Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2024 05:35

General

  • Target

    toolspub1.exe

  • Size

    204KB

  • MD5

    1312fc2e043e2347c3de8a9a6907c430

  • SHA1

    075a04bc32a70aeedb23ee83842dd32fe691ba58

  • SHA256

    4b3f4607405154b8182848324699427778605dd52afabaff7a0fd542a4bc9212

  • SHA512

    108be06b849ded957240b52b006961f4bb01a9684ac0f2a81d70008f9b3a6cf1c2ee657cfe5ea6f566772735dabbc1c505342f37df6985296ddcebf3e917694f

  • SSDEEP

    3072:EkI0nM3Jq/AmlEkJiAj1K/2stqLiP+k9IYBn7Q97fsRLx8yM+cmk:EkICXlETZ2kx7QoxJcL

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
    "C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 368
      2⤵
      • Program crash
      PID:2960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2500 -ip 2500
    1⤵
      PID:5032
    • C:\Users\Admin\AppData\Local\Temp\A112.exe
      C:\Users\Admin\AppData\Local\Temp\A112.exe
      1⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1148
          3⤵
          • Program crash
          PID:1200
    • C:\Users\Admin\AppData\Local\Temp\A5F5.exe
      C:\Users\Admin\AppData\Local\Temp\A5F5.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3444
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2120 -ip 2120
      1⤵
        PID:1176

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\A112.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\A5F5.exe

        Filesize

        453KB

        MD5

        6448fc9da28279914ffc316ac3e60c45

        SHA1

        6bb0c065d7dc55a4816886ef4a4fd242d505404c

        SHA256

        4ce1ef82235a64de6f9144b2cf0e4cbff121c493ce7d95f5e9048dd876bd8ae6

        SHA512

        ad4de12b017347108d01f09b93d3db8345d3784c367114c4c4251d51d596f77c66e3fca936b8ab214651bc236923e5af66b1f36239eedd70ee037b41edece06d

      • C:\Users\Admin\AppData\Local\Temp\A5F5.exe

        Filesize

        369KB

        MD5

        43ad5892a4c9b281ecaa613e8f753369

        SHA1

        87e55b29f4a344bd5bb483d3b461ef81533a7a37

        SHA256

        57ea3a4f69bbcc94bb3eaf6e12e79f6a919aaff40c1b7bbd86b51c463c4de253

        SHA512

        cbc669072739ce2dc6ae99de65a03a3728d0fcdc81aa5e9d0e2844f7a2ca485cc98d7886f2ac73dad2b9e7ccd6e03a2f188443fe647cee3a9987227af3beced4

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        286KB

        MD5

        4af35b0561598d254939d55ba8470d81

        SHA1

        b33383b800b19ea27aec132f676fdfcf5fec022f

        SHA256

        2f3a9be351265698a1a5fcfe79e09fe22b9d8e9d48962cc0e5388738480fa6a6

        SHA512

        84e47600b48ed99a2e8225e0fcf3a017bde466c0a93d7e4d644a51ae566d54df9763c1f9c01561979801e1b03056b7e90f079b5d1a83219962fabab731b5276d

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        408KB

        MD5

        7054ce6ae707bdf4dd40fc2015f4835f

        SHA1

        d2abe76cd65e1e16f6db8912a41832b11a0c7c77

        SHA256

        4dc22904015aabe5d6157c2cbca62ab92e1db053f571ee74340151832e0a0f34

        SHA512

        ee05779225ba2e57920830ad67c0a193b59e8fac13788c2bc7bd6af727f5fc1ba1d0949ee6d7a77352c994f023b8702434c401a8f246eba4061dbf812c5eba3b

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        455KB

        MD5

        0b971eb37c7460ae2f7f1d3e507cbe3d

        SHA1

        d90b7bd578c674b7422797a735de8e12ffa3a871

        SHA256

        54692e35e90d489b3dee0d2eac736e5a29e66c17a9d8bed0874634b70d34e53a

        SHA512

        9176f6f415e9b58da587ce36d1ae6b69bf9e85620e1dce0fa8e6466cbe662d4313190324511f2c7554b3ff49ef371471be08cd7585496836b2eaf241ea0b64b5

      • C:\Users\Admin\AppData\Local\Temp\lib.dll

        Filesize

        454KB

        MD5

        b4982e70d588f8ef3cbdb91e78610f3a

        SHA1

        2d02617fa92996be2f8eec842897f6d1be661ad3

        SHA256

        6ce6f8e3351229181a9eba07a6b2a648e58d442e2afb712954171b2b129f4d1c

        SHA512

        5ab2e7e5da78337f6d5c5d9c3b28484f6d762cb664b37b22b76d1e3ee3a6ec1a9d7fb0652692e1345fd6bc5991b7892f63a655de11af595e896ffd1d69d3bd47

      • C:\Users\Admin\AppData\Local\Temp\nsyA75D.tmp\System.dll

        Filesize

        12KB

        MD5

        dd87a973e01c5d9f8e0fcc81a0af7c7a

        SHA1

        c9206ced48d1e5bc648b1d0f54cccc18bf643a14

        SHA256

        7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

        SHA512

        4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

      • memory/2120-27-0x0000000000450000-0x0000000000884000-memory.dmp

        Filesize

        4.2MB

      • memory/2120-61-0x0000000000450000-0x0000000000883000-memory.dmp

        Filesize

        4.2MB

      • memory/2120-62-0x0000000000F20000-0x0000000000FE4000-memory.dmp

        Filesize

        784KB

      • memory/2120-59-0x0000000004A30000-0x0000000004A32000-memory.dmp

        Filesize

        8KB

      • memory/2120-25-0x0000000000450000-0x0000000000884000-memory.dmp

        Filesize

        4.2MB

      • memory/2120-28-0x0000000000F20000-0x0000000000FE4000-memory.dmp

        Filesize

        784KB

      • memory/2120-30-0x0000000000F20000-0x0000000000FE4000-memory.dmp

        Filesize

        784KB

      • memory/2500-3-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/2500-1-0x0000000000560000-0x0000000000660000-memory.dmp

        Filesize

        1024KB

      • memory/2500-2-0x0000000002180000-0x0000000002189000-memory.dmp

        Filesize

        36KB

      • memory/2500-7-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/2752-39-0x00000000004E0000-0x0000000000A76000-memory.dmp

        Filesize

        5.6MB

      • memory/2752-46-0x00000000004E0000-0x0000000000A76000-memory.dmp

        Filesize

        5.6MB

      • memory/3256-17-0x0000000002640000-0x000000000264D000-memory.dmp

        Filesize

        52KB

      • memory/3256-22-0x0000000002830000-0x000000000283C000-memory.dmp

        Filesize

        48KB

      • memory/3256-18-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3256-14-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/3256-33-0x0000000002820000-0x0000000002821000-memory.dmp

        Filesize

        4KB

      • memory/3256-32-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3256-24-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3256-23-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3256-20-0x0000000077244000-0x0000000077245000-memory.dmp

        Filesize

        4KB

      • memory/3256-21-0x0000000002800000-0x0000000002801000-memory.dmp

        Filesize

        4KB

      • memory/3256-16-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3348-4-0x0000000002B40000-0x0000000002B56000-memory.dmp

        Filesize

        88KB

      • memory/3444-58-0x0000000072780000-0x0000000072E97000-memory.dmp

        Filesize

        7.1MB

      • memory/3444-63-0x0000000072780000-0x0000000072E97000-memory.dmp

        Filesize

        7.1MB