Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2023 07:14

General

  • Target

    file.exe

  • Size

    265KB

  • MD5

    d7752d31728c6341a41b3aa476fa3529

  • SHA1

    d243602f189bf7c5978d929ffd4a9aa321712138

  • SHA256

    08a646fa562d3e3f447b7001356424cc5d7c7296873a8d1d94be35bd52a3b58d

  • SHA512

    6040276c9c6206132e2dced287bd4452222c494e4f1d4191d51dbd43861e8d02d2abaf704ebe12462a8fb2eb59431eca684a0d20ee25f7f0fe76d5a2d38973c0

  • SSDEEP

    3072:Q7FaQEw9YltfXFZ/yxSeLjRtrgssGbuHhmPcuddu2M93fzC7G/56YEZ4:oFHP0vFZ6xSehtzFjzAvzC

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2022

C2

http://humydrole.com/tmp/index.php

http://trunk-co.ru/tmp/index.php

http://weareelight.com/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32

Signatures

  • Detect PureLogs payload 3 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2044
  • C:\Users\Admin\AppData\Local\Temp\AC75.exe
    C:\Users\Admin\AppData\Local\Temp\AC75.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      2⤵
        PID:748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AC75.exe

      Filesize

      2.8MB

      MD5

      90c99127993e7d99197eb88ea2e82806

      SHA1

      7ff88701a269f8e4eb122cbc48e0ff515764a43d

      SHA256

      c3ab62bb1d1ae51c68f9ab5bab2fb7bcf6eed8755ed543e23424375f0329f6f5

      SHA512

      f9a7f6233eb7d44bd8c470a07e224ca44290635d7e8d0cd78df0801fb510ebd09e648fb5340a73cbb57f2395ae4b92e496627a4c5b23c5845a531662f81ae825

    • C:\Users\Admin\AppData\Local\Temp\AC75.exe

      Filesize

      2.8MB

      MD5

      90c99127993e7d99197eb88ea2e82806

      SHA1

      7ff88701a269f8e4eb122cbc48e0ff515764a43d

      SHA256

      c3ab62bb1d1ae51c68f9ab5bab2fb7bcf6eed8755ed543e23424375f0329f6f5

      SHA512

      f9a7f6233eb7d44bd8c470a07e224ca44290635d7e8d0cd78df0801fb510ebd09e648fb5340a73cbb57f2395ae4b92e496627a4c5b23c5845a531662f81ae825

    • memory/748-33-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-31-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-32-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-35-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-36-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/748-34-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-46-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-44-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-42-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/748-38-0x0000000000400000-0x000000000047E000-memory.dmp

      Filesize

      504KB

    • memory/1376-4-0x0000000002700000-0x0000000002716000-memory.dmp

      Filesize

      88KB

    • memory/2044-1-0x0000000000CA0000-0x0000000000DA0000-memory.dmp

      Filesize

      1024KB

    • memory/2044-2-0x0000000000220000-0x000000000022B000-memory.dmp

      Filesize

      44KB

    • memory/2044-3-0x0000000000400000-0x0000000000B9D000-memory.dmp

      Filesize

      7.6MB

    • memory/2044-5-0x0000000000400000-0x0000000000B9D000-memory.dmp

      Filesize

      7.6MB

    • memory/2632-18-0x00000000005C0000-0x000000000069A000-memory.dmp

      Filesize

      872KB

    • memory/2632-29-0x0000000002440000-0x000000000248C000-memory.dmp

      Filesize

      304KB

    • memory/2632-30-0x00000000008E0000-0x0000000000BBC000-memory.dmp

      Filesize

      2.9MB

    • memory/2632-28-0x0000000005550000-0x00000000055B8000-memory.dmp

      Filesize

      416KB

    • memory/2632-27-0x0000000005180000-0x00000000051E8000-memory.dmp

      Filesize

      416KB

    • memory/2632-26-0x0000000002870000-0x00000000028F2000-memory.dmp

      Filesize

      520KB

    • memory/2632-25-0x0000000002710000-0x0000000002792000-memory.dmp

      Filesize

      520KB

    • memory/2632-24-0x0000000005230000-0x0000000005270000-memory.dmp

      Filesize

      256KB

    • memory/2632-23-0x0000000005230000-0x0000000005270000-memory.dmp

      Filesize

      256KB

    • memory/2632-22-0x00000000050A0000-0x000000000517A000-memory.dmp

      Filesize

      872KB

    • memory/2632-21-0x0000000005230000-0x0000000005270000-memory.dmp

      Filesize

      256KB

    • memory/2632-20-0x0000000074730000-0x0000000074E1E000-memory.dmp

      Filesize

      6.9MB

    • memory/2632-45-0x0000000074730000-0x0000000074E1E000-memory.dmp

      Filesize

      6.9MB

    • memory/2632-17-0x00000000005C0000-0x000000000069A000-memory.dmp

      Filesize

      872KB