Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2024 23:08

General

  • Target

    toolspab4.exe

  • Size

    206KB

  • MD5

    5784cb0aeb2ac45ece0689e7eecfc399

  • SHA1

    2d08f92794072432692225d06768b1b2dd37e2d5

  • SHA256

    12eb79f7104c4b5f780f5fc86145924fb81f3bc043c782328ad69c660a287670

  • SHA512

    cc2d49ee58955a3edbc08002e91caf63f9610bb4b3d34101d6025f047cc734ad0d825685114d5ae894d1c250ebd6c3fe265d8fb2120110d559cf345606fdfce1

  • SSDEEP

    3072:qXNx5tV7E7ycJc5GD5LhwrXoD6hYNRQSpPtgLE5eYoAVN:K3fV7WCGdhCoUi9pWLiZP

Malware Config

Extracted

Family

smokeloader

Botnet

pub4

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\toolspab4.exe
    "C:\Users\Admin\AppData\Local\Temp\toolspab4.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2440
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\6B70.exe
      C:\Users\Admin\AppData\Local\Temp\6B70.exe
      2⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • NTFS ADS
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Users\Admin\AppData\Local\Temp\7ew73w9a_1.exe
          /suac
          4⤵
          • Modifies firewall policy service
          • Sets file execution options in registry
          • Executes dropped EXE
          • Checks for any installed AV software in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2324
          • C:\Windows\SysWOW64\regedit.exe
            "C:\Windows\SysWOW64\regedit.exe"
            5⤵
            • Modifies security service
            • Sets file execution options in registry
            • Sets service image path in registry
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:1264
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\7ew73w9a.exe" /RL HIGHEST
            5⤵
            • Creates scheduled task(s)
            PID:1452
    • C:\Users\Admin\AppData\Local\Temp\708F.exe
      C:\Users\Admin\AppData\Local\Temp\708F.exe
      2⤵
      • Executes dropped EXE
      PID:2652
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1040
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:2864

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\6B70.exe

        Filesize

        259KB

        MD5

        5eeba1fefe72d4e78b2aafecd986c03c

        SHA1

        35d83173c3ec36c32a0c1fde319f20ee7844ae64

        SHA256

        3740701779e17dddd05a98eec97cfcb2645964cc76ce10ff1a1313254e7a8c31

        SHA512

        1fe4b329d4a3e80cb6572f9343fe3bd9b7a4a88ba603f9034161b041fb5703fe643a05eba8c726dd1eb9087e540312aac1b8b50e6410fbfb6edf3be086af385a

      • C:\Users\Admin\AppData\Local\Temp\6B70.exe

        Filesize

        212KB

        MD5

        cece138907a041bfcb836cd9c45d9e11

        SHA1

        84401e8b999153e5c5ebb643be77c5d9ee6b306f

        SHA256

        acdae9dd505c26adb7a8e58b0d84a623039967193f42498ce694bda71a93c030

        SHA512

        3e592386032a72e72b07832719361c1b06b425dee3d68917377ae0f39bc13bcbfc46e1cf1bb626538b80175deaee444310eb50852ba00b62e2b3157d3f882501

      • C:\Users\Admin\AppData\Local\Temp\6B70.exe

        Filesize

        15KB

        MD5

        b43ff5c0deb25ef12320e43adda96858

        SHA1

        117016db9d1d4b9f64088617dd05bcfa65a3c5c0

        SHA256

        b15ab06b75b7f1e9030c58f9edd1407cf4bfe4dfc556f5d5e7ce3faec8837d4f

        SHA512

        87ffac24254a95bd69a4b9f5ae619e077d9f9a6ca39eb65d8670aeed2cc29a914a91a7c3b0968655ce500fca79b0a492e20122ac95867064bfec38e28f943fab

      • C:\Users\Admin\AppData\Local\Temp\708F.exe

        Filesize

        201KB

        MD5

        c996b1f62df95a3b46772062a26e4e0e

        SHA1

        5d38060047f255916c01adf16519708361c44798

        SHA256

        018c9bbe562375700fe49130beb3cc4c75e7a8d1f87106ef9316e3dc1dea59de

        SHA512

        f9156b5dbe227fe1e36d2d4ba0596ac46f9369d7827b3284f8708aaf325cfa02a09ce6301687a95c2e95b9a694f4ad91f2e89b97cd30142adc013c3f22141be4

      • C:\Users\Admin\AppData\Local\Temp\708F.exe

        Filesize

        144KB

        MD5

        fed56575db2ce56850eef60c485dadb6

        SHA1

        b8dbff5eeaeb2fec308fdb8cb823bc180bcda643

        SHA256

        7eb7e5737fa1b56bf62e243296bf7a8a863d286f3703e1fcc8ca63e31b22c5bf

        SHA512

        c298a98fe8f0089120a4b770977643fd5ac52ff5d49c0f0bfe6d418b06c6847004655ad65500cfa8b9ad00036cfecfeb87f2f1ece41442ebd7a1bedcc29d758f

      • C:\Users\Admin\AppData\Local\Temp\708F.exe

        Filesize

        140KB

        MD5

        c534d01bcaef787ffd6ac38b676118ff

        SHA1

        25e826b510710f0d1208aa629af57122b1d8dee0

        SHA256

        561c08de321a1c16afab46e1c5a8e52977d2352b8e7746f2e72d880bc7e0d280

        SHA512

        8feb1b97b1add3dbb3adec53648bfd8d512a1f2adc37358d30a0378afc2f56bf113e1164e7934405cecc4866a18cbd1cc466d9ade1bf01af4d3a904aab7c8c82

      • C:\Users\Admin\AppData\Local\Temp\7ew73w9a_1.exe

        Filesize

        277KB

        MD5

        62a5ce9d26c74749fc8cbda7214bdecd

        SHA1

        f85b3f98596d114a018b3d5ad312c5578ae43a14

        SHA256

        0dc4a99a963acb22baf333b4aba522326843001733d242bdf3c354c097ab28df

        SHA512

        16abdc1d53aa40395a75273daa4fa1f955354595f71345170c8731dc83822e56d3a8be3552e3a3be620e210f17e4c318f4aecdc3d13bcaf53c1ca35df025e78f

      • C:\Users\Admin\AppData\Roaming\vhtidbc

        Filesize

        28KB

        MD5

        696674dabbc23913913e4d1ff5559c56

        SHA1

        34a95e09dd80144582c06ec0151e7ffdea1e383e

        SHA256

        166315d6131c99f761ef422aeea5aaa2e9348a9000948dd78a6389ef238b7b9c

        SHA512

        0378faad539f886a3dca6b0a672570c6ecb1bc46f587d6d2b28b2688ed6c46b3eefd64dc3efb671797f3a96b74ef9c09fc23ef72e06e863637de4f27f2cd79a4

      • \Users\Admin\AppData\Local\Temp\7ew73w9a_1.exe

        Filesize

        317KB

        MD5

        09fbfa1c4c2b91d0f72ab22bf83ad223

        SHA1

        bb906137ffe5bde341a98158b8a7c034e9c52032

        SHA256

        21fe0f587385eed19ede281e0e8d21023c13f295f7f1f8b45a631fb9df5ec864

        SHA512

        c905e77c65d3d0732a0f37efee2ff20b857b47700cab314a0110e661d17015d3ef48ecdb77f24be7f89fd1caf8b8b4e37463ca8b71dd695e1c4f35cfbce90840

      • memory/1068-57-0x00000000777A1000-0x00000000777A2000-memory.dmp

        Filesize

        4KB

      • memory/1068-4-0x0000000002B00000-0x0000000002B16000-memory.dmp

        Filesize

        88KB

      • memory/1068-92-0x00000000025E0000-0x00000000025E1000-memory.dmp

        Filesize

        4KB

      • memory/1264-98-0x0000000000330000-0x0000000000396000-memory.dmp

        Filesize

        408KB

      • memory/1264-97-0x0000000000330000-0x0000000000396000-memory.dmp

        Filesize

        408KB

      • memory/1264-101-0x0000000000090000-0x000000000009B000-memory.dmp

        Filesize

        44KB

      • memory/1264-100-0x0000000000330000-0x0000000000395000-memory.dmp

        Filesize

        404KB

      • memory/2324-87-0x0000000002000000-0x000000000200C000-memory.dmp

        Filesize

        48KB

      • memory/2324-86-0x0000000000450000-0x0000000000456000-memory.dmp

        Filesize

        24KB

      • memory/2324-105-0x0000000000450000-0x0000000000456000-memory.dmp

        Filesize

        24KB

      • memory/2324-89-0x00000000003E0000-0x0000000000446000-memory.dmp

        Filesize

        408KB

      • memory/2324-84-0x00000000003E0000-0x0000000000446000-memory.dmp

        Filesize

        408KB

      • memory/2324-104-0x00000000003E0000-0x0000000000446000-memory.dmp

        Filesize

        408KB

      • memory/2324-103-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2440-2-0x0000000000220000-0x0000000000229000-memory.dmp

        Filesize

        36KB

      • memory/2440-5-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/2440-1-0x00000000008A0000-0x00000000009A0000-memory.dmp

        Filesize

        1024KB

      • memory/2440-3-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/2556-30-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-67-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-48-0x0000000000440000-0x0000000000504000-memory.dmp

        Filesize

        784KB

      • memory/2556-46-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-107-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-96-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-55-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-54-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-52-0x0000000000440000-0x0000000000504000-memory.dmp

        Filesize

        784KB

      • memory/2556-53-0x0000000000440000-0x0000000000504000-memory.dmp

        Filesize

        784KB

      • memory/2556-33-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-56-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-49-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-58-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-60-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-59-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-63-0x0000000077750000-0x00000000778F9000-memory.dmp

        Filesize

        1.7MB

      • memory/2556-62-0x0000000000530000-0x0000000000536000-memory.dmp

        Filesize

        24KB

      • memory/2556-61-0x0000000000440000-0x0000000000504000-memory.dmp

        Filesize

        784KB

      • memory/2556-90-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-65-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-66-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-68-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-51-0x0000000000700000-0x000000000070C000-memory.dmp

        Filesize

        48KB

      • memory/2556-69-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-70-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-83-0x0000000000440000-0x0000000000504000-memory.dmp

        Filesize

        784KB

      • memory/2556-29-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-81-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-43-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-34-0x0000000000530000-0x0000000000536000-memory.dmp

        Filesize

        24KB

      • memory/2556-32-0x0000000000440000-0x0000000000504000-memory.dmp

        Filesize

        784KB

      • memory/2556-88-0x0000000000440000-0x0000000000504000-memory.dmp

        Filesize

        784KB

      • memory/2556-31-0x0000000077930000-0x0000000077AB1000-memory.dmp

        Filesize

        1.5MB

      • memory/2652-64-0x0000000000AE0000-0x0000000001076000-memory.dmp

        Filesize

        5.6MB

      • memory/2652-44-0x0000000000AE0000-0x0000000001076000-memory.dmp

        Filesize

        5.6MB

      • memory/2708-22-0x0000000077940000-0x0000000077941000-memory.dmp

        Filesize

        4KB

      • memory/2708-27-0x0000000000330000-0x0000000000396000-memory.dmp

        Filesize

        408KB

      • memory/2708-26-0x0000000002500000-0x000000000250C000-memory.dmp

        Filesize

        48KB

      • memory/2708-47-0x0000000001DA0000-0x0000000001DA1000-memory.dmp

        Filesize

        4KB

      • memory/2708-24-0x0000000001D80000-0x0000000001D81000-memory.dmp

        Filesize

        4KB

      • memory/2708-23-0x0000000000330000-0x0000000000396000-memory.dmp

        Filesize

        408KB

      • memory/2708-19-0x0000000000330000-0x0000000000396000-memory.dmp

        Filesize

        408KB

      • memory/2708-20-0x0000000000290000-0x0000000000291000-memory.dmp

        Filesize

        4KB

      • memory/2708-21-0x00000000003A0000-0x00000000003AD000-memory.dmp

        Filesize

        52KB

      • memory/2708-18-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2708-45-0x0000000000330000-0x0000000000396000-memory.dmp

        Filesize

        408KB

      • memory/2864-72-0x00000000777A1000-0x00000000777A2000-memory.dmp

        Filesize

        4KB