Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2024 04:08

General

  • Target

    fbec4956a178bb65221cf87ab537b828.exe

  • Size

    207KB

  • MD5

    fbec4956a178bb65221cf87ab537b828

  • SHA1

    5e587f1f30a712e45b35e451af167a5ba54f508d

  • SHA256

    f22e8c6027000f421c70d5733ff537d1e2e49deb5cc1d6ad3287175dffc2668e

  • SHA512

    805d8ac96078aa598e2cd562e60748aeb9f36710490015d3203f309d26f341795fd1a3c82e28cb828947ff99777985fd00a540d3e1f42edd0b471a0739f8a490

  • SSDEEP

    3072:Bo/htLJYeiJiiKVYgTemVAJny/8WyrtD7wmxRivBL2A:uTLJYefYgT/AByyug

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbec4956a178bb65221cf87ab537b828.exe
    "C:\Users\Admin\AppData\Local\Temp\fbec4956a178bb65221cf87ab537b828.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4124
  • C:\Users\Admin\AppData\Local\Temp\D5DE.exe
    C:\Users\Admin\AppData\Local\Temp\D5DE.exe
    1⤵
    • Sets file execution options in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • Modifies firewall policy service
      • Sets file execution options in registry
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      PID:4432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 1124
        3⤵
        • Program crash
        PID:1620
  • C:\Users\Admin\AppData\Local\Temp\DDFD.exe
    C:\Users\Admin\AppData\Local\Temp\DDFD.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4432 -ip 4432
    1⤵
      PID:3596
    • C:\Users\Admin\AppData\Roaming\gjvecrt
      C:\Users\Admin\AppData\Roaming\gjvecrt
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:2372

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\D5DE.exe

      Filesize

      360KB

      MD5

      80c413180b6bd0dd664adc4e0665b494

      SHA1

      e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

      SHA256

      6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

      SHA512

      347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

    • C:\Users\Admin\AppData\Local\Temp\DDFD.exe

      Filesize

      57KB

      MD5

      9a286b2f7e671f95db8d3047e2cf4568

      SHA1

      6b1e821d820c876c3ca90df1f6c7855265ad1827

      SHA256

      43de2a9d62a722789ba7a6e6d92b5fc7c1e0b981373343a7299a32f29bcde11a

      SHA512

      a7201fc7b679e8672f1aaf4da359543921a847aed984d8756e2591cc9ccd712c86cef420c01de155a4e7aa3033737a7ede670eabd92bb2c91d7877c1c1e8e9de

    • C:\Users\Admin\AppData\Local\Temp\DDFD.exe

      Filesize

      17KB

      MD5

      80a7b7902bb193c7282c3f5557b2f621

      SHA1

      2ec8c646ad662e236d6293bbc4f280e49303de8d

      SHA256

      118167f836282985554b2d0c72823f09f7a4028975f7e867b894b683b1925ab8

      SHA512

      9c04056e0e08a8b16aea3e27766a770eaa81365056b874226fd1eeabf3c9ffb0cfb4c50ae5a643419e161ed28a69f43a1daef01c30530fc41ce68b441d93e03f

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      1.2MB

      MD5

      c494f7ac12d40ef32277a2d3b809a08a

      SHA1

      2a90f702267f7ab2a211b368723b51334dc66b80

      SHA256

      1147874e7e0e9a5a02386be0990520884e0b983f06d9fe35a32d57d7584ee8ec

      SHA512

      2f17c9432ecd1a33e273258a1d701462efa2d63f0d9de386eed44676bba1952ef0eac0e70b55413e97d3cb6f4e9e5ccd20d85ef20308db79cfdd0223959e96c6

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      806KB

      MD5

      782ba38906fde61f48a1cc6e7d85be30

      SHA1

      f383ecd9ff682863aede398699e3f42e390c7240

      SHA256

      9f2b143f6bc1e7567a81580811ba13ee885e439dc7ebc67d175a76998e1b1159

      SHA512

      74ef184cd35b33241585b5cc57b602bbfcef2bbb5eb59142130f9537f6c0b18184ccdb643eff55638bc5930f2953a516bcdd30fe9782071093dcc476012db331

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      1.1MB

      MD5

      a3e0e19008a5e3e951fa4f3cbd03ed56

      SHA1

      2d9f5c3d9aa0704005c96970c21f9236bfa42eda

      SHA256

      0fdfbc8e7b61a15fc1de6dd3ddc59957d3246666761d420db6c89b1917ae778f

      SHA512

      d3e5554bd8cfb6f1f376d2aa7bbcd832b1b95bad5656ea110e39608ade2db183405a2486fe365df9269d8d045b42c3abefce17c61d15b4c86db30bab618123bb

    • C:\Users\Admin\AppData\Local\Temp\lib.dll

      Filesize

      706KB

      MD5

      7741b2c7baf45087b0c58ac7b16fd91b

      SHA1

      cedcf4fea17201731af5ce0f5ec8f9d29f60bda2

      SHA256

      c4f937f3bef67f33de7042d85277fc4567cdf6920b145ad01b6c29c03e104fb7

      SHA512

      be386921f974463962622bb78ac9f9480547344b4d1038ba307e6351d58f7e8c7c6016c6e690d95dca5e045a60de20f4b7dbc0daf3ac4ff0a8db220490bbcb2d

    • C:\Users\Admin\AppData\Local\Temp\nswE32D.tmp\System.dll

      Filesize

      12KB

      MD5

      dd87a973e01c5d9f8e0fcc81a0af7c7a

      SHA1

      c9206ced48d1e5bc648b1d0f54cccc18bf643a14

      SHA256

      7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

      SHA512

      4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

    • C:\Users\Admin\AppData\Roaming\gjvecrt

      Filesize

      207KB

      MD5

      fbec4956a178bb65221cf87ab537b828

      SHA1

      5e587f1f30a712e45b35e451af167a5ba54f508d

      SHA256

      f22e8c6027000f421c70d5733ff537d1e2e49deb5cc1d6ad3287175dffc2668e

      SHA512

      805d8ac96078aa598e2cd562e60748aeb9f36710490015d3203f309d26f341795fd1a3c82e28cb828947ff99777985fd00a540d3e1f42edd0b471a0739f8a490

    • memory/768-17-0x0000000000630000-0x000000000063D000-memory.dmp

      Filesize

      52KB

    • memory/768-18-0x0000000077854000-0x0000000077855000-memory.dmp

      Filesize

      4KB

    • memory/768-20-0x0000000002830000-0x000000000283C000-memory.dmp

      Filesize

      48KB

    • memory/768-22-0x0000000002800000-0x0000000002801000-memory.dmp

      Filesize

      4KB

    • memory/768-23-0x00000000022E0000-0x0000000002346000-memory.dmp

      Filesize

      408KB

    • memory/768-19-0x00000000022E0000-0x0000000002346000-memory.dmp

      Filesize

      408KB

    • memory/768-16-0x00000000022E0000-0x0000000002346000-memory.dmp

      Filesize

      408KB

    • memory/768-37-0x00000000022E0000-0x0000000002346000-memory.dmp

      Filesize

      408KB

    • memory/768-14-0x0000000000010000-0x000000000006D000-memory.dmp

      Filesize

      372KB

    • memory/1476-45-0x0000000000D30000-0x00000000012C6000-memory.dmp

      Filesize

      5.6MB

    • memory/1476-38-0x0000000000D30000-0x00000000012C6000-memory.dmp

      Filesize

      5.6MB

    • memory/2372-71-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2372-67-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2372-66-0x0000000000510000-0x0000000000610000-memory.dmp

      Filesize

      1024KB

    • memory/3308-68-0x0000000002430000-0x0000000002446000-memory.dmp

      Filesize

      88KB

    • memory/3308-4-0x0000000002340000-0x0000000002356000-memory.dmp

      Filesize

      88KB

    • memory/4124-3-0x0000000000590000-0x0000000000599000-memory.dmp

      Filesize

      36KB

    • memory/4124-5-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4124-1-0x0000000000760000-0x0000000000860000-memory.dmp

      Filesize

      1024KB

    • memory/4124-2-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/4432-24-0x0000000000C30000-0x0000000001064000-memory.dmp

      Filesize

      4.2MB

    • memory/4432-59-0x0000000004540000-0x0000000004542000-memory.dmp

      Filesize

      8KB

    • memory/4432-58-0x0000000000800000-0x00000000008C4000-memory.dmp

      Filesize

      784KB

    • memory/4432-61-0x0000000000C30000-0x0000000001063000-memory.dmp

      Filesize

      4.2MB

    • memory/4432-62-0x0000000000800000-0x00000000008C4000-memory.dmp

      Filesize

      784KB

    • memory/4432-57-0x0000000002CE0000-0x0000000002CE1000-memory.dmp

      Filesize

      4KB

    • memory/4432-31-0x0000000000800000-0x00000000008C4000-memory.dmp

      Filesize

      784KB

    • memory/4432-26-0x0000000000C30000-0x0000000001064000-memory.dmp

      Filesize

      4.2MB

    • memory/4432-27-0x0000000000800000-0x00000000008C4000-memory.dmp

      Filesize

      784KB

    • memory/4432-28-0x0000000000800000-0x00000000008C4000-memory.dmp

      Filesize

      784KB