Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
WEXTRACT.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
WEXTRACT.exe
Resource
win10v2004-20231222-en
General
-
Target
WEXTRACT.exe
-
Size
427KB
-
MD5
be982f88b4dc59376512980069e223e6
-
SHA1
0e410efd5f98f96ae5cea91ea60a827db48bdb11
-
SHA256
17c7cc079465da191a8ed1512b8088b869415f5bc5bccf3eb72b0820b7f35619
-
SHA512
b763f0235689765d1aceefc76925cc6b714630e1760b6e221b378263e9019e18f5f2002bcbb242ce1016efbc0ff79d7645c3025e7b7a6f27daba02552377a197
-
SSDEEP
6144:K2y+bnr+Bp0yN90QEF6VvTOaAJL63hsjz+7Ha3th4oIrfwXxp3DMgZtyXs2bBub9:+MrZy90KdIJLUxstfWfwXxpzMg+RQ9
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 3 IoCs
pid Process 2656 v0143080.exe 2052 a8638369.exe 2152 hcfceja -
Loads dropped DLL 9 IoCs
pid Process 2188 WEXTRACT.exe 2656 v0143080.exe 2656 v0143080.exe 2656 v0143080.exe 2052 a8638369.exe 2984 WerFault.exe 2984 WerFault.exe 2984 WerFault.exe 2984 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" WEXTRACT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0143080.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2052 set thread context of 2784 2052 a8638369.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2984 2052 WerFault.exe 29 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2784 AppLaunch.exe 2784 AppLaunch.exe 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found 1288 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2784 AppLaunch.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2656 2188 WEXTRACT.exe 28 PID 2188 wrote to memory of 2656 2188 WEXTRACT.exe 28 PID 2188 wrote to memory of 2656 2188 WEXTRACT.exe 28 PID 2188 wrote to memory of 2656 2188 WEXTRACT.exe 28 PID 2188 wrote to memory of 2656 2188 WEXTRACT.exe 28 PID 2188 wrote to memory of 2656 2188 WEXTRACT.exe 28 PID 2188 wrote to memory of 2656 2188 WEXTRACT.exe 28 PID 2656 wrote to memory of 2052 2656 v0143080.exe 29 PID 2656 wrote to memory of 2052 2656 v0143080.exe 29 PID 2656 wrote to memory of 2052 2656 v0143080.exe 29 PID 2656 wrote to memory of 2052 2656 v0143080.exe 29 PID 2656 wrote to memory of 2052 2656 v0143080.exe 29 PID 2656 wrote to memory of 2052 2656 v0143080.exe 29 PID 2656 wrote to memory of 2052 2656 v0143080.exe 29 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2784 2052 a8638369.exe 31 PID 2052 wrote to memory of 2984 2052 a8638369.exe 32 PID 2052 wrote to memory of 2984 2052 a8638369.exe 32 PID 2052 wrote to memory of 2984 2052 a8638369.exe 32 PID 2052 wrote to memory of 2984 2052 a8638369.exe 32 PID 2052 wrote to memory of 2984 2052 a8638369.exe 32 PID 2052 wrote to memory of 2984 2052 a8638369.exe 32 PID 2052 wrote to memory of 2984 2052 a8638369.exe 32 PID 1724 wrote to memory of 2152 1724 taskeng.exe 36 PID 1724 wrote to memory of 2152 1724 taskeng.exe 36 PID 1724 wrote to memory of 2152 1724 taskeng.exe 36 PID 1724 wrote to memory of 2152 1724 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"C:\Users\Admin\AppData\Local\Temp\WEXTRACT.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0143080.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0143080.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8638369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8638369.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 364⤵
- Loads dropped DLL
- Program crash
PID:2984
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {469292D0-AF92-4589-8A81-78CB391BF9F0} S-1-5-21-928733405-3780110381-2966456290-1000:VTILVGXH\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\hcfcejaC:\Users\Admin\AppData\Roaming\hcfceja2⤵
- Executes dropped EXE
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
325KB
MD56d3e807bc5b1075951cb02aee1040ce4
SHA1e46b8731eb240af658cd92f869b9c4c48255d572
SHA2563044994d68ed802e317cd4395ed588a0928dd006e4359ff907691fdcfd3b45f7
SHA512b2bccf1135ef7a8d0adfeaa158933e730206e0cbf3920ffab0a8aad0eda01d6c14ac176bf0215bcb0e77385b6f5562fb1ddb7e87a8acb8cfdb3290dd1800ea2f
-
Filesize
166KB
MD56b3b5578bfce84e4564382d8dcb84c88
SHA1fbe695d073f9bf1c4480f0da2e75de798d58deba
SHA25648eab4277fff7669eb09844dd2d5de7a5edc2a487a6a4ef9b540785fff1bc9c1
SHA512c4b48b40fdb6ebdbfd4cd6c42a4ce34c8a5d4e74163eda9cb197e7bad1a2d2bb80653b1ecb47dbb4ad106e1570663945de22301623aceef70c802354091957f8