Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2024 03:24

General

  • Target

    0faa7c27d8cedbb19af0586a236ce4eca6b151509e526bedcc970606e391ce74.exe

  • Size

    311KB

  • MD5

    cf5a70c2f7978229efebcca70f6d2053

  • SHA1

    b2eb3eb28b89c31ccd4f4c89edaa1ed6d5a233a4

  • SHA256

    0faa7c27d8cedbb19af0586a236ce4eca6b151509e526bedcc970606e391ce74

  • SHA512

    7f16690701912b9d043113783827dfbfd2b89fee0b74e4a0bc38ee73535bd7a4bc23014eee1632196926109d4b5e37cb076df975149b422df7719db0af8f000b

  • SSDEEP

    3072:eQLtli/LX0eRJibugK7Onq8zVvV6nnOh7wZPO6VmRZcJfTK7KVDrc+B5f239+9Uz:eQLtwk47Oqq36nnwZKfTgYn79oUq

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0faa7c27d8cedbb19af0586a236ce4eca6b151509e526bedcc970606e391ce74.exe
    "C:\Users\Admin\AppData\Local\Temp\0faa7c27d8cedbb19af0586a236ce4eca6b151509e526bedcc970606e391ce74.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4720
  • C:\Users\Admin\AppData\Local\Temp\22B6.exe
    C:\Users\Admin\AppData\Local\Temp\22B6.exe
    1⤵
    • Sets file execution options in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • Modifies firewall policy service
      • Sets file execution options in registry
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      PID:1492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 1072
        3⤵
        • Program crash
        PID:4704
  • C:\Users\Admin\AppData\Local\Temp\2AE4.exe
    C:\Users\Admin\AppData\Local\Temp\2AE4.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 1492 -ip 1492
    1⤵
      PID:1236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\22B6.exe

      Filesize

      360KB

      MD5

      80c413180b6bd0dd664adc4e0665b494

      SHA1

      e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

      SHA256

      6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

      SHA512

      347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

    • C:\Users\Admin\AppData\Local\Temp\2AE4.exe

      Filesize

      249KB

      MD5

      81e3cfa543ced860c93b81bda6c20fda

      SHA1

      2ef8a37cf38942555056afd7cc17e1b1cacadae0

      SHA256

      172afb2000997f95458e939df1cdb3cd8828bc6e4e0e47a076a7784104bbae9f

      SHA512

      c00184eb5bfa2f15e1be06e9e1fc8ed34eb3ae0a9b1db01e3165b92ff4e2cf7f44234d88da08ff2d0aa3edea83cfae519a3c2734f2839e9543ad2c70a99b7e3f

    • C:\Users\Admin\AppData\Local\Temp\2AE4.exe

      Filesize

      262KB

      MD5

      6ab0535829c80dd920b0c0d1c930c800

      SHA1

      7756577ddb433c33288c02b6d515d481fb2cd214

      SHA256

      61e14cdbff48bd437c58af8490d92330e528f6311226fba86edd372924f57731

      SHA512

      ac0509ec0d34874181e3e242bb8a88f2bbc017732b535fb453abb5273fb826fe1d2492622ce3c5b7d2e34245c9380c808cab93d0971a3e6f49d5cf64cfc0a670

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      71KB

      MD5

      4f92275a01230ad2c0eb8d8ebbcde49a

      SHA1

      5f3e5f54a2b5ad319d1919810bd4ddbe85242b4a

      SHA256

      93600fb887e06c805d0929bb89d9e7232ca6ea49083c0edb66a0287012dfd4e1

      SHA512

      1b29293743cb64e2beaeab936c627e12827a3ec21162e712f2096aefaea03a40692f3b89a89882bbd9406ffbdd23a858f00ed033c8a6de503230d6c2903fd5d6

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      687KB

      MD5

      3385eed7febb74ec97c0c3787c03263f

      SHA1

      5c9ff7e98d3f067cd415fefbc35382b2bce451d4

      SHA256

      998e25662f5acc1618aa408187d0f5645394a2d589b3db3dd60eb1fcbc67c367

      SHA512

      158eeb3f0c51839630d38a5ce4a21d91e8e470721c14918fac75ac3d6728637b2f9c69de903750c9e61461f08129769244452040db36928056bd52c2b32fa3ce

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      723KB

      MD5

      d95a1dc03b19fe7f44d1cfeec89dbd49

      SHA1

      e3e471d4b7e803796228fa6e681a21ae522da152

      SHA256

      d3434d78dc2610dd914bd60436773367c72c8fe749fbaeed1abc0b9ed80001e4

      SHA512

      9ed910219b6b30675e2e91a336c283dd8795e56af0966b1d3177c5a239c03e5dc2a6696958288c1432deecb13887f4f8c157ccda4179fd0e1d237be74be25215

    • C:\Users\Admin\AppData\Local\Temp\lib.dll

      Filesize

      849KB

      MD5

      48861882e8a6b9e8e9d4dafaae4398fd

      SHA1

      1a9f8e9b753671b368ea17a7b7d4ea83d9d8cfe7

      SHA256

      359d52b12245b80946c6addcbca4dc1c4e71e2bdea603f689710d2130de1fa57

      SHA512

      741cfc94592cd785ee425a47a0252cf93189231e1dddcaf461edeb1a928711a7e3993a820e822954cb06ff763dddfa72cab490ddbee193362a259759ef5727da

    • C:\Users\Admin\AppData\Local\Temp\nsw2F0B.tmp\System.dll

      Filesize

      12KB

      MD5

      dd87a973e01c5d9f8e0fcc81a0af7c7a

      SHA1

      c9206ced48d1e5bc648b1d0f54cccc18bf643a14

      SHA256

      7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

      SHA512

      4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

    • memory/1144-46-0x0000000000390000-0x0000000000926000-memory.dmp

      Filesize

      5.6MB

    • memory/1144-39-0x0000000000390000-0x0000000000926000-memory.dmp

      Filesize

      5.6MB

    • memory/1492-27-0x00000000004B0000-0x0000000000574000-memory.dmp

      Filesize

      784KB

    • memory/1492-30-0x00000000004B0000-0x0000000000574000-memory.dmp

      Filesize

      784KB

    • memory/1492-60-0x0000000000A80000-0x0000000000EB3000-memory.dmp

      Filesize

      4.2MB

    • memory/1492-61-0x00000000004B0000-0x0000000000574000-memory.dmp

      Filesize

      784KB

    • memory/1492-24-0x0000000000A80000-0x0000000000EB4000-memory.dmp

      Filesize

      4.2MB

    • memory/1492-26-0x0000000000A80000-0x0000000000EB4000-memory.dmp

      Filesize

      4.2MB

    • memory/1492-58-0x0000000004200000-0x0000000004202000-memory.dmp

      Filesize

      8KB

    • memory/1492-28-0x00000000004B0000-0x0000000000574000-memory.dmp

      Filesize

      784KB

    • memory/2216-33-0x0000000002150000-0x00000000021B6000-memory.dmp

      Filesize

      408KB

    • memory/2216-21-0x00000000026C0000-0x00000000026C1000-memory.dmp

      Filesize

      4KB

    • memory/2216-32-0x00000000026E0000-0x00000000026E1000-memory.dmp

      Filesize

      4KB

    • memory/2216-19-0x0000000002150000-0x00000000021B6000-memory.dmp

      Filesize

      408KB

    • memory/2216-18-0x0000000077A54000-0x0000000077A55000-memory.dmp

      Filesize

      4KB

    • memory/2216-17-0x0000000002500000-0x000000000250D000-memory.dmp

      Filesize

      52KB

    • memory/2216-16-0x0000000002150000-0x00000000021B6000-memory.dmp

      Filesize

      408KB

    • memory/2216-14-0x0000000000010000-0x000000000006D000-memory.dmp

      Filesize

      372KB

    • memory/2216-23-0x0000000002150000-0x00000000021B6000-memory.dmp

      Filesize

      408KB

    • memory/2216-22-0x00000000026F0000-0x00000000026FC000-memory.dmp

      Filesize

      48KB

    • memory/3432-4-0x0000000002660000-0x0000000002676000-memory.dmp

      Filesize

      88KB

    • memory/4720-1-0x0000000000550000-0x0000000000650000-memory.dmp

      Filesize

      1024KB

    • memory/4720-2-0x0000000000900000-0x0000000000909000-memory.dmp

      Filesize

      36KB

    • memory/4720-3-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4720-5-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB