Analysis
-
max time kernel
300s -
max time network
292s -
platform
windows10-1703_x64 -
resource
win10-20231215-es -
resource tags
arch:x64arch:x86image:win10-20231215-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
14-01-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
toolspub2.exe
Resource
win7-20231129-es
Behavioral task
behavioral2
Sample
toolspub2.exe
Resource
win10-20231215-es
Behavioral task
behavioral3
Sample
toolspub2.exe
Resource
win10v2004-20231215-es
General
-
Target
toolspub2.exe
-
Size
203KB
-
MD5
d9077796101f063d05d1b18ef03639d8
-
SHA1
035d12383b9bcdbba8393fa643a375a19cbab559
-
SHA256
17d15c3e994b704c8b11393ee9e83dc7ecc3cdfd981820501beaf98c6e34cc94
-
SHA512
c79350993ced4a8e18b071e866a69b664143e35c5f6704afe4ff5f70437522d90722b29f0fd9bf6c66ddd331c5ebc65378915a3de062fd26ae213fbb252ac2ad
-
SSDEEP
3072:pfUB/bLaZdXUNc8iirJiM21K7uLX6Qn+62oM42fL4iBNkRDxs+cmH:pfUVclVrXpbGEx7co
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3200 -
Executes dropped EXE 3 IoCs
Processes:
E416.exeEACE.exeWindowsUpdater.exepid process 4700 E416.exe 4572 EACE.exe 988 WindowsUpdater.exe -
Loads dropped DLL 2 IoCs
Processes:
WindowsUpdater.exepid process 988 WindowsUpdater.exe 988 WindowsUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\EACE.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\EACE.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
toolspub2.exepid process 3168 toolspub2.exe 3168 toolspub2.exe 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 3200 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
toolspub2.exepid process 3168 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3200 Token: SeCreatePagefilePrivilege 3200 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
EACE.exedescription pid process target process PID 3200 wrote to memory of 4700 3200 E416.exe PID 3200 wrote to memory of 4700 3200 E416.exe PID 3200 wrote to memory of 4700 3200 E416.exe PID 3200 wrote to memory of 4572 3200 EACE.exe PID 3200 wrote to memory of 4572 3200 EACE.exe PID 3200 wrote to memory of 4572 3200 EACE.exe PID 4572 wrote to memory of 988 4572 EACE.exe WindowsUpdater.exe PID 4572 wrote to memory of 988 4572 EACE.exe WindowsUpdater.exe PID 4572 wrote to memory of 988 4572 EACE.exe WindowsUpdater.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3168
-
C:\Users\Admin\AppData\Local\Temp\E416.exeC:\Users\Admin\AppData\Local\Temp\E416.exe1⤵
- Executes dropped EXE
PID:4700
-
C:\Users\Admin\AppData\Local\Temp\EACE.exeC:\Users\Admin\AppData\Local\Temp\EACE.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD580c413180b6bd0dd664adc4e0665b494
SHA1e791e4a3391fc6b7bcb58399cd4fa3c52a06b940
SHA2566d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880
SHA512347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a
-
Filesize
256KB
MD55a95006638b26b5a857faf785cf94723
SHA12722e87790d79e528dd844b1a10d191c77cbdab9
SHA2568c1fe54e9af5fb0ff82069bac2e2d8f58d0e8552819eaa9b0aead9c02b325d3d
SHA512ced59d0b7e8bbcc7e1ded3259e09a6a44d61e241285395d16fb2e19fa83f43cf078d74639de6e5fdffa310422967825cdb577cce7d2dcb22c50c9edf2b2c23da
-
Filesize
3.3MB
MD522d1b3692ae508c3a023a378be956e8e
SHA114b543f326990a71f1e705c01d2632d476ca580b
SHA2568d36bda8277233d022aab4872b704b9a8646aa9d8d744f0846ca64e552865a6a
SHA512b3a0fdd2cb173eaaef120d78719eec1f07c6cb927738ef19f8252ab43d74d16e2d3f2c05e6082c933736e1c7dd370f07bea49358017ee4665ac25dd010a9ee0c
-
Filesize
1.5MB
MD5ab86412fd6449e5a0c7553f2a6526ab0
SHA1bb3e608ac313b1f4a900036fdddadfa703888e88
SHA2561049cdbb24038bb843ba51a7e229983526411aa6fa15921175a3451acab4ba98
SHA5124925e1c482462f81dd84438ddc49f62c4d8d7b1d5e43e1b37b3af3af0d0cbffb527d2abec3c4627d9d56ff7fd18dcffcb45dcc90d1478647aca55b70edd9b338
-
Filesize
1.4MB
MD5012e22c1f736722bcdd8acb67a319915
SHA169045d817bf6fbacf2758d11c38e3389a3556720
SHA256ef82dec62feb5ee70a012af9a4c7320c3432360be16e0372ecdb0bda2d32d416
SHA5120675e5f4b204bbe5ac9ab3244827256969fb47d08ecce1afb1d502c906e5adc54f0e359a38eb23336991c306aa8c6dacae02b2476fa5fa1e2b5ddd0deacd384a
-
Filesize
1.4MB
MD50660e9b1bb9b087a3de68429449e8eb4
SHA161362592cbcbe42b44e4e33664602c5686d96f48
SHA256c82819d0d21f5e719b40486ba85f97cfdde950905a722ddb8dae62cbafde9221
SHA5126f345ca917392a0c24d10d05ce44974a8c97bb3d5fadf49f4d46061e10c8a012e6768df932b774ab29c3062928122d56d5e41105450ab5efac0c0013ad942722
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f