Analysis

  • max time kernel
    165s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2024 05:52

General

  • Target

    00924a49c1fc68fa7b54e1cacdf19c93.exe

  • Size

    235KB

  • MD5

    00924a49c1fc68fa7b54e1cacdf19c93

  • SHA1

    391c74453d3c3a23ebc22e307a6f071bcc818c9e

  • SHA256

    ac78b4ea0e6ae2d971799e6505d937f15276df8f34a509983f423622fed31cf0

  • SHA512

    d1cccc99f3df6cc0676f2a6e86ad9dc1284d6312148f2a389622d50a4469e159122118c14b30462e3e5fac8d54400f08e14948658804905615abf584daf87a67

  • SSDEEP

    3072:RC2zySmwWaXJVCadJizA1KSB2JybTZS5ygptqwldE2fARvSL:RC2m6qaQMlLgpH7YSL

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\00924a49c1fc68fa7b54e1cacdf19c93.exe
    "C:\Users\Admin\AppData\Local\Temp\00924a49c1fc68fa7b54e1cacdf19c93.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3408
  • C:\Users\Admin\AppData\Local\Temp\1BE0.exe
    C:\Users\Admin\AppData\Local\Temp\1BE0.exe
    1⤵
    • Sets file execution options in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • Modifies firewall policy service
      • Sets file execution options in registry
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      PID:536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 1144
        3⤵
        • Program crash
        PID:2232
  • C:\Users\Admin\AppData\Local\Temp\2278.exe
    C:\Users\Admin\AppData\Local\Temp\2278.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 536 -ip 536
    1⤵
      PID:4252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1BE0.exe

      Filesize

      360KB

      MD5

      80c413180b6bd0dd664adc4e0665b494

      SHA1

      e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

      SHA256

      6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

      SHA512

      347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

    • C:\Users\Admin\AppData\Local\Temp\2278.exe

      Filesize

      547KB

      MD5

      f27a56030ac8d2f00f2a77a909260ba4

      SHA1

      89aea0cec8313c1973041d0c5249ecd1e1d0f8ff

      SHA256

      13f92390d48ba9f3782d8217125ea323b8ab57527c447218fec24e9084f5b449

      SHA512

      3ccff8e3c6f71fd35f7e59c8145d42192c2f701f27db262980303feff005adcf167edeee351b6436e38738980fea1322ac481c7312fe2256955b177236d7ebcf

    • C:\Users\Admin\AppData\Local\Temp\2278.exe

      Filesize

      524KB

      MD5

      715c29f45cf0ecbb066310a52c1d9882

      SHA1

      8fd09101195f936caa560de9141626f259b14223

      SHA256

      73ce4644cf252c30deb0647fb0457429b745a61cb796eee359c0fb109fe90ee0

      SHA512

      f24d0fbde55082fac7539e5b8e137586d1e31fc8b7ba3b4cadfdaa744dfb9e6b255b09cd5f14e65dc4ae0182c3f01d11a276f21ef5fa7c2791e15cf714664eb9

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      307KB

      MD5

      702bb88ac23f3dc7b4be2ea42a7b55ae

      SHA1

      952087c8b8751963aaff38b35852fa5a32dc1819

      SHA256

      745564d2fe9aa13d2a5f025aa37fb40ba2298b1edc1b0a29026fe6d13c9e70be

      SHA512

      d61b7d14e6ce3af9b73d09061fd329fa7896ca6267be37eb12d8ff7a9b4312a7b8d115d47233194d2d0f1502cf37705c250a34c5812146631cf0bb0d13e12157

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      188KB

      MD5

      704db874aa35ab1942cb1a7cc990873d

      SHA1

      9ef6acdffc4e6146244bae2e7d58b089d44cf2c6

      SHA256

      4317d0b5ffda14b40f3f71ce229dde5cbe03655301e35646518858259c4ab596

      SHA512

      45aab9f7312e4695544efb9661b8d1df0f9bbc91914adb8f36db798feb6077ba659876cc76a6dc661c22739d0bd69ae5c7074d12232fa854a831174433d359e3

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      85KB

      MD5

      af16c15d54c3b245b030016fa9070935

      SHA1

      c87346ebba4b62c34e2e597dfdb5b4a9ee57a4e0

      SHA256

      21876ede5be1b9ffc031299b98df793e13dc328a85860813cd7bc74c960821bc

      SHA512

      ab742f3ca78e450bb60ecaed4cf1006500c1e8225284ec338cd59c29d6a2c94c1ff8327fe209309c35fe6332f080103211535143e6b9c11d56ca4f4ad8dbe73d

    • C:\Users\Admin\AppData\Local\Temp\lib.dll

      Filesize

      936KB

      MD5

      a0e2e2de647c7d9cec63adab7fa5b52f

      SHA1

      144e24392705db624206b868a326df69fb860076

      SHA256

      a1bede2796b10cfb880e6931dd70be09e4c06996b67784cbacc55c597f43b93a

      SHA512

      6abdc48f89a668ed42d60eb2f0da0442f966f9ae12c5d74032d3043f331e8d4c77cf57ba4799629ec084d458be5441dcd9f72a88c2b635e54cd9a2494f496ec1

    • C:\Users\Admin\AppData\Local\Temp\nsi272B.tmp\System.dll

      Filesize

      12KB

      MD5

      dd87a973e01c5d9f8e0fcc81a0af7c7a

      SHA1

      c9206ced48d1e5bc648b1d0f54cccc18bf643a14

      SHA256

      7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

      SHA512

      4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

    • memory/536-30-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/536-35-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/536-64-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/536-63-0x0000000000EF0000-0x0000000001323000-memory.dmp

      Filesize

      4.2MB

    • memory/536-61-0x0000000000EE0000-0x0000000000EE2000-memory.dmp

      Filesize

      8KB

    • memory/536-60-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/536-59-0x0000000000D50000-0x0000000000D51000-memory.dmp

      Filesize

      4KB

    • memory/536-25-0x0000000000EF0000-0x0000000001324000-memory.dmp

      Filesize

      4.2MB

    • memory/536-27-0x0000000000EF0000-0x0000000001324000-memory.dmp

      Filesize

      4.2MB

    • memory/536-29-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/2640-58-0x00000000731B0000-0x00000000738C7000-memory.dmp

      Filesize

      7.1MB

    • memory/2640-65-0x00000000731B0000-0x00000000738C7000-memory.dmp

      Filesize

      7.1MB

    • memory/3360-5-0x0000000003080000-0x0000000003096000-memory.dmp

      Filesize

      88KB

    • memory/3408-4-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3408-1-0x00000000006E0000-0x00000000007E0000-memory.dmp

      Filesize

      1024KB

    • memory/3408-2-0x0000000000550000-0x0000000000559000-memory.dmp

      Filesize

      36KB

    • memory/3408-3-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3408-6-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/4880-39-0x00000000005F0000-0x0000000000656000-memory.dmp

      Filesize

      408KB

    • memory/4880-17-0x00000000005F0000-0x0000000000656000-memory.dmp

      Filesize

      408KB

    • memory/4880-18-0x00000000004C0000-0x00000000004CD000-memory.dmp

      Filesize

      52KB

    • memory/4880-24-0x00000000005F0000-0x0000000000656000-memory.dmp

      Filesize

      408KB

    • memory/4880-22-0x0000000000950000-0x0000000000951000-memory.dmp

      Filesize

      4KB

    • memory/4880-23-0x00000000026F0000-0x00000000026FC000-memory.dmp

      Filesize

      48KB

    • memory/4880-20-0x00000000779C4000-0x00000000779C5000-memory.dmp

      Filesize

      4KB

    • memory/4880-19-0x00000000005F0000-0x0000000000656000-memory.dmp

      Filesize

      408KB

    • memory/4880-15-0x0000000000010000-0x000000000006D000-memory.dmp

      Filesize

      372KB

    • memory/5032-46-0x0000000000F70000-0x0000000001506000-memory.dmp

      Filesize

      5.6MB

    • memory/5032-38-0x0000000000F70000-0x0000000001506000-memory.dmp

      Filesize

      5.6MB