Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe
Resource
win10v2004-20231215-en
General
-
Target
ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe
-
Size
2.0MB
-
MD5
901bb7cdf6777fa6661a8230aac4ce43
-
SHA1
cbe3cb1fe5e90feb741d25da587223478efd1ea6
-
SHA256
ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5
-
SHA512
5e619164d8839b2855ed1c2be8212a88f32988c57ef8545b920ed217df2377ae0306d890c6cbd3d637e8371793c21756cf276cd23e0bde38fd1b7fc83403a22b
-
SSDEEP
49152:arM7OejNT8b7+EQKbLH/KEUOuefPxM97O4xnQfZ:p7OemOfeK0NfZu7O4xnM
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Signatures
-
Detect Lumma Stealer payload V4 3 IoCs
resource yara_rule behavioral2/memory/5048-101-0x0000000000400000-0x0000000000892000-memory.dmp family_lumma_v4 behavioral2/memory/5048-100-0x0000000000B20000-0x0000000000B9C000-memory.dmp family_lumma_v4 behavioral2/memory/5048-102-0x0000000000400000-0x0000000000892000-memory.dmp family_lumma_v4 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 4ce071eu.exe -
Executes dropped EXE 4 IoCs
pid Process 4408 Zw3TB57.exe 1980 4ce071eu.exe 5048 6cM5hV5.exe 2336 7sB7cK20.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 4ce071eu.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4ce071eu.exe Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4ce071eu.exe Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4ce071eu.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Zw3TB57.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 4ce071eu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ipinfo.io 27 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1980 4ce071eu.exe 1980 4ce071eu.exe 1980 4ce071eu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2780 1980 WerFault.exe 24 2944 5048 WerFault.exe 110 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7sB7cK20.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7sB7cK20.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7sB7cK20.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2460 schtasks.exe 4676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 4ce071eu.exe 1980 4ce071eu.exe 2336 7sB7cK20.exe 2336 7sB7cK20.exe 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2336 7sB7cK20.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 4ce071eu.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 4ce071eu.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3420 Process not Found -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3636 wrote to memory of 4408 3636 ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe 26 PID 3636 wrote to memory of 4408 3636 ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe 26 PID 3636 wrote to memory of 4408 3636 ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe 26 PID 4408 wrote to memory of 1980 4408 Zw3TB57.exe 24 PID 4408 wrote to memory of 1980 4408 Zw3TB57.exe 24 PID 4408 wrote to memory of 1980 4408 Zw3TB57.exe 24 PID 1980 wrote to memory of 3556 1980 4ce071eu.exe 27 PID 1980 wrote to memory of 3556 1980 4ce071eu.exe 27 PID 1980 wrote to memory of 3556 1980 4ce071eu.exe 27 PID 3556 wrote to memory of 2460 3556 cmd.exe 30 PID 3556 wrote to memory of 2460 3556 cmd.exe 30 PID 3556 wrote to memory of 2460 3556 cmd.exe 30 PID 1980 wrote to memory of 2192 1980 4ce071eu.exe 32 PID 1980 wrote to memory of 2192 1980 4ce071eu.exe 32 PID 1980 wrote to memory of 2192 1980 4ce071eu.exe 32 PID 2192 wrote to memory of 4676 2192 cmd.exe 34 PID 2192 wrote to memory of 4676 2192 cmd.exe 34 PID 2192 wrote to memory of 4676 2192 cmd.exe 34 PID 4408 wrote to memory of 5048 4408 Zw3TB57.exe 110 PID 4408 wrote to memory of 5048 4408 Zw3TB57.exe 110 PID 4408 wrote to memory of 5048 4408 Zw3TB57.exe 110 PID 3636 wrote to memory of 2336 3636 ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe 113 PID 3636 wrote to memory of 2336 3636 ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe 113 PID 3636 wrote to memory of 2336 3636 ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe 113 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4ce071eu.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4ce071eu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe"C:\Users\Admin\AppData\Local\Temp\ce8bc001844f0165e361ff00e271a4576b71a9457760a89719e8dc063becd5c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw3TB57.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw3TB57.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6cM5hV5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6cM5hV5.exe3⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 10044⤵
- Program crash
PID:2944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7sB7cK20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7sB7cK20.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4ce071eu.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4ce071eu.exe1⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1980 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 30202⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1980 -ip 19801⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5048 -ip 50481⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1