Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 16:11

General

  • Target

    c229e14c4c20bdca6fefaaa7fb60e0cb50c75548717fd4494a2745a735c580b2.exe

  • Size

    311KB

  • MD5

    d4cf26e912808200e24637ea64de31f6

  • SHA1

    ce15a46d0f9ab548b2855019c2835988de2cd32d

  • SHA256

    c229e14c4c20bdca6fefaaa7fb60e0cb50c75548717fd4494a2745a735c580b2

  • SHA512

    af3318a6e907fd22cdbe2059dc9680781225612e408a5cf4bee49582521f18a62bda2fa4d5f69807a2c82b686c513ad40590211f80e5e9301562c3defce996ae

  • SSDEEP

    3072:28EGKLRYTlWvbm4cyqv0Hxr+ZaX635sKI3/Fwj0:2ljLRqYhiMHh0af73e

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c229e14c4c20bdca6fefaaa7fb60e0cb50c75548717fd4494a2745a735c580b2.exe
    "C:\Users\Admin\AppData\Local\Temp\c229e14c4c20bdca6fefaaa7fb60e0cb50c75548717fd4494a2745a735c580b2.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4612
  • C:\Users\Admin\AppData\Local\Temp\536A.exe
    C:\Users\Admin\AppData\Local\Temp\536A.exe
    1⤵
    • Sets file execution options in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3840
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • Modifies firewall policy service
      • Sets file execution options in registry
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      PID:4668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 1060
        3⤵
        • Program crash
        PID:3096
  • C:\Users\Admin\AppData\Local\Temp\5CC2.exe
    C:\Users\Admin\AppData\Local\Temp\5CC2.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
      2⤵
      • Executes dropped EXE
      PID:4228
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4668 -ip 4668
    1⤵
      PID:2552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\536A.exe

      Filesize

      360KB

      MD5

      80c413180b6bd0dd664adc4e0665b494

      SHA1

      e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

      SHA256

      6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

      SHA512

      347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

    • C:\Users\Admin\AppData\Local\Temp\5CC2.exe

      Filesize

      961KB

      MD5

      e99731bbcedc8bd2093085f6199d7ab6

      SHA1

      fbe3d4b59e71b633129572918670c897812fd434

      SHA256

      90fde2b1d3ffac12693fbdfbb2c9c1f425c4ecb64c9bb92dffcd74d415ba88cb

      SHA512

      eaa7308d05abedab6f03f02de455420411edcb4c6b448e86733b4db081d3c8559d5a088e1c1693b6f7c3619fa261ba9e8bd2d35b63d2fe071da92deba26d5aeb

    • C:\Users\Admin\AppData\Local\Temp\5CC2.exe

      Filesize

      1.1MB

      MD5

      efe0927b1d9790e86144592cab653fca

      SHA1

      7be8cf4fe9377af6f6616ea654debca77a5ff022

      SHA256

      b687143d6746e5734915204bedaa2e079e2f691ed291edd61137d857f25bd91c

      SHA512

      0cffb926d996b68413c2bdfda905954b0729d06674e35269b57da30df75ff2d4097c12647b6f32da36f7e75eb17f1063c9c32c8aec3fe98f016a4fe94838555b

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      2.2MB

      MD5

      0badb0e573d95db49ac23c11163d9386

      SHA1

      d86dd20e4498ba5576272df07cd71dd9ed40bf8d

      SHA256

      5ebb608342d1306743d1ab56bb587b00d7e14737f5af48be3fa738a98cf29668

      SHA512

      a83d397fdcf2b749aac8f1db38a991b06a70c58d21c84d09cd8a732ee744287e7d7d58edeb817006b6ee245ed313993a3280aea32fd4c5a079b4f960ab35eff8

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      1.9MB

      MD5

      e2620f6796cb4f86933127c9a3c2ef8f

      SHA1

      86a89c76cd694aba9a18224ee7bbc767d9ed0744

      SHA256

      97af563ea61bbfaf489aa37d438a1a91cc1d60ec611f03fb53bde572ea6fcdcd

      SHA512

      70cdb5c70e297f0c6480f4e36c6ba4454730aff528bd12d1c6dbae31af731c2b1fb1260c6127cd33ce9da4c198fbb8951c0c9fab060cc3fb5b2f8c0f202f169b

    • memory/2188-40-0x0000000000CA0000-0x0000000001236000-memory.dmp

      Filesize

      5.6MB

    • memory/2188-22-0x0000000000CA0000-0x0000000001236000-memory.dmp

      Filesize

      5.6MB

    • memory/3552-4-0x0000000002A10000-0x0000000002A26000-memory.dmp

      Filesize

      88KB

    • memory/3840-29-0x00000000022A0000-0x0000000002306000-memory.dmp

      Filesize

      408KB

    • memory/3840-44-0x00000000022A0000-0x0000000002306000-memory.dmp

      Filesize

      408KB

    • memory/3840-16-0x00000000022A0000-0x0000000002306000-memory.dmp

      Filesize

      408KB

    • memory/3840-14-0x0000000000010000-0x000000000006D000-memory.dmp

      Filesize

      372KB

    • memory/3840-24-0x0000000077C94000-0x0000000077C95000-memory.dmp

      Filesize

      4KB

    • memory/3840-25-0x00000000022A0000-0x0000000002306000-memory.dmp

      Filesize

      408KB

    • memory/3840-26-0x0000000002830000-0x000000000283C000-memory.dmp

      Filesize

      48KB

    • memory/3840-28-0x0000000002800000-0x0000000002801000-memory.dmp

      Filesize

      4KB

    • memory/3840-43-0x0000000002820000-0x0000000002821000-memory.dmp

      Filesize

      4KB

    • memory/3840-30-0x00000000022A0000-0x0000000002306000-memory.dmp

      Filesize

      408KB

    • memory/3840-17-0x00000000009E0000-0x00000000009ED000-memory.dmp

      Filesize

      52KB

    • memory/4228-49-0x0000000073480000-0x0000000073B97000-memory.dmp

      Filesize

      7.1MB

    • memory/4612-2-0x00000000009F0000-0x00000000009F9000-memory.dmp

      Filesize

      36KB

    • memory/4612-5-0x0000000000400000-0x0000000000870000-memory.dmp

      Filesize

      4.4MB

    • memory/4612-1-0x00000000008C0000-0x00000000009C0000-memory.dmp

      Filesize

      1024KB

    • memory/4612-3-0x0000000000400000-0x0000000000870000-memory.dmp

      Filesize

      4.4MB

    • memory/4668-39-0x0000000000A10000-0x0000000000E44000-memory.dmp

      Filesize

      4.2MB

    • memory/4668-35-0x0000000000A10000-0x0000000000E44000-memory.dmp

      Filesize

      4.2MB

    • memory/4668-42-0x0000000001200000-0x00000000012C4000-memory.dmp

      Filesize

      784KB

    • memory/4668-45-0x0000000001200000-0x00000000012C4000-memory.dmp

      Filesize

      784KB

    • memory/4668-47-0x0000000001200000-0x00000000012C4000-memory.dmp

      Filesize

      784KB

    • memory/4668-52-0x00000000034C0000-0x00000000034C2000-memory.dmp

      Filesize

      8KB

    • memory/4668-54-0x0000000000A10000-0x0000000000E43000-memory.dmp

      Filesize

      4.2MB

    • memory/4668-55-0x0000000001200000-0x00000000012C4000-memory.dmp

      Filesize

      784KB