Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2024 04:28

General

  • Target

    5a47f3a1d1f7f121b7407af0e3ad0bbda02a286891f03ef70af2a7e31bdf237c.exe

  • Size

    311KB

  • MD5

    df9f23a0dd460e38e688b7870c3dc02e

  • SHA1

    73923be84dbc2ebca0d842dc26d6034bf202420f

  • SHA256

    5a47f3a1d1f7f121b7407af0e3ad0bbda02a286891f03ef70af2a7e31bdf237c

  • SHA512

    02a76be69bce9c35caa032288bed8b5456ef3801210a98fdd4098adfa1c5f99b91856852ca72d4ae0e24c721869938f5f490721f06735d47e718fb2620170639

  • SSDEEP

    6144:IiZILSPLdmPU59F63W9S2DwPzVfTXvrFk:3ZIuPLdii8hzjF

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a47f3a1d1f7f121b7407af0e3ad0bbda02a286891f03ef70af2a7e31bdf237c.exe
    "C:\Users\Admin\AppData\Local\Temp\5a47f3a1d1f7f121b7407af0e3ad0bbda02a286891f03ef70af2a7e31bdf237c.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 368
      2⤵
      • Program crash
      PID:4868
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2628 -ip 2628
    1⤵
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\C3BD.exe
      C:\Users\Admin\AppData\Local\Temp\C3BD.exe
      1⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        PID:3840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 1148
          3⤵
          • Program crash
          PID:1092
    • C:\Users\Admin\AppData\Local\Temp\C8A0.exe
      C:\Users\Admin\AppData\Local\Temp\C8A0.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3840 -ip 3840
      1⤵
        PID:4820
      • C:\Users\Admin\AppData\Roaming\vdauwsi
        C:\Users\Admin\AppData\Roaming\vdauwsi
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:4632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 368
          2⤵
          • Program crash
          PID:4360
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4632 -ip 4632
        1⤵
          PID:1800

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\C3BD.exe

          Filesize

          360KB

          MD5

          80c413180b6bd0dd664adc4e0665b494

          SHA1

          e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

          SHA256

          6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

          SHA512

          347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

        • C:\Users\Admin\AppData\Local\Temp\C8A0.exe

          Filesize

          524KB

          MD5

          706f1a4c67312706098f0d1059f92a6a

          SHA1

          bc4a9cc6c6fe42ff255db8d62ab5804bf03bbc38

          SHA256

          9a862253db6c9b51f79b68e909a3e007e47a6b5a9e70d56c17fa8a43fa3a9f65

          SHA512

          a14430b7a02af9ea04d48aa786b01970d0c21a63d883dea55fa9069095c4bd2a558ddf31fcb1ea1bccf9bd3b82335e8a442d179138bcf3c5761820acec94faa4

        • C:\Users\Admin\AppData\Local\Temp\C8A0.exe

          Filesize

          457KB

          MD5

          9461dda3bc05ad0078ae2430b77a279c

          SHA1

          0fbe282c8e667a9ce5d326cbb4a2c0c295dfcb50

          SHA256

          bafbb175c2aa53de5251f7f406c4a3a5017106462849b6c9a648fa8529a82946

          SHA512

          327cb02492e28c958322de2588b6a2094fa470292a11c21c08ce66e4ce5328618622b2a4085c6f90a39c5031e3a2a46b9cb14a28d82cd976583138cd35683c10

        • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

          Filesize

          327KB

          MD5

          140a296772e3b5560e3179c5f5c00b9f

          SHA1

          398641b744280aace45d7bfa4c5ec398df6a7f95

          SHA256

          04d85df8edde45f5d346a19302939ceecaac780befc154c59bfcc8d5eb62dcde

          SHA512

          aacadc93b2930546f4b706cff7ea369f54758ee182ea5f5e5d5a7be444789c5ca77e1320f4db183c3f5d5f3877b171497354a04fa26c4c6c9396f5bc6130d3f9

        • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

          Filesize

          424KB

          MD5

          5ec9bc9df38504e3d88e4e82bdafdf6e

          SHA1

          4c42adb7ee9dddbae46554d4b889892f1079f411

          SHA256

          9ec630ddb5e350c5880b383e68001a6680fa4975d6f8735623a980c58e07a6c4

          SHA512

          8a0d53fdcd4c9c625be6bd0ba996a03811a338118d45f25d9f54e54191b6b0e65590fb4391d0eea92c053fec54c854db16101fd3b3ad718c4cb1a9ac031013aa

        • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

          Filesize

          379KB

          MD5

          4b1405360cae29a83b9d31b98b66a6bd

          SHA1

          da09b267ba5ced26e16b0cd6623a0002ba50e485

          SHA256

          6f980ec70a2c4b58dd06fbe3c3dd94b982bd08fe0270302f90295eeaa5b63095

          SHA512

          d931519634bb7a23d03809bcc7bbdd1ad6066ba15eedb411a1c7bdad82c4962fcd2402865c8ebe65b395d43b4353b9b5bedd61a98c63372dca42e4e04d746fc2

        • C:\Users\Admin\AppData\Local\Temp\lib.dll

          Filesize

          334KB

          MD5

          983f9fe03bf80acbd02f8b52e1283896

          SHA1

          11c40fe98b039e8f2ed1c14d2d136c728a93857e

          SHA256

          b9d39234659a88853c7ff61f93d25d67965372a1e5d2ff41b323bda9116c00ca

          SHA512

          1bb43018a3430f5cd9a1218423ef0fd4c638818fd826406aed5d5d35a1af85b1307c175112e4dd5cb76dcdec40865aa597cbf3d93df5746b80d889ccdbd3d7ea

        • C:\Users\Admin\AppData\Local\Temp\nswCA17.tmp\System.dll

          Filesize

          12KB

          MD5

          dd87a973e01c5d9f8e0fcc81a0af7c7a

          SHA1

          c9206ced48d1e5bc648b1d0f54cccc18bf643a14

          SHA256

          7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

          SHA512

          4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

        • C:\Users\Admin\AppData\Roaming\vdauwsi

          Filesize

          311KB

          MD5

          df9f23a0dd460e38e688b7870c3dc02e

          SHA1

          73923be84dbc2ebca0d842dc26d6034bf202420f

          SHA256

          5a47f3a1d1f7f121b7407af0e3ad0bbda02a286891f03ef70af2a7e31bdf237c

          SHA512

          02a76be69bce9c35caa032288bed8b5456ef3801210a98fdd4098adfa1c5f99b91856852ca72d4ae0e24c721869938f5f490721f06735d47e718fb2620170639

        • memory/2012-47-0x0000000000B60000-0x00000000010F6000-memory.dmp

          Filesize

          5.6MB

        • memory/2012-37-0x0000000000B60000-0x00000000010F6000-memory.dmp

          Filesize

          5.6MB

        • memory/2628-1-0x0000000000B30000-0x0000000000C30000-memory.dmp

          Filesize

          1024KB

        • memory/2628-8-0x0000000000400000-0x000000000086F000-memory.dmp

          Filesize

          4.4MB

        • memory/2628-3-0x0000000000400000-0x000000000086F000-memory.dmp

          Filesize

          4.4MB

        • memory/2628-2-0x00000000009C0000-0x00000000009C9000-memory.dmp

          Filesize

          36KB

        • memory/3352-70-0x0000000003360000-0x0000000003376000-memory.dmp

          Filesize

          88KB

        • memory/3352-5-0x0000000002BF0000-0x0000000002C06000-memory.dmp

          Filesize

          88KB

        • memory/3840-32-0x0000000001200000-0x00000000012C4000-memory.dmp

          Filesize

          784KB

        • memory/3840-63-0x0000000001200000-0x00000000012C4000-memory.dmp

          Filesize

          784KB

        • memory/3840-28-0x0000000001200000-0x00000000012C4000-memory.dmp

          Filesize

          784KB

        • memory/3840-27-0x0000000000620000-0x0000000000A54000-memory.dmp

          Filesize

          4.2MB

        • memory/3840-25-0x0000000000620000-0x0000000000A54000-memory.dmp

          Filesize

          4.2MB

        • memory/3840-29-0x0000000001200000-0x00000000012C4000-memory.dmp

          Filesize

          784KB

        • memory/3840-59-0x0000000001200000-0x00000000012C4000-memory.dmp

          Filesize

          784KB

        • memory/3840-60-0x0000000003510000-0x0000000003512000-memory.dmp

          Filesize

          8KB

        • memory/3840-62-0x0000000000620000-0x0000000000A53000-memory.dmp

          Filesize

          4.2MB

        • memory/4632-73-0x0000000000400000-0x000000000086F000-memory.dmp

          Filesize

          4.4MB

        • memory/4632-68-0x0000000000400000-0x000000000086F000-memory.dmp

          Filesize

          4.4MB

        • memory/4632-67-0x0000000000900000-0x0000000000A00000-memory.dmp

          Filesize

          1024KB

        • memory/4800-23-0x0000000002840000-0x000000000284C000-memory.dmp

          Filesize

          48KB

        • memory/4800-43-0x0000000002280000-0x00000000022E6000-memory.dmp

          Filesize

          408KB

        • memory/4800-44-0x00000000027E0000-0x00000000027E1000-memory.dmp

          Filesize

          4KB

        • memory/4800-18-0x0000000002640000-0x000000000264D000-memory.dmp

          Filesize

          52KB

        • memory/4800-19-0x0000000002280000-0x00000000022E6000-memory.dmp

          Filesize

          408KB

        • memory/4800-17-0x0000000002280000-0x00000000022E6000-memory.dmp

          Filesize

          408KB

        • memory/4800-21-0x0000000077EC4000-0x0000000077EC5000-memory.dmp

          Filesize

          4KB

        • memory/4800-24-0x0000000002280000-0x00000000022E6000-memory.dmp

          Filesize

          408KB

        • memory/4800-15-0x0000000000010000-0x000000000006D000-memory.dmp

          Filesize

          372KB

        • memory/4800-22-0x00000000027C0000-0x00000000027C1000-memory.dmp

          Filesize

          4KB