Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2024 11:53

General

  • Target

    f053a903e0bbf05e985dea741187cfeb.exe

  • Size

    255KB

  • MD5

    f053a903e0bbf05e985dea741187cfeb

  • SHA1

    e3a46ce6cbadd862373747054221322dff05d7f5

  • SHA256

    d0cb3e1d35598d959dd03c288f0f55bc0e2368ca1172948a2bc4b7b1b848d11c

  • SHA512

    9be6ffb348f60f40c290bd54136c5affdfaf57ea201547a5875fd12da01c097c4b610b530b181e5d77e445e827731a61e254a80f5dd1c07911ab3d74bb1a3568

  • SSDEEP

    6144:dwLrDSWMZF53kVdVIZBrsv2WRTQs76BVs:mzI3ksBrs76

Malware Config

Extracted

Family

smokeloader

Botnet

t200

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f053a903e0bbf05e985dea741187cfeb.exe
    "C:\Users\Admin\AppData\Local\Temp\f053a903e0bbf05e985dea741187cfeb.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 368
      2⤵
      • Program crash
      PID:1360
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3220 -ip 3220
    1⤵
      PID:3540
    • C:\Users\Admin\AppData\Local\Temp\C6DA.exe
      C:\Users\Admin\AppData\Local\Temp\C6DA.exe
      1⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4728
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 1128
          3⤵
          • Program crash
          PID:4108
    • C:\Users\Admin\AppData\Local\Temp\CBCD.exe
      C:\Users\Admin\AppData\Local\Temp\CBCD.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2756 -ip 2756
      1⤵
        PID:4356

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\C6DA.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\CBCD.exe

        Filesize

        534KB

        MD5

        a1a3df0417d08ead8a19867a0a0434dd

        SHA1

        7eadf6a872afbe9de20d79a4ab7e4c5a133e2ae8

        SHA256

        5c382d768811f16e7124cc20c89411fa5d6059e07dc9c1918df5035a6df3d9f7

        SHA512

        a727111cb88a8747d901a6cb63ab6ce0a365fa5be84bfc0f0768b9079dac0b31679363a4f75e6dd9b7146fbf362450b1f0240a973a71d03b920e1a75ecec9a08

      • C:\Users\Admin\AppData\Local\Temp\CBCD.exe

        Filesize

        206KB

        MD5

        0efe3d0c40da7e1da3f162988c262676

        SHA1

        09652afb64fc477e99bc4f2caf687a7d33c9f86c

        SHA256

        a7bd231949a2631b90042651ef9e9298ad62fe1c4454446077601234f9941a7c

        SHA512

        847a27ccee6a4afc24c1bea8b54afd1c3e85b90f8f98192c06f09d31901571e24ce1945f62ee484c7af089600c3db653371651db293d7dda973c4bcd9da4783d

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        35KB

        MD5

        3e1558788ba7dd824db596cb08c499b4

        SHA1

        75eae7cabcae1af7a796e19bb81b90ec22c73c07

        SHA256

        d3dca03783cedc3c83cfab12d4007f114f611d76b056ca5bfd2c1a01a86eed81

        SHA512

        cbd07b2e4f34b6c2f3b38eb216f40196e2ec6455205834f996981ff06e83b585ccedf68d508cc0577fec07687acc87098af808c1f886b950a2713a0c611d2d63

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        557KB

        MD5

        85bd826b72088f5c0ad86d8a2bc83c41

        SHA1

        b98fce735b359bd87cb705f50b541748c42843fe

        SHA256

        7d3723bad33058f725a3cad6a5b3ef91e296f864a23fdb7158e42cbe623ec9fd

        SHA512

        5fd50ebbb4a04b09fc44776f7590db734dcdc4bf1aa4e433ff743923316fc3aa593dfbc8f21a4a70fe1804e745e9005f4838b058c40bcff63fa0cadf305587f0

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        734KB

        MD5

        67f9acfde323c38f7569c7f1e125fb9b

        SHA1

        ae411876f0f4fe2449cff4574cbd8a344d3fe3ef

        SHA256

        b13151f1967c8dca115ffaa130947820643b340d83a71f366b430577df39c33c

        SHA512

        bebee6963f19b0baff423180f71be34240049e3d8cac10677f12e5b12e958e8043119b13911f2ab94aa8ba72b142810551ce54b5458e4fb3340c9021196a90c0

      • C:\Users\Admin\AppData\Local\Temp\lib.dll

        Filesize

        481KB

        MD5

        3394e101ad6011208c1923291dfce99e

        SHA1

        ade78fac1ddc8561edaa9d31557b97e0b55ac6ea

        SHA256

        b3d8b8b187f00816d8089682ddd43612475e7826c8cc93ef177cfe2984e87e1b

        SHA512

        d2e30f31c5ac00b35261ffdc7f854b76acd9a890b325695159a13a84666a639dea95a999135ff03993ea7da568b97e05d7fb32ba61e24bf32557c0e8388f3d82

      • C:\Users\Admin\AppData\Local\Temp\nsyCDC1.tmp\System.dll

        Filesize

        12KB

        MD5

        dd87a973e01c5d9f8e0fcc81a0af7c7a

        SHA1

        c9206ced48d1e5bc648b1d0f54cccc18bf643a14

        SHA256

        7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

        SHA512

        4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

      • memory/1492-64-0x0000000072B10000-0x0000000073227000-memory.dmp

        Filesize

        7.1MB

      • memory/1492-59-0x0000000072B10000-0x0000000073227000-memory.dmp

        Filesize

        7.1MB

      • memory/2756-29-0x0000000000C00000-0x0000000000CC4000-memory.dmp

        Filesize

        784KB

      • memory/2756-28-0x0000000000C00000-0x0000000000CC4000-memory.dmp

        Filesize

        784KB

      • memory/2756-60-0x00000000032A0000-0x00000000032A2000-memory.dmp

        Filesize

        8KB

      • memory/2756-63-0x0000000000C00000-0x0000000000CC4000-memory.dmp

        Filesize

        784KB

      • memory/2756-62-0x0000000000D80000-0x00000000011B3000-memory.dmp

        Filesize

        4.2MB

      • memory/2756-25-0x0000000000D80000-0x00000000011B4000-memory.dmp

        Filesize

        4.2MB

      • memory/2756-27-0x0000000000D80000-0x00000000011B4000-memory.dmp

        Filesize

        4.2MB

      • memory/2756-31-0x0000000000C00000-0x0000000000CC4000-memory.dmp

        Filesize

        784KB

      • memory/3220-1-0x0000000000C60000-0x0000000000D60000-memory.dmp

        Filesize

        1024KB

      • memory/3220-2-0x0000000000BD0000-0x0000000000BD9000-memory.dmp

        Filesize

        36KB

      • memory/3220-3-0x0000000000400000-0x0000000000862000-memory.dmp

        Filesize

        4.4MB

      • memory/3220-4-0x0000000000400000-0x0000000000862000-memory.dmp

        Filesize

        4.4MB

      • memory/3220-8-0x0000000000400000-0x0000000000862000-memory.dmp

        Filesize

        4.4MB

      • memory/3436-47-0x00000000004D0000-0x0000000000A66000-memory.dmp

        Filesize

        5.6MB

      • memory/3436-37-0x00000000004D0000-0x0000000000A66000-memory.dmp

        Filesize

        5.6MB

      • memory/3496-5-0x00000000009C0000-0x00000000009D6000-memory.dmp

        Filesize

        88KB

      • memory/4728-17-0x0000000000810000-0x0000000000876000-memory.dmp

        Filesize

        408KB

      • memory/4728-15-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/4728-40-0x0000000000810000-0x0000000000876000-memory.dmp

        Filesize

        408KB

      • memory/4728-18-0x0000000000890000-0x000000000089D000-memory.dmp

        Filesize

        52KB

      • memory/4728-39-0x0000000002820000-0x0000000002821000-memory.dmp

        Filesize

        4KB

      • memory/4728-21-0x00000000775D4000-0x00000000775D5000-memory.dmp

        Filesize

        4KB

      • memory/4728-19-0x0000000000810000-0x0000000000876000-memory.dmp

        Filesize

        408KB

      • memory/4728-24-0x0000000000810000-0x0000000000876000-memory.dmp

        Filesize

        408KB

      • memory/4728-23-0x0000000002830000-0x000000000283C000-memory.dmp

        Filesize

        48KB

      • memory/4728-22-0x0000000002800000-0x0000000002801000-memory.dmp

        Filesize

        4KB