Analysis
-
max time kernel
218s -
max time network
264s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
835b683a6c981701441fa8b0a1bb2f5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
835b683a6c981701441fa8b0a1bb2f5d.exe
Resource
win10v2004-20231215-en
General
-
Target
835b683a6c981701441fa8b0a1bb2f5d.exe
-
Size
277KB
-
MD5
835b683a6c981701441fa8b0a1bb2f5d
-
SHA1
61b6430628d1a847b3fb2305838415dda4d29d76
-
SHA256
4632afaaca26e69491829d3b0572f3428b4c1c6bbaa290f988c8ed9860973367
-
SHA512
c51109fffd11fd7f433f025774ffde178882037907b21d86e3e221072f0655fc2b4a7d0d4125b5dcb6968ab764d88f882aaa0aec7b483f0ca6a02de6f39237f8
-
SSDEEP
6144:vYpBGaYLFCZnrMMgJUlFfK2oXiPUXGSl:vcBGRErMMY+Ff0cUXD
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1220 Process not Found -
Executes dropped EXE 3 IoCs
pid Process 1628 C5EE.exe 1764 C5EE.exe 948 F43F.exe -
Loads dropped DLL 1 IoCs
pid Process 1628 C5EE.exe -
resource yara_rule behavioral1/memory/1764-27-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-31-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-32-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-33-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-34-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-35-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-51-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-54-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-62-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/1764-63-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" C5EE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 1764 1628 C5EE.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 835b683a6c981701441fa8b0a1bb2f5d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 835b683a6c981701441fa8b0a1bb2f5d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 835b683a6c981701441fa8b0a1bb2f5d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 835b683a6c981701441fa8b0a1bb2f5d.exe 1964 835b683a6c981701441fa8b0a1bb2f5d.exe 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1964 835b683a6c981701441fa8b0a1bb2f5d.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1220 Process not Found 1220 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1220 Process not Found 1220 Process not Found -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1628 1220 Process not Found 27 PID 1220 wrote to memory of 1628 1220 Process not Found 27 PID 1220 wrote to memory of 1628 1220 Process not Found 27 PID 1220 wrote to memory of 1628 1220 Process not Found 27 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1628 wrote to memory of 1764 1628 C5EE.exe 28 PID 1220 wrote to memory of 948 1220 Process not Found 29 PID 1220 wrote to memory of 948 1220 Process not Found 29 PID 1220 wrote to memory of 948 1220 Process not Found 29 PID 1220 wrote to memory of 948 1220 Process not Found 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\835b683a6c981701441fa8b0a1bb2f5d.exe"C:\Users\Admin\AppData\Local\Temp\835b683a6c981701441fa8b0a1bb2f5d.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1964
-
C:\Users\Admin\AppData\Local\Temp\C5EE.exeC:\Users\Admin\AppData\Local\Temp\C5EE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\C5EE.exeC:\Users\Admin\AppData\Local\Temp\C5EE.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\F43F.exeC:\Users\Admin\AppData\Local\Temp\F43F.exe1⤵
- Executes dropped EXE
PID:948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD530d544d5ec3b09349b66532f77ae0064
SHA1c918c4e73f629fc5c0e7fea9ca1af6d6cf5fc676
SHA2560821cd2a009be4e2e91dbca2604c5e39116ab6b01d7cac151433e47b23bb4658
SHA512a7eeb79a2dde165a50273b2b7621c47a2609cad4329e83395b4464e79e317f32b2e7fc2fae0c2a062e869a181e267fc6e817fb9ba7b0f6ded7a8a96e714d5054
-
Filesize
2.0MB
MD53eb4e7d99afa9e61d5fbcd4c42985220
SHA1a67ca6138a9f0cfc70c3406c39e88b88567ff76b
SHA256af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e
SHA512d704a96c7a32e713772497880d05f83fd5c6ef28f3a3e4da4b2de2dbaebf0505bdbd302b41aca3a326f10c8493101bc4b65fb073233c472c75d541bbceb9aff6
-
Filesize
714KB
MD5d413c9e51f1aeaa668a895fd2ed4ac19
SHA1f552d95dd71d6c35d3f93c1d4e2ca78896ebc488
SHA256c5d2df7b243ff7c29709e0aae66e8019fc6142437072c37ad88605d02e5650cd
SHA51273935de34d8e29c299f3c66cd3b6b9de85dfa7ed57f2a84f221a45fc13a8de7efbddf81921c04eb341eda6002e6a2e21ffde9f5fd5b368dbad7d3b06d57bf637
-
Filesize
803KB
MD5af9cc5c3f27c0c9c5989f52c62f9d6a0
SHA12dd2729474284bd03b93f40cce7da7826b8cfac1
SHA256159a885ce40905b2033ad8cec959d72f1ee1ec4b3dad9d7b89144a31471f3343
SHA5129a12bfc9564d998ec888bd369558cbcffbbc310bbb5220ec9d00daaf11cf6725e5e3df1d4e42382c952d919e3801b0d27798066d66b0e295f5ba1308d6349cfa
-
Filesize
37KB
MD5323fc119d7cb9e7eadf6463d0e56f483
SHA144f8d7761f1c7a64432d9abeb6aaa9ff75526120
SHA25686b3ba5c851008a8ae0eafa2e316c18d76289f830ae321a6703bde09d7ab9ceb
SHA51274bd6208481ab2839faa5e555886fe1dccf36de05a0bf8582b87006fafec2423888816955f669a834feb594bfc3fce4a7ceb3a34d6c23eb077c0fa2e5c13a1e1
-
Filesize
101KB
MD54e982e0da3301ebae6ce1613103c1c4b
SHA182cf7469d1f9852773a1c29c68392a21bef6cc08
SHA25619c76749399f06aee7897cfeedf56fd8dec84472433348e993167dbe48dd8ba5
SHA5120bab08db6299169cfc298afd94399d095f472e87c388777d338817b635b8fe9d04688c904c5c49dc6617f75c532fb41874a9f5eb6d7d5e3a4b4053531414be77
-
Filesize
702KB
MD5abeb3b1712e580e98b39b9ede4a7895a
SHA1e484cb42b6fa1ec276808cf6644e8ef7213232e1
SHA256d8e8d91e484179aae58cc90d3a2aabb3f1d6e84dd1f935403e41a9520769bbfe
SHA512866c2ad3b25cd9f2b7818382877f04aeac0b1cfe88e918036ce327c56072cf489b8e8c45b1a1d051f4cf6c4b41ad3d099e9d6ed3cdadd476fe3615de0e3b58a4