Analysis
-
max time kernel
208s -
max time network
244s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 19:11
Static task
static1
Behavioral task
behavioral1
Sample
e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe
-
Size
239KB
-
MD5
a870b3e4c3dc630b5f0149f633e45312
-
SHA1
ac57e8e0dfc8dd7c1a7175b14021ade6ca546312
-
SHA256
e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5
-
SHA512
75e406ba06811f42dcb15c3353e2b906234a22fa29cc8bb5b76e84f0219fd2e85f3b21f6e70cd9ba8259f0c00a08d726d20fe5bb6b6efa202671c2ff88e44649
-
SSDEEP
6144:tY46fuYXChoQTjlFgLuCY1dRuAOrKI7w8y0:tpYzXChdTbv1buAGw8y
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023205-50.dat healer behavioral2/files/0x0007000000023205-52.dat healer behavioral2/memory/2904-56-0x00000000003F0000-0x00000000003FA000-memory.dmp healer -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 7 IoCs
pid Process 1696 4F4A.exe 2384 8705.exe 3448 oD7bw4sf.exe 2908 YJ0Yv5oC.exe 4048 E89F.exe 2904 F4C5.exe 460 dR2Ga5Es.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4F4A.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" oD7bw4sf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" YJ0Yv5oC.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2344 set thread context of 3220 2344 e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe 90 PID 2384 set thread context of 2508 2384 8705.exe 102 -
Program crash 2 IoCs
pid pid_target Process procid_target 3340 2344 WerFault.exe 86 2576 2384 WerFault.exe 99 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3220 AppLaunch.exe 3220 AppLaunch.exe 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3184 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3220 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3184 Process not Found 3184 Process not Found -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3220 2344 e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe 90 PID 2344 wrote to memory of 3220 2344 e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe 90 PID 2344 wrote to memory of 3220 2344 e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe 90 PID 2344 wrote to memory of 3220 2344 e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe 90 PID 2344 wrote to memory of 3220 2344 e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe 90 PID 2344 wrote to memory of 3220 2344 e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe 90 PID 3184 wrote to memory of 1696 3184 Process not Found 97 PID 3184 wrote to memory of 1696 3184 Process not Found 97 PID 3184 wrote to memory of 1696 3184 Process not Found 97 PID 3184 wrote to memory of 2384 3184 Process not Found 99 PID 3184 wrote to memory of 2384 3184 Process not Found 99 PID 3184 wrote to memory of 2384 3184 Process not Found 99 PID 1696 wrote to memory of 3448 1696 4F4A.exe 101 PID 1696 wrote to memory of 3448 1696 4F4A.exe 101 PID 1696 wrote to memory of 3448 1696 4F4A.exe 101 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 2384 wrote to memory of 2508 2384 8705.exe 102 PID 3184 wrote to memory of 2180 3184 Process not Found 106 PID 3184 wrote to memory of 2180 3184 Process not Found 106 PID 3448 wrote to memory of 2908 3448 oD7bw4sf.exe 104 PID 3448 wrote to memory of 2908 3448 oD7bw4sf.exe 104 PID 3448 wrote to memory of 2908 3448 oD7bw4sf.exe 104 PID 3184 wrote to memory of 4048 3184 Process not Found 108 PID 3184 wrote to memory of 4048 3184 Process not Found 108 PID 3184 wrote to memory of 4048 3184 Process not Found 108 PID 3184 wrote to memory of 2904 3184 Process not Found 111 PID 3184 wrote to memory of 2904 3184 Process not Found 111 PID 2908 wrote to memory of 460 2908 YJ0Yv5oC.exe 110 PID 2908 wrote to memory of 460 2908 YJ0Yv5oC.exe 110 PID 2908 wrote to memory of 460 2908 YJ0Yv5oC.exe 110 PID 4048 wrote to memory of 4488 4048 E89F.exe 113 PID 4048 wrote to memory of 4488 4048 E89F.exe 113 PID 4048 wrote to memory of 4488 4048 E89F.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe"C:\Users\Admin\AppData\Local\Temp\e4e363ba2bf7ba09114982630a3de87d42ee99a9c3f2ca25f410477d83b354f5_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 2242⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2344 -ip 23441⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\4F4A.exeC:\Users\Admin\AppData\Local\Temp\4F4A.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oD7bw4sf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\oD7bw4sf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YJ0Yv5oC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\YJ0Yv5oC.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dR2Ga5Es.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dR2Ga5Es.exe4⤵
- Executes dropped EXE
PID:460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8705.exeC:\Users\Admin\AppData\Local\Temp\8705.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 1482⤵
- Program crash
PID:2576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2384 -ip 23841⤵PID:4276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BDB6.bat" "1⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\E89F.exeC:\Users\Admin\AppData\Local\Temp\E89F.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\F4C5.exeC:\Users\Admin\AppData\Local\Temp\F4C5.exe1⤵
- Executes dropped EXE
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD597f8378c8e74b612239252ca10185d88
SHA19ee49b0042790ef1871ff5fa087bb6d9428b56ed
SHA25673cbc01956844ae9b23ba8ac81059c56b216828d784ba840456105a4ab7e7b0a
SHA5121e2488ee93e6b59b7785591df25e4ef813dbd3bacd9d7a986b83d5c28ede7e31ffe6a87d40ce054fc784ba7454ace6bf549085fb69e52cdfc127693ed71fb6d7
-
Filesize
1.5MB
MD597f8378c8e74b612239252ca10185d88
SHA19ee49b0042790ef1871ff5fa087bb6d9428b56ed
SHA25673cbc01956844ae9b23ba8ac81059c56b216828d784ba840456105a4ab7e7b0a
SHA5121e2488ee93e6b59b7785591df25e4ef813dbd3bacd9d7a986b83d5c28ede7e31ffe6a87d40ce054fc784ba7454ace6bf549085fb69e52cdfc127693ed71fb6d7
-
Filesize
1.1MB
MD5b925109069a4fffbdbe822d08b036dd7
SHA13ff913f275faf1bdd65fd6b2aa0018aae2aae267
SHA256b693a7f4c43cb7ceb52c661705dbd08c1cfcc1d84f6cf10fc8202beb590d0be0
SHA512d671e2d0ab38207cd02f6fe06b63a22deda64216cefe07acf01f701c5028d04c356a50d63c1e2fcfba1c22ec046babeed500880a92248a0e9d34ae0f5256ae88
-
Filesize
1.1MB
MD5b925109069a4fffbdbe822d08b036dd7
SHA13ff913f275faf1bdd65fd6b2aa0018aae2aae267
SHA256b693a7f4c43cb7ceb52c661705dbd08c1cfcc1d84f6cf10fc8202beb590d0be0
SHA512d671e2d0ab38207cd02f6fe06b63a22deda64216cefe07acf01f701c5028d04c356a50d63c1e2fcfba1c22ec046babeed500880a92248a0e9d34ae0f5256ae88
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
1.1MB
MD59981b0049825abc68bf9500774309ef3
SHA1cc00e57539b263bbe7f5a8c1b2809ec0841c7373
SHA256569e9788082001592d4fa0643a829e3ecbbe29a02409157367bc0a9825d9a6b0
SHA5121396b8474b6a8207326c815a4c7a2c905aec9734ea89311e8b19cbb888821adfec96d434d43295788ed31c0704d7cf4aa063d3dda94860719ccd483d085db4a8
-
Filesize
1.1MB
MD59981b0049825abc68bf9500774309ef3
SHA1cc00e57539b263bbe7f5a8c1b2809ec0841c7373
SHA256569e9788082001592d4fa0643a829e3ecbbe29a02409157367bc0a9825d9a6b0
SHA5121396b8474b6a8207326c815a4c7a2c905aec9734ea89311e8b19cbb888821adfec96d434d43295788ed31c0704d7cf4aa063d3dda94860719ccd483d085db4a8
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
1.3MB
MD54db9de94bcf318b0d4f63e5aeebc691a
SHA1b4f80219381d3983220b109c8489be28802fc53e
SHA256bb19620f4a8c557ca5f90cdc5db435190a87c501c2a1f5f1015b782d3c1a3012
SHA51257d07e4d030fe3e7d626f8c08d173a46b02aa7bb96614b66b0b2abe7f682287e779f2f8d2c25080b956f5ef762ca9a123d2771fcc78d761eba3d0190ce1e2ee7
-
Filesize
1.3MB
MD54db9de94bcf318b0d4f63e5aeebc691a
SHA1b4f80219381d3983220b109c8489be28802fc53e
SHA256bb19620f4a8c557ca5f90cdc5db435190a87c501c2a1f5f1015b782d3c1a3012
SHA51257d07e4d030fe3e7d626f8c08d173a46b02aa7bb96614b66b0b2abe7f682287e779f2f8d2c25080b956f5ef762ca9a123d2771fcc78d761eba3d0190ce1e2ee7
-
Filesize
1.1MB
MD56ef2d0cda61383ec26da417e8ce550c0
SHA175b5dd59aab2badc1d034658ed1f6ee766170eac
SHA256f8adaa4327867b65a247c407b85964836ea98c81ea3f18d96f7273ff7d9909fd
SHA512928ac4364e38ec33dddbf126e6b4ec2b04605186ad2bf1158082da8ebdc832bb61881938840742ad376cc25f1e53b432329b4428eae86728a593a7db38b74dad
-
Filesize
1.1MB
MD56ef2d0cda61383ec26da417e8ce550c0
SHA175b5dd59aab2badc1d034658ed1f6ee766170eac
SHA256f8adaa4327867b65a247c407b85964836ea98c81ea3f18d96f7273ff7d9909fd
SHA512928ac4364e38ec33dddbf126e6b4ec2b04605186ad2bf1158082da8ebdc832bb61881938840742ad376cc25f1e53b432329b4428eae86728a593a7db38b74dad
-
Filesize
755KB
MD5e0c4f1cb82c48d688e5ef7c38862ba55
SHA19c764d6da7a0a81f5797cacc3e1ca1b542c6f122
SHA25671f727a374a2570f749d7d3de49433cf407db9df9697f97ce142dd7129df3952
SHA512741d2b371fefbecf2f59c41c85a98f0f540c377736864141f243891fabbc8968e24bc5b553ba0a356cd4b640e504c2f59f8781d1725142c9ffbd4b1e92a7f2d0
-
Filesize
755KB
MD5e0c4f1cb82c48d688e5ef7c38862ba55
SHA19c764d6da7a0a81f5797cacc3e1ca1b542c6f122
SHA25671f727a374a2570f749d7d3de49433cf407db9df9697f97ce142dd7129df3952
SHA512741d2b371fefbecf2f59c41c85a98f0f540c377736864141f243891fabbc8968e24bc5b553ba0a356cd4b640e504c2f59f8781d1725142c9ffbd4b1e92a7f2d0