Analysis

  • max time kernel
    153s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 11:46

General

  • Target

    13e73d2d887d4795826e1b67a01d85eba735fc4bb69d5149b5e94ef9ba3764b3.exe

  • Size

    4.0MB

  • MD5

    b39d30d98988ced35553febddd654fa1

  • SHA1

    68e26d3ce991ce8b0047f319c50b501cf25ae1b6

  • SHA256

    13e73d2d887d4795826e1b67a01d85eba735fc4bb69d5149b5e94ef9ba3764b3

  • SHA512

    3226a7624a9cceb1fec416da8f6fcf7838a351c4bd7f5d87147ae8130e6efe19608f21918df51329755326e48a9bdee872cd10bafdb7d8f9dd186cf75e8fd3ef

  • SSDEEP

    98304:HYMeRQg6dSsn4zsZtNijfpYS7SEawe1BrTkB8:4Mq6JZtY9M1BX

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://gululugu.zzz.com.ua/

http://gululugu2.zzz.com.ua/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\13e73d2d887d4795826e1b67a01d85eba735fc4bb69d5149b5e94ef9ba3764b3.exe
    "C:\Users\Admin\AppData\Local\Temp\13e73d2d887d4795826e1b67a01d85eba735fc4bb69d5149b5e94ef9ba3764b3.exe"
    1⤵
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4376
  • C:\Users\Admin\AppData\Local\Temp\5C15.exe
    C:\Users\Admin\AppData\Local\Temp\5C15.exe
    1⤵
    • Executes dropped EXE
    PID:3988
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:2404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 856
        2⤵
        • Program crash
        PID:4080
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:2716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2404 -ip 2404
        1⤵
          PID:2424

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\4C05.tmp

                Filesize

                1.6MB

                MD5

                4f3387277ccbd6d1f21ac5c07fe4ca68

                SHA1

                e16506f662dc92023bf82def1d621497c8ab5890

                SHA256

                767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                SHA512

                9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

              • C:\Users\Admin\AppData\Local\Temp\5C15.exe

                Filesize

                4.6MB

                MD5

                18659566d6597e168fd75f0f64ae0acf

                SHA1

                fff293bd1462125fe483746807abfd78d7e7a68e

                SHA256

                5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d

                SHA512

                a51845c1b5d2971ea77adfdd49e66b6ab2a4ec3ea23fc1f4913bf26c1204c6a4c87785ae5e09730d8efcbb934c991a8be0d689308f9de058d81f04560b3b9282

              • C:\Users\Admin\AppData\Local\Temp\5C15.exe

                Filesize

                4.6MB

                MD5

                18659566d6597e168fd75f0f64ae0acf

                SHA1

                fff293bd1462125fe483746807abfd78d7e7a68e

                SHA256

                5d5318419153167c1c9bd2df966ab89afa9e881542730536dd52602e1507419d

                SHA512

                a51845c1b5d2971ea77adfdd49e66b6ab2a4ec3ea23fc1f4913bf26c1204c6a4c87785ae5e09730d8efcbb934c991a8be0d689308f9de058d81f04560b3b9282

              • memory/2404-27-0x0000000000A70000-0x0000000000ADB000-memory.dmp

                Filesize

                428KB

              • memory/2404-31-0x0000000000A70000-0x0000000000ADB000-memory.dmp

                Filesize

                428KB

              • memory/2404-24-0x0000000000AE0000-0x0000000000B54000-memory.dmp

                Filesize

                464KB

              • memory/2716-28-0x0000000001030000-0x000000000103C000-memory.dmp

                Filesize

                48KB

              • memory/2716-30-0x0000000001030000-0x000000000103C000-memory.dmp

                Filesize

                48KB

              • memory/2716-29-0x0000000001040000-0x0000000001047000-memory.dmp

                Filesize

                28KB

              • memory/3260-6-0x0000000003290000-0x00000000032A5000-memory.dmp

                Filesize

                84KB

              • memory/3988-20-0x00000000002C0000-0x0000000000740000-memory.dmp

                Filesize

                4.5MB

              • memory/3988-26-0x00000000002C0000-0x0000000000740000-memory.dmp

                Filesize

                4.5MB

              • memory/4376-0-0x0000000000400000-0x00000000009D9000-memory.dmp

                Filesize

                5.8MB

              • memory/4376-9-0x0000000000400000-0x00000000009D9000-memory.dmp

                Filesize

                5.8MB

              • memory/4376-1-0x0000000000400000-0x00000000009D9000-memory.dmp

                Filesize

                5.8MB