Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 15:39

General

  • Target

    a18c5634a16a2dfb8ae46752ce4e4238.exe

  • Size

    347KB

  • MD5

    a18c5634a16a2dfb8ae46752ce4e4238

  • SHA1

    f290033b1dd5137d026c90f9f4056e13b07a02ac

  • SHA256

    e6aa74189e7f0e76c61715f31439a43360b3b66f86e899b3c621c817298623d0

  • SHA512

    94a3793371ff34448d8f372b83edab12a93d380a8d4670a6937090096d8479c4f6e38f0f898d83ddadca12b982fbe0c5a93dc1125223ed9a6765b86676454bc4

  • SSDEEP

    3072:Qnp1z2pL0IOQeXR4j+ygDNkdOnXaXmMd5VITRLdKPo95n:WALxOQkRd3BkdOnXYPFITREwb

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points 1 TTPs
  • Looks for VMWare services registry key. 1 TTPs 1 IoCs
  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1236
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Users\Admin\AppData\Local\Temp\a18c5634a16a2dfb8ae46752ce4e4238.exe
        "C:\Users\Admin\AppData\Local\Temp\a18c5634a16a2dfb8ae46752ce4e4238.exe"
        2⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2132
      • C:\Users\Admin\AppData\Local\Temp\B3F4.exe
        C:\Users\Admin\AppData\Local\Temp\B3F4.exe
        2⤵
        • Sets file execution options in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          3⤵
          • Modifies firewall policy service
          • Sets file execution options in registry
          • Checks BIOS information in registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Enumerates system info in registry
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • NTFS ADS
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Users\Admin\AppData\Local\Temp\59qw9co931um95_1.exe
            /suac
            4⤵
            • Modifies firewall policy service
            • Sets file execution options in registry
            • Executes dropped EXE
            • Checks for any installed AV software in registry
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Checks processor information in registry
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:348
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\59QW9C~1.EXE" /RL HIGHEST
              5⤵
              • Creates scheduled task(s)
              PID:1168
            • C:\Windows\SysWOW64\regedit.exe
              "C:\Windows\SysWOW64\regedit.exe"
              5⤵
              • Modifies security service
              • Sets file execution options in registry
              • Sets service image path in registry
              • Runs regedit.exe
              • Suspicious use of AdjustPrivilegeToken
              PID:2256
      • C:\Users\Admin\AppData\Local\Temp\BF2B.exe
        C:\Users\Admin\AppData\Local\Temp\BF2B.exe
        2⤵
        • Executes dropped EXE
        PID:2456
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:2476
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {36C989C7-E016-4805-BB78-7FA6600B7E3E} S-1-5-21-928733405-3780110381-2966456290-1000:VTILVGXH\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Users\Admin\AppData\Roaming\drebevi
          C:\Users\Admin\AppData\Roaming\drebevi
          2⤵
          • Looks for VMWare services registry key.
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Maps connected drives based on registry
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:2784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\59qw9co931um95_1.exe

        Filesize

        63KB

        MD5

        292e64f5eb72aa827c171f909496e3c7

        SHA1

        b50db1e7441f9be5c69cee000f5ea9f22f51ca8a

        SHA256

        4e48f894c32b12e3f8ccc251ce21ea90cf460e0aa4bb590df5ac66f0b88c9db8

        SHA512

        7a8d8df323840f8a59d1df08a663a1d273c27a73c838919d684d189dbaad8aea1ca91fc244492a314db98b079f8695187aee60361f395d64bb49929eb3401476

      • C:\Users\Admin\AppData\Local\Temp\B3F4.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\B3F4.exe

        Filesize

        217KB

        MD5

        90a0781b212947f6bca3ae45665d1efe

        SHA1

        c3ee95681323d9e8292899388afe8e08ac1e8d89

        SHA256

        eaae6dd1d35cfd4b65f02d9f678e2f819709053f8b4838d253d753b57da97165

        SHA512

        479f9b49732912769ab6687c0cdbe58bd8a894c6c4eace8dada586d5385dd47e5a3b14d5046d17ce249cad23ddcd313b1786fe4efcd7e47de8b6776dbeacb9e7

      • C:\Users\Admin\AppData\Local\Temp\BF2B.exe

        Filesize

        122KB

        MD5

        cd5c4dffc27da96c960fc4b57cca216c

        SHA1

        b327f2aeb8cc11e37f897f72f1fa7c6f3d877d24

        SHA256

        3d48a646c39a2b803709b2ddbab553102ee6d370be9d7681791b05a2ca8b7425

        SHA512

        82f651373100806c9dd428824f11a14453852c9f2d37cecdd06e0a0c7343805311e91120239dbba2ff6cc0d2fa576aa0455c5e10065ab914e119a7c3b7c00ff5

      • C:\Users\Admin\AppData\Local\Temp\BF2B.exe

        Filesize

        107KB

        MD5

        5ed1944c55992e22a98fd33f35702738

        SHA1

        d426ad61b5754fda9301379dd68a742af68f3a37

        SHA256

        6928e1241f5a06880b47c1460d9a6859c2d70e97a27f2106dca17b5a53e734f9

        SHA512

        e3e74518e74f3e1d96303e4af747f0b69bf92bc5a30a0cac6cfa84cf403664f126db5c908e4187da87fb26a76779835dd8c64e80079e47b4fba04e162e679dd5

      • C:\Users\Admin\AppData\Local\Temp\BF2B.exe

        Filesize

        146KB

        MD5

        8be527ad9ca0cee6513d2df76c525c35

        SHA1

        fb1eac7e662fa0466e699b9848a0e69191a7a0a9

        SHA256

        5a1c4e3293e56537a997d0958fc84475c1587fce6d123b3e0149e54d7b3cc435

        SHA512

        e01cb4a08e0e63f20200f98eec921b40fb9250f6cd2cd7afc400f5f4474ae995839b713b373a7b3a9adfe02baf277006fbf7482ca5c080ffc2c2fb8a20ea9ad3

      • C:\Users\Admin\AppData\Roaming\drebevi

        Filesize

        22KB

        MD5

        b592bcbddb52e88269cc4a11d7417b9e

        SHA1

        f4f9676f5211c3b60b99175dd5a2699c8d7d3ec9

        SHA256

        ee9a551837891e79ba3e7e4724a3aaddd680214c2892f7430a33b6d196366d26

        SHA512

        d82ffb511b594980cdec5e3c4d01240466ccc749c807add43396c6d46cdc5b4d23613f9f667301607c3258d5d0ccc2ef91e48960c2a7ef1405c4b8209197fcad

      • C:\Users\Admin\AppData\Roaming\drebevi

        Filesize

        79KB

        MD5

        16e1b5eab1fd5e4758d0a0a60112b11d

        SHA1

        222f772a160a389946bcc24734c66518f331e3fe

        SHA256

        7f043c74292239845edcc4828e55289a0ebee232d319151bf094031f4ac881ec

        SHA512

        adda1a2a13966b386d59b490722dc39822290588aeb41e99aa7dc1a3cb91bb86e1f3fc442cb985aff76a7e104a69158a764e37a6195e8ce95572de4264ee0164

      • \Users\Admin\AppData\Local\Temp\59qw9co931um95_1.exe

        Filesize

        2KB

        MD5

        56692d4899e873d38df5647be0bae925

        SHA1

        eff81580fd41615e3ac43410c970ac53d23abde1

        SHA256

        e8c70d88d85b7f013bd528b0f7df262bec08e9d0e8fe23202a7719d5a7b3b43b

        SHA512

        413b4eff03f9d0feb9c87f73a089e421c3a1d4e6f8badcd71e97f0d6434db4afccf25e4209ed1aff3e43bd6fb7281ebccd7fb96ec6f4a32a510ebe7bbe45fbc9

      • memory/348-113-0x00000000003D0000-0x0000000000436000-memory.dmp

        Filesize

        408KB

      • memory/348-110-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/348-90-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/348-89-0x00000000003D0000-0x0000000000436000-memory.dmp

        Filesize

        408KB

      • memory/348-119-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/348-92-0x0000000002510000-0x000000000251C000-memory.dmp

        Filesize

        48KB

      • memory/348-94-0x00000000003D0000-0x0000000000436000-memory.dmp

        Filesize

        408KB

      • memory/348-91-0x00000000003D0000-0x0000000000436000-memory.dmp

        Filesize

        408KB

      • memory/760-128-0x0000000077490000-0x0000000077639000-memory.dmp

        Filesize

        1.7MB

      • memory/760-137-0x0000000077490000-0x0000000077639000-memory.dmp

        Filesize

        1.7MB

      • memory/760-120-0x0000000077490000-0x0000000077639000-memory.dmp

        Filesize

        1.7MB

      • memory/1320-123-0x0000000002740000-0x0000000002756000-memory.dmp

        Filesize

        88KB

      • memory/1320-5-0x0000000002700000-0x0000000002716000-memory.dmp

        Filesize

        88KB

      • memory/1320-96-0x00000000026E0000-0x00000000026E1000-memory.dmp

        Filesize

        4KB

      • memory/1320-132-0x0000000002720000-0x0000000002726000-memory.dmp

        Filesize

        24KB

      • memory/1320-59-0x00000000774E1000-0x00000000774E2000-memory.dmp

        Filesize

        4KB

      • memory/2132-1-0x0000000000230000-0x0000000000330000-memory.dmp

        Filesize

        1024KB

      • memory/2132-6-0x0000000000400000-0x0000000000879000-memory.dmp

        Filesize

        4.5MB

      • memory/2132-3-0x0000000000400000-0x0000000000879000-memory.dmp

        Filesize

        4.5MB

      • memory/2132-2-0x00000000003A0000-0x00000000003A9000-memory.dmp

        Filesize

        36KB

      • memory/2256-101-0x0000000000820000-0x0000000000886000-memory.dmp

        Filesize

        408KB

      • memory/2256-102-0x0000000000820000-0x0000000000886000-memory.dmp

        Filesize

        408KB

      • memory/2256-105-0x0000000000820000-0x0000000000885000-memory.dmp

        Filesize

        404KB

      • memory/2256-104-0x0000000000090000-0x000000000009B000-memory.dmp

        Filesize

        44KB

      • memory/2456-56-0x0000000000D50000-0x00000000012E6000-memory.dmp

        Filesize

        5.6MB

      • memory/2476-73-0x00000000774E1000-0x00000000774E2000-memory.dmp

        Filesize

        4KB

      • memory/2784-121-0x0000000000950000-0x0000000000A50000-memory.dmp

        Filesize

        1024KB

      • memory/2784-117-0x0000000000330000-0x0000000000331000-memory.dmp

        Filesize

        4KB

      • memory/2784-116-0x0000000075060000-0x0000000075068000-memory.dmp

        Filesize

        32KB

      • memory/2784-115-0x0000000000880000-0x0000000000944000-memory.dmp

        Filesize

        784KB

      • memory/2784-114-0x0000000000340000-0x000000000034C000-memory.dmp

        Filesize

        48KB

      • memory/2784-111-0x0000000000880000-0x0000000000944000-memory.dmp

        Filesize

        784KB

      • memory/2784-109-0x0000000000880000-0x0000000000944000-memory.dmp

        Filesize

        784KB

      • memory/2784-108-0x0000000000880000-0x0000000000944000-memory.dmp

        Filesize

        784KB

      • memory/2784-107-0x000000007769D000-0x000000007769E000-memory.dmp

        Filesize

        4KB

      • memory/2784-106-0x0000000000880000-0x0000000000944000-memory.dmp

        Filesize

        784KB

      • memory/2784-122-0x0000000000400000-0x0000000000879000-memory.dmp

        Filesize

        4.5MB

      • memory/2784-127-0x0000000000400000-0x0000000000879000-memory.dmp

        Filesize

        4.5MB

      • memory/2784-124-0x0000000000880000-0x0000000000944000-memory.dmp

        Filesize

        784KB

      • memory/2900-38-0x0000000000180000-0x0000000000244000-memory.dmp

        Filesize

        784KB

      • memory/2900-46-0x0000000000420000-0x0000000000421000-memory.dmp

        Filesize

        4KB

      • memory/2900-70-0x00000000000E0000-0x00000000000E6000-memory.dmp

        Filesize

        24KB

      • memory/2900-72-0x0000000000180000-0x0000000000244000-memory.dmp

        Filesize

        784KB

      • memory/2900-68-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-71-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-74-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-66-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-67-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-87-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-64-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-65-0x0000000000180000-0x0000000000244000-memory.dmp

        Filesize

        784KB

      • memory/2900-63-0x0000000077490000-0x0000000077639000-memory.dmp

        Filesize

        1.7MB

      • memory/2900-62-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-61-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-60-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-57-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-95-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-58-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-100-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-48-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-45-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-47-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-69-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-136-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-36-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-40-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-41-0x0000000000430000-0x000000000043C000-memory.dmp

        Filesize

        48KB

      • memory/2900-42-0x0000000000180000-0x0000000000244000-memory.dmp

        Filesize

        784KB

      • memory/2900-37-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-35-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-34-0x00000000000E0000-0x00000000000E6000-memory.dmp

        Filesize

        24KB

      • memory/2900-32-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-33-0x0000000000180000-0x0000000000244000-memory.dmp

        Filesize

        784KB

      • memory/2900-31-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/2900-30-0x0000000077670000-0x00000000777F1000-memory.dmp

        Filesize

        1.5MB

      • memory/3020-28-0x0000000000290000-0x00000000002F6000-memory.dmp

        Filesize

        408KB

      • memory/3020-23-0x0000000077680000-0x0000000077681000-memory.dmp

        Filesize

        4KB

      • memory/3020-27-0x0000000000850000-0x000000000085C000-memory.dmp

        Filesize

        48KB

      • memory/3020-25-0x0000000000820000-0x0000000000821000-memory.dmp

        Filesize

        4KB

      • memory/3020-24-0x0000000000290000-0x00000000002F6000-memory.dmp

        Filesize

        408KB

      • memory/3020-22-0x0000000000350000-0x000000000035D000-memory.dmp

        Filesize

        52KB

      • memory/3020-21-0x0000000000340000-0x0000000000341000-memory.dmp

        Filesize

        4KB

      • memory/3020-20-0x0000000000290000-0x00000000002F6000-memory.dmp

        Filesize

        408KB

      • memory/3020-44-0x0000000000290000-0x00000000002F6000-memory.dmp

        Filesize

        408KB

      • memory/3020-19-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB