Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2024 08:30

General

  • Target

    5308d1e75211592537867a6da16505c9.exe

  • Size

    173KB

  • MD5

    5308d1e75211592537867a6da16505c9

  • SHA1

    7760cdf681fc8969bfdd9fb9b7b5b625ca31f1bd

  • SHA256

    b7ca91d094b124c955a6759efb9e7b5744775269345908643d8c8f48adbde879

  • SHA512

    9fb3ccf71fe4c600af9fb90aef63235121d28003dfafb79c928ba6ae55dadf527d3c833ef6201c045584ff91a8a0db45f9e23c7838094a302ee2038952d42ba3

  • SSDEEP

    3072:30ywvRswzkVZj+Yfi5D0b6HwhZoWC9sI5/DuT61m:3aZswwAX0b6HwhZU9sI5/

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

rc4.i32
rc4.i32

Extracted

Family

gozi

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • NSIS installer 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1272
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Users\Admin\AppData\Local\Temp\5308d1e75211592537867a6da16505c9.exe
        "C:\Users\Admin\AppData\Local\Temp\5308d1e75211592537867a6da16505c9.exe"
        2⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:1172
      • C:\Users\Admin\AppData\Local\Temp\99A1.exe
        C:\Users\Admin\AppData\Local\Temp\99A1.exe
        2⤵
        • Sets file execution options in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          3⤵
          • Modifies firewall policy service
          • Sets file execution options in registry
          • Checks BIOS information in registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Enumerates system info in registry
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • NTFS ADS
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2064
          • C:\Users\Admin\AppData\Local\Temp\s5o1cio17myy_1.exe
            /suac
            4⤵
            • Modifies firewall policy service
            • Sets file execution options in registry
            • Executes dropped EXE
            • Checks for any installed AV software in registry
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2496
            • C:\Windows\SysWOW64\regedit.exe
              "C:\Windows\SysWOW64\regedit.exe"
              5⤵
              • Modifies security service
              • Sets file execution options in registry
              • Sets service image path in registry
              • Runs regedit.exe
              • Suspicious use of AdjustPrivilegeToken
              PID:2876
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\S5O1CI~1.EXE" /RL HIGHEST
              5⤵
              • Creates scheduled task(s)
              PID:2528
      • C:\Users\Admin\AppData\Local\Temp\A94B.exe
        C:\Users\Admin\AppData\Local\Temp\A94B.exe
        2⤵
        • Executes dropped EXE
        PID:2560
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:1904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\99A1.exe

        Filesize

        360KB

        MD5

        0c819dd27a128d9234daa3d772fb8c20

        SHA1

        d5d36492818872da8e70dc28cc85389b8e0f3819

        SHA256

        ae088798b181a2bf822fcd3bec3a11779f45a8e3b83cb6c75c5ffbffc3c3d5b2

        SHA512

        f502ddb79703297cf0592e68c3f1f964584725d7aa670272998f174ffa108bb7340c0d65d38d69e1b3f7f1217628dadda108fa2d5fe1eab73b7b3302b9f769b7

      • C:\Users\Admin\AppData\Local\Temp\A94B.exe

        Filesize

        82KB

        MD5

        bfe3f76169a69a8062ed7c55802d7348

        SHA1

        df7ac4c5af4702172c5d5e7ec2ed1975b942e5c3

        SHA256

        ad3dd54da01e06aa74d69c359dfe57d45df20cf34f5af6f7a79c24b07d2318bf

        SHA512

        c188f5b4b1e0e7faab071f3c1f8b409fd1a807c3ad7e819379d1a08100d887d1104d1634ced6959fbf3b419c3431cbc472abc29d310880719d02b6bad50c47a1

      • C:\Users\Admin\AppData\Local\Temp\A94B.exe

        Filesize

        52KB

        MD5

        23153a81d916ed441b8fd5f23534cef0

        SHA1

        78d6fe808e5aafa7e152413586ce4aa1960d5d00

        SHA256

        58353d658afec49b218e05544f9c317269d190fdc0cc9eb545e620c1fe1b2423

        SHA512

        c54eab2e63ab223b292e545b40ed65b609d16bbe4cefc93f2eed24540a8dae6bece04ada3b59752313efadeae06ff50facf997fa568e9ba37a54e3607ae1aadd

      • C:\Users\Admin\AppData\Local\Temp\s5o1cio17myy_1.exe

        Filesize

        288KB

        MD5

        1a14ff4f7c8c3ac01edb75d0eb35d8ae

        SHA1

        a8b69260e32e63324e28eec8d814eced9e5a9d14

        SHA256

        24af4eb640b9e32df71960c70b83fdf465cf15e3c53edca8de04bd8a1f61a3f9

        SHA512

        911f867abced42f04d816d9283f0ffbe6b83094655d314174a5a60cb8f3e6c9f31ff2508f5ac2131a2abde01df2233788b2801acdb57f5c73b21572158ee982d

      • C:\Users\Admin\AppData\Roaming\uvrafuu

        Filesize

        30KB

        MD5

        a994e2974476e7d2d6cb7ae7cc925e1f

        SHA1

        3fd6cb53f660f4f6efe1fa4a562f1a1810c7a934

        SHA256

        a3dcc7a4a9e03d55bf1dd43a9bbabca330fc4f36e193ba3a4a0dbc91ea94707a

        SHA512

        f2c1afaa658865dbf42e434da941453050a8af774c2dafb0a5efb444284868c63f16467d1955103662babdc64256b8889f9d8b24de473be5170e32422895ad23

      • \Users\Admin\AppData\Local\Temp\A94B.exe

        Filesize

        25KB

        MD5

        e0bdb5f577a1e92232b8615bc45fb0a1

        SHA1

        47d60940137be2c260e87f2e324b65bae1a61bc6

        SHA256

        301196dc1ae2d43545957faafcb1a2456f0eab511a51ab8c1bab991f66bc2231

        SHA512

        a97e3d462a74b6abb1c5a2c971358cd8719b9728eaa5227717877c82b285a9035df38b1d9b85a7072c415b39a084e62304457b72fdebd053f4bda41e2968a852

      • \Users\Admin\AppData\Local\Temp\A94B.exe

        Filesize

        25KB

        MD5

        c8b58306603e7c3731a77061b8df776e

        SHA1

        eca8517296216869823991246409fd23c183e72b

        SHA256

        188ce61421ade659cbb3abb16ace7d3678e88938d66bc7435f829d65dc89ea84

        SHA512

        a51e7209b9f8b2de2108ee47c791d23de23752f845fa7861127f91a82984d5ae58fd840e390cbfc11369bdb365f7445872232fd1da0f83d12ab63a5ace70fb9c

      • \Users\Admin\AppData\Local\Temp\s5o1cio17myy_1.exe

        Filesize

        225KB

        MD5

        c73b5b222ff5660fa29144fa219b971a

        SHA1

        273f2a344f87d67c40e166da4ad4488133a5236a

        SHA256

        28c513f1e8a395689a8c65b8eddbd527887565a6aba8ac7a805d07241398623a

        SHA512

        813b6265a5101375f2b181865a4ad73029406302edfe47afc692e42cc54365930b38e47cd8f639a5540a06aa735ae121b0aad6e85cf0c73fa2f57cfb91367ff9

      • memory/1172-5-0x0000000000400000-0x0000000002CBB000-memory.dmp

        Filesize

        40.7MB

      • memory/1172-1-0x00000000002D0000-0x00000000003D0000-memory.dmp

        Filesize

        1024KB

      • memory/1172-3-0x0000000000400000-0x0000000002CBB000-memory.dmp

        Filesize

        40.7MB

      • memory/1172-2-0x00000000001B0000-0x00000000001B9000-memory.dmp

        Filesize

        36KB

      • memory/1312-99-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

        Filesize

        4KB

      • memory/1312-96-0x000000013FAF0000-0x00000001401B5000-memory.dmp

        Filesize

        6.8MB

      • memory/1312-62-0x0000000077681000-0x0000000077682000-memory.dmp

        Filesize

        4KB

      • memory/1312-4-0x0000000002AE0000-0x0000000002AF5000-memory.dmp

        Filesize

        84KB

      • memory/1312-57-0x000000013FAF0000-0x00000001401B5000-memory.dmp

        Filesize

        6.8MB

      • memory/1312-59-0x000000013FAF0000-0x00000001401B5000-memory.dmp

        Filesize

        6.8MB

      • memory/1904-77-0x0000000077681000-0x0000000077682000-memory.dmp

        Filesize

        4KB

      • memory/2064-36-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-69-0x0000000000200000-0x0000000000206000-memory.dmp

        Filesize

        24KB

      • memory/2064-32-0x0000000000120000-0x00000000001E4000-memory.dmp

        Filesize

        784KB

      • memory/2064-114-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-39-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-42-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-41-0x0000000000120000-0x00000000001E4000-memory.dmp

        Filesize

        784KB

      • memory/2064-40-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-44-0x0000000000370000-0x000000000037C000-memory.dmp

        Filesize

        48KB

      • memory/2064-45-0x0000000000120000-0x00000000001E4000-memory.dmp

        Filesize

        784KB

      • memory/2064-46-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-47-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-48-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-33-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-34-0x0000000000200000-0x0000000000206000-memory.dmp

        Filesize

        24KB

      • memory/2064-103-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-31-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-30-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-97-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-86-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-61-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-88-0x0000000000120000-0x00000000001E4000-memory.dmp

        Filesize

        784KB

      • memory/2064-60-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-63-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-65-0x0000000000120000-0x00000000001E4000-memory.dmp

        Filesize

        784KB

      • memory/2064-64-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-67-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-66-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-68-0x0000000077630000-0x00000000777D9000-memory.dmp

        Filesize

        1.7MB

      • memory/2064-76-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-70-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-71-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-72-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-73-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2064-74-0x0000000077810000-0x0000000077991000-memory.dmp

        Filesize

        1.5MB

      • memory/2496-90-0x0000000001D10000-0x0000000001D76000-memory.dmp

        Filesize

        408KB

      • memory/2496-110-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2496-112-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2496-111-0x0000000001D10000-0x0000000001D76000-memory.dmp

        Filesize

        408KB

      • memory/2496-91-0x0000000001D10000-0x0000000001D76000-memory.dmp

        Filesize

        408KB

      • memory/2496-93-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2496-95-0x0000000001D10000-0x0000000001D76000-memory.dmp

        Filesize

        408KB

      • memory/2496-94-0x0000000001E00000-0x0000000001E0C000-memory.dmp

        Filesize

        48KB

      • memory/2560-58-0x000000013FAF0000-0x00000001401B5000-memory.dmp

        Filesize

        6.8MB

      • memory/2688-20-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2688-23-0x0000000001D40000-0x0000000001DA6000-memory.dmp

        Filesize

        408KB

      • memory/2688-27-0x0000000001D40000-0x0000000001DA6000-memory.dmp

        Filesize

        408KB

      • memory/2688-35-0x0000000001D40000-0x0000000001DA6000-memory.dmp

        Filesize

        408KB

      • memory/2688-19-0x0000000001D40000-0x0000000001DA6000-memory.dmp

        Filesize

        408KB

      • memory/2688-28-0x0000000001D40000-0x0000000001DA6000-memory.dmp

        Filesize

        408KB

      • memory/2688-18-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2688-21-0x0000000000230000-0x000000000023D000-memory.dmp

        Filesize

        52KB

      • memory/2688-38-0x0000000000500000-0x0000000000501000-memory.dmp

        Filesize

        4KB

      • memory/2688-26-0x0000000000330000-0x0000000000331000-memory.dmp

        Filesize

        4KB

      • memory/2688-24-0x0000000002500000-0x000000000250C000-memory.dmp

        Filesize

        48KB

      • memory/2688-22-0x0000000077820000-0x0000000077821000-memory.dmp

        Filesize

        4KB

      • memory/2876-105-0x0000000000A80000-0x0000000000AE6000-memory.dmp

        Filesize

        408KB

      • memory/2876-107-0x00000000000D0000-0x00000000000DB000-memory.dmp

        Filesize

        44KB

      • memory/2876-108-0x0000000000A80000-0x0000000000AE5000-memory.dmp

        Filesize

        404KB

      • memory/2876-104-0x0000000000A80000-0x0000000000AE6000-memory.dmp

        Filesize

        408KB