Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 03:10

General

  • Target

    ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe

  • Size

    290KB

  • MD5

    6db27327a2233d8ee11abbed6229604b

  • SHA1

    feb1887bd6f9c0f84ed539be18d2812042d87e74

  • SHA256

    ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4

  • SHA512

    a0fac0a468fbc7d4f4b9a03a2a5fb94ec90172f04805066250a6c2fbf322a149acba3ecfd4cfa6889218e0c51bcece9d26c355cf36d5f939cb828a7735d5c5bf

  • SSDEEP

    6144:BecoZjpjdRLk/7Y8XOFPN8v9ntG/689RjObRXMA:B+ZjpRRA/7XOFPSvJq68fjObph

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1172
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
        "C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
          "C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe"
          3⤵
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:280
      • C:\Users\Admin\AppData\Local\Temp\AF04.exe
        C:\Users\Admin\AppData\Local\Temp\AF04.exe
        2⤵
        • Sets file execution options in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          3⤵
          • Modifies firewall policy service
          • Sets file execution options in registry
          • Checks BIOS information in registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Enumerates system info in registry
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • NTFS ADS
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Users\Admin\AppData\Local\Temp\7sius3e733eoc_1.exe
            /suac
            4⤵
            • Modifies firewall policy service
            • Sets file execution options in registry
            • Executes dropped EXE
            • Checks for any installed AV software in registry
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\SysWOW64\regedit.exe
              "C:\Windows\SysWOW64\regedit.exe"
              5⤵
              • Modifies security service
              • Sets file execution options in registry
              • Sets service image path in registry
              • Runs regedit.exe
              • Suspicious use of AdjustPrivilegeToken
              PID:2304
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\7SIUS3~1.EXE" /RL HIGHEST
              5⤵
              • Creates scheduled task(s)
              PID:1592
      • C:\Users\Admin\AppData\Local\Temp\B8D5.exe
        C:\Users\Admin\AppData\Local\Temp\B8D5.exe
        2⤵
        • Executes dropped EXE
        PID:2676
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:2544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\AF04.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\B8D5.exe

        Filesize

        1.2MB

        MD5

        f0fe6939167c541f93815f6f94d2f971

        SHA1

        f162eeb3c9a2faf0f1f063676527bfb789b29aaa

        SHA256

        3ca6b4020fa82b54d8f0bd4db56cbf89a81156720d561a7c17cffc14fc6e6ec5

        SHA512

        8e0dd309289c45f6ce784a4e497ad239ed0945d4792b7d82189398c56cccc9c2b4e47573289aab653252bfeb57b3034b35328e61812d6ab6fecc8f388241350c

      • C:\Users\Admin\AppData\Local\Temp\B8D5.exe

        Filesize

        2.8MB

        MD5

        1be6039d82321670b68d66b2dc8eae88

        SHA1

        415d7e284d1ac3d434c7495616bc2f08bf7a2a41

        SHA256

        4bd7df4d8ae8772bcbba5014d8a8ec41adf721a69b85aa98ac8bdc23c6593067

        SHA512

        8202723c9abda642a1a3f7a0508e02dd51f00fc8242ffe07ac808a360905e17abfffc1955560147eb4167fd129afd9259168f2ce43d585d6c80881f0463e1825

      • C:\Users\Admin\AppData\Local\Temp\B8D5.exe

        Filesize

        1.6MB

        MD5

        1a4a19235810c65b56620474e4ffdb4e

        SHA1

        3174283b3ec9ef0f6cce70c0ab86c8d96e76dae6

        SHA256

        9aafe66ed5bd254db8b884cef40a0179d721cda78a4ebd42f7ecc3a70e0109eb

        SHA512

        14fa030aae18f409e4594b9975c1b35a275cab140325674917325f3b7107649ed0828f8de9a14b56bddfbdbc71e99dba6168c9e18ad1fdbb84f4cbd1677aba73

      • C:\Users\Admin\AppData\Roaming\fgussih

        Filesize

        290KB

        MD5

        6db27327a2233d8ee11abbed6229604b

        SHA1

        feb1887bd6f9c0f84ed539be18d2812042d87e74

        SHA256

        ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4

        SHA512

        a0fac0a468fbc7d4f4b9a03a2a5fb94ec90172f04805066250a6c2fbf322a149acba3ecfd4cfa6889218e0c51bcece9d26c355cf36d5f939cb828a7735d5c5bf

      • memory/280-5-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/280-6-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/280-7-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/280-9-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/280-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1200-66-0x0000000076E11000-0x0000000076E12000-memory.dmp

        Filesize

        4KB

      • memory/1200-99-0x00000000029B0000-0x00000000029B1000-memory.dmp

        Filesize

        4KB

      • memory/1200-8-0x00000000029D0000-0x00000000029E6000-memory.dmp

        Filesize

        88KB

      • memory/2152-4-0x00000000001B0000-0x00000000001B9000-memory.dmp

        Filesize

        36KB

      • memory/2152-2-0x00000000002B0000-0x00000000003B0000-memory.dmp

        Filesize

        1024KB

      • memory/2304-104-0x00000000009E0000-0x0000000000A46000-memory.dmp

        Filesize

        408KB

      • memory/2304-105-0x00000000009E0000-0x0000000000A46000-memory.dmp

        Filesize

        408KB

      • memory/2304-107-0x00000000009E0000-0x0000000000A45000-memory.dmp

        Filesize

        404KB

      • memory/2304-108-0x0000000000090000-0x000000000009B000-memory.dmp

        Filesize

        44KB

      • memory/2544-109-0x0000000076E11000-0x0000000076E12000-memory.dmp

        Filesize

        4KB

      • memory/2564-24-0x0000000001C40000-0x0000000001CA6000-memory.dmp

        Filesize

        408KB

      • memory/2564-27-0x0000000076FB0000-0x0000000076FB1000-memory.dmp

        Filesize

        4KB

      • memory/2564-23-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2564-40-0x0000000001C40000-0x0000000001CA6000-memory.dmp

        Filesize

        408KB

      • memory/2564-25-0x0000000000360000-0x0000000000361000-memory.dmp

        Filesize

        4KB

      • memory/2564-33-0x0000000001C40000-0x0000000001CA6000-memory.dmp

        Filesize

        408KB

      • memory/2564-32-0x0000000001D00000-0x0000000001D01000-memory.dmp

        Filesize

        4KB

      • memory/2564-42-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

        Filesize

        4KB

      • memory/2564-31-0x0000000001C40000-0x0000000001CA6000-memory.dmp

        Filesize

        408KB

      • memory/2564-28-0x0000000001C40000-0x0000000001CA6000-memory.dmp

        Filesize

        408KB

      • memory/2564-30-0x0000000002500000-0x000000000250C000-memory.dmp

        Filesize

        48KB

      • memory/2564-26-0x0000000000370000-0x000000000037D000-memory.dmp

        Filesize

        52KB

      • memory/2616-96-0x0000000000480000-0x00000000004E6000-memory.dmp

        Filesize

        408KB

      • memory/2616-113-0x0000000000480000-0x00000000004E6000-memory.dmp

        Filesize

        408KB

      • memory/2616-95-0x0000000001E00000-0x0000000001E0C000-memory.dmp

        Filesize

        48KB

      • memory/2616-111-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2616-112-0x0000000000320000-0x0000000000326000-memory.dmp

        Filesize

        24KB

      • memory/2616-93-0x0000000000480000-0x00000000004E6000-memory.dmp

        Filesize

        408KB

      • memory/2616-92-0x0000000000320000-0x0000000000326000-memory.dmp

        Filesize

        24KB

      • memory/2616-91-0x0000000000480000-0x00000000004E6000-memory.dmp

        Filesize

        408KB

      • memory/2676-57-0x0000000000DA0000-0x0000000001336000-memory.dmp

        Filesize

        5.6MB

      • memory/2676-51-0x0000000000DA0000-0x0000000001336000-memory.dmp

        Filesize

        5.6MB

      • memory/2724-43-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-65-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-64-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-67-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-68-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-69-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-70-0x0000000076DC0000-0x0000000076F69000-memory.dmp

        Filesize

        1.7MB

      • memory/2724-71-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2724-72-0x0000000000230000-0x0000000000236000-memory.dmp

        Filesize

        24KB

      • memory/2724-73-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-74-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-75-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-76-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-77-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-78-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2724-79-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-88-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-63-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-62-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-61-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-59-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2724-60-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2724-52-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-97-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-102-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-58-0x0000000000730000-0x000000000073C000-memory.dmp

        Filesize

        48KB

      • memory/2724-53-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-54-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2724-55-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-39-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2724-41-0x0000000000230000-0x0000000000236000-memory.dmp

        Filesize

        24KB

      • memory/2724-37-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-36-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-35-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-115-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB

      • memory/2724-116-0x0000000076FA0000-0x0000000077121000-memory.dmp

        Filesize

        1.5MB