Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2024 04:08

General

  • Target

    fbec4956a178bb65221cf87ab537b828.exe

  • Size

    207KB

  • MD5

    fbec4956a178bb65221cf87ab537b828

  • SHA1

    5e587f1f30a712e45b35e451af167a5ba54f508d

  • SHA256

    f22e8c6027000f421c70d5733ff537d1e2e49deb5cc1d6ad3287175dffc2668e

  • SHA512

    805d8ac96078aa598e2cd562e60748aeb9f36710490015d3203f309d26f341795fd1a3c82e28cb828947ff99777985fd00a540d3e1f42edd0b471a0739f8a490

  • SSDEEP

    3072:Bo/htLJYeiJiiKVYgTemVAJny/8WyrtD7wmxRivBL2A:uTLJYefYgT/AByyug

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\fbec4956a178bb65221cf87ab537b828.exe
      "C:\Users\Admin\AppData\Local\Temp\fbec4956a178bb65221cf87ab537b828.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2440
    • C:\Users\Admin\AppData\Local\Temp\9CEB.exe
      C:\Users\Admin\AppData\Local\Temp\9CEB.exe
      2⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • NTFS ADS
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Users\Admin\AppData\Local\Temp\7eqy31o99_1.exe
          /suac
          4⤵
          • Modifies firewall policy service
          • Sets file execution options in registry
          • Executes dropped EXE
          • Checks for any installed AV software in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\SysWOW64\regedit.exe
            "C:\Windows\SysWOW64\regedit.exe"
            5⤵
            • Modifies security service
            • Sets file execution options in registry
            • Sets service image path in registry
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:320
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\7EQY31~1.EXE" /RL HIGHEST
            5⤵
            • Creates scheduled task(s)
            PID:2036
    • C:\Users\Admin\AppData\Local\Temp\A5A3.exe
      C:\Users\Admin\AppData\Local\Temp\A5A3.exe
      2⤵
      • Executes dropped EXE
      PID:2648
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1228
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:2136

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\9CEB.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\A5A3.exe

        Filesize

        1.1MB

        MD5

        9ee910443ac686e2827e43c2c735e9bf

        SHA1

        3951d2e19deb0e82af889cc15aa4dedb67cc7135

        SHA256

        1d6f5fe28521dfd20adeec5175ecce4741170bbcda84d55d2f13bca269895e69

        SHA512

        416c25156bc8749bafa855895464d1d33d2d4b71baae4e172d839bc445f5a191440e388ad3ee1b7345cbc0b59d8b42c22ef4ab9e1dffda7ee4726bef22ec1476

      • C:\Users\Admin\AppData\Local\Temp\A5A3.exe

        Filesize

        1.4MB

        MD5

        51f49a3a264f9b6fd7388591bc8e5fcc

        SHA1

        176b9c92c3f0692d917abb9c54fc389b355b2b4d

        SHA256

        236eb66f48802c490cb2f6264d1189194a27859c5da529b49447a23708f0779a

        SHA512

        86ffbb87380e2fe1195613bd712449f4a3b63408d101df015faf81c91f5fe6b3e0bd30d444b5800853e191ec5bfa5d4648c67709bff7cc35c0bc40ff46514186

      • C:\Users\Admin\AppData\Local\Temp\A5A3.exe

        Filesize

        559KB

        MD5

        87e2f38dc0ef3a83847882cbf27b5d4e

        SHA1

        4ff49e5f64bdc7c9c999f70af4c311a4d29159eb

        SHA256

        cb22a159c79849ae358599bbf180ae2f28ff8c83ce27164a42d9ad066fa87eb9

        SHA512

        8ba6c1b8dc32ddafef9e9f6d4cf80601cbdea9b3bca8f48982f4d5c240681652cfcf8ffc5325edc406f39252afb6bf5f1af0972fcaa5c1ccb7a6bbc32157c584

      • C:\Users\Admin\AppData\Roaming\bijrgva

        Filesize

        207KB

        MD5

        fbec4956a178bb65221cf87ab537b828

        SHA1

        5e587f1f30a712e45b35e451af167a5ba54f508d

        SHA256

        f22e8c6027000f421c70d5733ff537d1e2e49deb5cc1d6ad3287175dffc2668e

        SHA512

        805d8ac96078aa598e2cd562e60748aeb9f36710490015d3203f309d26f341795fd1a3c82e28cb828947ff99777985fd00a540d3e1f42edd0b471a0739f8a490

      • memory/320-101-0x0000000000D70000-0x0000000000DD6000-memory.dmp

        Filesize

        408KB

      • memory/320-104-0x0000000000090000-0x000000000009B000-memory.dmp

        Filesize

        44KB

      • memory/320-103-0x0000000000D70000-0x0000000000DD5000-memory.dmp

        Filesize

        404KB

      • memory/320-100-0x0000000000D70000-0x0000000000DD6000-memory.dmp

        Filesize

        408KB

      • memory/1272-92-0x00000000026E0000-0x00000000026E6000-memory.dmp

        Filesize

        24KB

      • memory/1272-59-0x0000000076EB1000-0x0000000076EB2000-memory.dmp

        Filesize

        4KB

      • memory/1272-4-0x00000000026C0000-0x00000000026D6000-memory.dmp

        Filesize

        88KB

      • memory/1272-95-0x00000000026A0000-0x00000000026A1000-memory.dmp

        Filesize

        4KB

      • memory/2136-73-0x0000000076EB1000-0x0000000076EB2000-memory.dmp

        Filesize

        4KB

      • memory/2440-2-0x00000000001C0000-0x00000000001C9000-memory.dmp

        Filesize

        36KB

      • memory/2440-3-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2440-5-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2440-1-0x00000000002F0000-0x00000000003F0000-memory.dmp

        Filesize

        1024KB

      • memory/2648-47-0x00000000009A0000-0x0000000000F36000-memory.dmp

        Filesize

        5.6MB

      • memory/2648-44-0x00000000009A0000-0x0000000000F36000-memory.dmp

        Filesize

        5.6MB

      • memory/2772-88-0x0000000000370000-0x00000000003D6000-memory.dmp

        Filesize

        408KB

      • memory/2772-85-0x0000000000370000-0x00000000003D6000-memory.dmp

        Filesize

        408KB

      • memory/2772-107-0x0000000000370000-0x00000000003D6000-memory.dmp

        Filesize

        408KB

      • memory/2772-108-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2772-106-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2772-90-0x0000000001E00000-0x0000000001E0C000-memory.dmp

        Filesize

        48KB

      • memory/2772-87-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2772-91-0x0000000000370000-0x00000000003D6000-memory.dmp

        Filesize

        408KB

      • memory/2804-22-0x0000000077050000-0x0000000077051000-memory.dmp

        Filesize

        4KB

      • memory/2804-35-0x0000000001D70000-0x0000000001DD6000-memory.dmp

        Filesize

        408KB

      • memory/2804-28-0x0000000001D70000-0x0000000001DD6000-memory.dmp

        Filesize

        408KB

      • memory/2804-27-0x0000000001D70000-0x0000000001DD6000-memory.dmp

        Filesize

        408KB

      • memory/2804-26-0x0000000000410000-0x000000000041C000-memory.dmp

        Filesize

        48KB

      • memory/2804-23-0x0000000001D70000-0x0000000001DD6000-memory.dmp

        Filesize

        408KB

      • memory/2804-24-0x00000000003A0000-0x00000000003A1000-memory.dmp

        Filesize

        4KB

      • memory/2804-21-0x00000000002A0000-0x00000000002AD000-memory.dmp

        Filesize

        52KB

      • memory/2804-20-0x0000000000290000-0x0000000000291000-memory.dmp

        Filesize

        4KB

      • memory/2804-19-0x0000000001D70000-0x0000000001DD6000-memory.dmp

        Filesize

        408KB

      • memory/2804-18-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2872-34-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2872-61-0x0000000076E60000-0x0000000077009000-memory.dmp

        Filesize

        1.7MB

      • memory/2872-62-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2872-63-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2872-64-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-65-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-67-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-68-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-66-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-69-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-70-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-72-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2872-60-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-82-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-58-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-57-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-56-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-54-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-55-0x0000000000360000-0x0000000000361000-memory.dmp

        Filesize

        4KB

      • memory/2872-84-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2872-53-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2872-49-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-93-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-52-0x0000000000370000-0x000000000037C000-memory.dmp

        Filesize

        48KB

      • memory/2872-99-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-50-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2872-46-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-48-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-36-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2872-37-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-31-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-33-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-30-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB

      • memory/2872-110-0x0000000077040000-0x00000000771C1000-memory.dmp

        Filesize

        1.5MB