Analysis

  • max time kernel
    164s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 01:28

General

  • Target

    dd02b4f83462302b06278dea2591a9d32ab4534743f96b44b24d642e55b721fb.exe

  • Size

    312KB

  • MD5

    3ed9f2c6339d6513940c15d4a58378af

  • SHA1

    bd75e9514537bb38e9ba648c92a837e7d8d7b66d

  • SHA256

    dd02b4f83462302b06278dea2591a9d32ab4534743f96b44b24d642e55b721fb

  • SHA512

    530d1c04fd3acc0a35b54221ae5e25b4ab02fdf656bfda516bab009e94f292cffec83a8480cf95c3bacddc295a845206e6409658c837c3c78f0d1aca5cdf8036

  • SSDEEP

    6144:V6xELH+Ym/eqLhvhXfRWK4Pg343g77ji:cxEL+HeqLh2K45QX

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd02b4f83462302b06278dea2591a9d32ab4534743f96b44b24d642e55b721fb.exe
    "C:\Users\Admin\AppData\Local\Temp\dd02b4f83462302b06278dea2591a9d32ab4534743f96b44b24d642e55b721fb.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4968
  • C:\Users\Admin\AppData\Local\Temp\4FFB.exe
    C:\Users\Admin\AppData\Local\Temp\4FFB.exe
    1⤵
    • Sets file execution options in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • Modifies firewall policy service
      • Sets file execution options in registry
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:388
  • C:\Users\Admin\AppData\Local\Temp\5AD9.exe
    C:\Users\Admin\AppData\Local\Temp\5AD9.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1332 -ip 1332
    1⤵
      PID:2944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 388 -ip 388
      1⤵
        PID:404

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\4FFB.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\5AD9.exe

        Filesize

        4.5MB

        MD5

        639e6a982e7cc6169af6f4cd87eb15a4

        SHA1

        b12dbc5c7aa198af7ac87ec0e22c3a7ca6ad7705

        SHA256

        c2186dbb1b823d1b18160bdcfa1bae50a5384a6784b709faa297b25cc9d3a9c0

        SHA512

        518935a3b0f27b84f8130ec11657e9ee86dcb3844720f7466ae6f55dd8b5bfdae8bcc92d29217a4cd52809dd85f6a0da1ccab6fa247fe480f262bfa7ee9623ac

      • C:\Users\Admin\AppData\Local\Temp\5AD9.exe

        Filesize

        5.6MB

        MD5

        f7c6d870f0de20c40388b493d2b315d2

        SHA1

        1b25397776ae0481184f151ec3e608f3b65ac8e6

        SHA256

        4e07a3356bb6ffaa23224884b2ec5d79b6f956acc186475adac89867c0d623d9

        SHA512

        0619a22579ee70745034c547c53180d4319c3dc5db326dfecc275cd3b3025f354a3e6fac093a925611a5e0cca5ff9dbcfbfe246d376bb173829f332b670f5655

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        2.2MB

        MD5

        0badb0e573d95db49ac23c11163d9386

        SHA1

        d86dd20e4498ba5576272df07cd71dd9ed40bf8d

        SHA256

        5ebb608342d1306743d1ab56bb587b00d7e14737f5af48be3fa738a98cf29668

        SHA512

        a83d397fdcf2b749aac8f1db38a991b06a70c58d21c84d09cd8a732ee744287e7d7d58edeb817006b6ee245ed313993a3280aea32fd4c5a079b4f960ab35eff8

      • C:\Users\Admin\AppData\Local\Temp\lib.dll

        Filesize

        2.2MB

        MD5

        bc94fe5f3a7d234dceefa5a25c109358

        SHA1

        eefd19123cb554bd975d9848eff08f195c7794bb

        SHA256

        fdbd693e2a9eab791967e78eef8e1a3423c63b570d6fc8ccd9367be931c779c4

        SHA512

        650632899edc1bce009244cf228500c26df33c2036f774f60529c10bf7b277a49d3e635846097cf2d821a54e066a07f5f6ef2be055e1054e8c4a1a938fad9c69

      • C:\Users\Admin\AppData\Local\Temp\nsiBC81.tmp\System.dll

        Filesize

        12KB

        MD5

        dd87a973e01c5d9f8e0fcc81a0af7c7a

        SHA1

        c9206ced48d1e5bc648b1d0f54cccc18bf643a14

        SHA256

        7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

        SHA512

        4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

      • memory/388-59-0x0000000002FC0000-0x0000000002FC2000-memory.dmp

        Filesize

        8KB

      • memory/388-56-0x0000000000660000-0x0000000000A93000-memory.dmp

        Filesize

        4.2MB

      • memory/388-57-0x0000000000AE0000-0x0000000000BA4000-memory.dmp

        Filesize

        784KB

      • memory/388-35-0x0000000000660000-0x0000000000A94000-memory.dmp

        Filesize

        4.2MB

      • memory/388-69-0x0000000000AE0000-0x0000000000BA4000-memory.dmp

        Filesize

        784KB

      • memory/388-47-0x0000000000AE0000-0x0000000000BA4000-memory.dmp

        Filesize

        784KB

      • memory/388-45-0x0000000000AE0000-0x0000000000BA4000-memory.dmp

        Filesize

        784KB

      • memory/388-43-0x0000000001180000-0x000000000118D000-memory.dmp

        Filesize

        52KB

      • memory/388-41-0x0000000000AE0000-0x0000000000BA4000-memory.dmp

        Filesize

        784KB

      • memory/388-40-0x0000000000660000-0x0000000000A94000-memory.dmp

        Filesize

        4.2MB

      • memory/452-39-0x00000000022C0000-0x0000000002326000-memory.dmp

        Filesize

        408KB

      • memory/452-16-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/452-32-0x0000000002830000-0x000000000283C000-memory.dmp

        Filesize

        48KB

      • memory/452-33-0x00000000022C0000-0x0000000002326000-memory.dmp

        Filesize

        408KB

      • memory/452-34-0x0000000002820000-0x0000000002821000-memory.dmp

        Filesize

        4KB

      • memory/452-30-0x00000000773B4000-0x00000000773B5000-memory.dmp

        Filesize

        4KB

      • memory/452-31-0x0000000002800000-0x0000000002801000-memory.dmp

        Filesize

        4KB

      • memory/452-28-0x00000000022C0000-0x0000000002326000-memory.dmp

        Filesize

        408KB

      • memory/452-26-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/452-24-0x00000000022C0000-0x0000000002326000-memory.dmp

        Filesize

        408KB

      • memory/452-25-0x0000000000620000-0x000000000062D000-memory.dmp

        Filesize

        52KB

      • memory/1332-58-0x0000000000E10000-0x00000000013A6000-memory.dmp

        Filesize

        5.6MB

      • memory/1332-51-0x0000000003470000-0x0000000003534000-memory.dmp

        Filesize

        784KB

      • memory/1332-42-0x0000000000E10000-0x00000000013A6000-memory.dmp

        Filesize

        5.6MB

      • memory/1332-50-0x0000000003470000-0x0000000003534000-memory.dmp

        Filesize

        784KB

      • memory/1332-22-0x0000000000E10000-0x00000000013A6000-memory.dmp

        Filesize

        5.6MB

      • memory/1332-52-0x0000000077383000-0x0000000077384000-memory.dmp

        Filesize

        4KB

      • memory/3512-5-0x00000000008B0000-0x00000000008C6000-memory.dmp

        Filesize

        88KB

      • memory/4920-70-0x00000000726A0000-0x0000000072DB7000-memory.dmp

        Filesize

        7.1MB

      • memory/4920-71-0x0000000002800000-0x00000000028C4000-memory.dmp

        Filesize

        784KB

      • memory/4920-72-0x0000000002800000-0x00000000028C4000-memory.dmp

        Filesize

        784KB

      • memory/4920-75-0x0000000002800000-0x00000000028C4000-memory.dmp

        Filesize

        784KB

      • memory/4968-6-0x0000000000400000-0x000000000086F000-memory.dmp

        Filesize

        4.4MB

      • memory/4968-4-0x0000000000400000-0x000000000086F000-memory.dmp

        Filesize

        4.4MB

      • memory/4968-1-0x0000000000A20000-0x0000000000B20000-memory.dmp

        Filesize

        1024KB

      • memory/4968-9-0x00000000009D0000-0x00000000009D9000-memory.dmp

        Filesize

        36KB

      • memory/4968-3-0x0000000000400000-0x000000000086F000-memory.dmp

        Filesize

        4.4MB

      • memory/4968-2-0x00000000009D0000-0x00000000009D9000-memory.dmp

        Filesize

        36KB