580KB

                          MD5

                          06e1e8757b7a212470f5362e774ed49f

                          SHA1

                          8a706d44309e37ba4fc5c59cae2ec656b6b6c8ee

                          SHA256

                          3f8f9db3c4c4b45611504245289ec884854d652d01b827723c0953a8e8f83273

                          SHA512

                          25bbabde001f013de974890994cf6f00d1b5c835e17443eebaaa606dbdb4ea9e0b707a12804a98e72c83804dabac00c08beb1bac13e811e199813b6cc75c27f9

                        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cZ68Kj8.exe

                          Filesize

                          1.1MB

                          MD5

                          fb2009543b06c96ca3ef9044aac34605

                          SHA1

                          eba69490f18c74d83e7036b8dbf9c868ccf7fa08

                          SHA256

                          ddca71da73ddc53ee042f6e0fea34f643feef8e8e94d0b0e4586f9109f4591e5

                          SHA512

                          289a0f1150536c2f9a994a62afebf7389c8c236489d505e9a19bad3dd4b46586dd63a2c2176d2ca04e18068c52cea1cfdf5492e7c557bd1f4d53961d98a0a1b1

                        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cZ68Kj8.exe

                          Filesize

                          1.1MB

                          MD5

                          fb2009543b06c96ca3ef9044aac34605

                          SHA1

                          eba69490f18c74d83e7036b8dbf9c868ccf7fa08

                          SHA256

                          ddca71da73ddc53ee042f6e0fea34f643feef8e8e94d0b0e4586f9109f4591e5

                          SHA512

                          289a0f1150536c2f9a994a62afebf7389c8c236489d505e9a19bad3dd4b46586dd63a2c2176d2ca04e18068c52cea1cfdf5492e7c557bd1f4d53961d98a0a1b1

                        • memory/208-60-0x0000000000400000-0x0000000000433000-memory.dmp

                          Filesize

                          204KB

                        • memory/208-58-0x0000000000400000-0x0000000000433000-memory.dmp

                          Filesize

                          204KB

                        • memory/208-59-0x0000000000400000-0x0000000000433000-memory.dmp

                          Filesize

                          204KB

                        • memory/208-57-0x0000000000400000-0x0000000000433000-memory.dmp

                          Filesize

                          204KB

                        • memory/3144-2-0x0000000002D50000-0x0000000002D66000-memory.dmp

                          Filesize

                          88KB

                        • memory/3572-62-0x0000000000400000-0x0000000000433000-memory.dmp

                          Filesize

                          204KB

                        • memory/3572-63-0x0000000000400000-0x0000000000433000-memory.dmp

                          Filesize

                          204KB

                        • memory/3572-65-0x0000000000400000-0x0000000000433000-memory.dmp

                          Filesize

                          204KB

                        • memory/4656-0-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/4656-3-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/4656-1-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB