Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2024 03:52

General

  • Target

    d9077796101f063d05d1b18ef03639d8.exe

  • Size

    203KB

  • MD5

    d9077796101f063d05d1b18ef03639d8

  • SHA1

    035d12383b9bcdbba8393fa643a375a19cbab559

  • SHA256

    17d15c3e994b704c8b11393ee9e83dc7ecc3cdfd981820501beaf98c6e34cc94

  • SHA512

    c79350993ced4a8e18b071e866a69b664143e35c5f6704afe4ff5f70437522d90722b29f0fd9bf6c66ddd331c5ebc65378915a3de062fd26ae213fbb252ac2ad

  • SSDEEP

    3072:pfUB/bLaZdXUNc8iirJiM21K7uLX6Qn+62oM42fL4iBNkRDxs+cmH:pfUVclVrXpbGEx7co

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\d9077796101f063d05d1b18ef03639d8.exe
      "C:\Users\Admin\AppData\Local\Temp\d9077796101f063d05d1b18ef03639d8.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3028
    • C:\Users\Admin\AppData\Local\Temp\9ECF.exe
      C:\Users\Admin\AppData\Local\Temp\9ECF.exe
      2⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • NTFS ADS
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Users\Admin\AppData\Local\Temp\iwaa51qmkms3u_1.exe
          /suac
          4⤵
          • Modifies firewall policy service
          • Sets file execution options in registry
          • Executes dropped EXE
          • Checks for any installed AV software in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:332
          • C:\Windows\SysWOW64\regedit.exe
            "C:\Windows\SysWOW64\regedit.exe"
            5⤵
            • Modifies security service
            • Sets file execution options in registry
            • Sets service image path in registry
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:1620
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\IWAA51~1.EXE" /RL HIGHEST
            5⤵
            • Creates scheduled task(s)
            PID:1512
    • C:\Users\Admin\AppData\Local\Temp\A7E4.exe
      C:\Users\Admin\AppData\Local\Temp\A7E4.exe
      2⤵
      • Executes dropped EXE
      PID:2584
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1216
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:1160

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\9ECF.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\A7E4.exe

        Filesize

        371KB

        MD5

        11f60ae3e73be4e9ae7c1778cae7933e

        SHA1

        cc3e1de92339b039215a5d8c3cf01db41502b2b9

        SHA256

        05e06b7ac0fdbef4afd778dcf11b34bb4521e88f4849f1b1182f016d9441e910

        SHA512

        fded8ffde6fb5bf4eac0f5c36f543f82b8582ab73611a29da5eda8899f1e3b9a85ad1770d85e489b0d773a5282b647224ce3f90464bca17f54fb18b84b8ba3b2

      • C:\Users\Admin\AppData\Local\Temp\A7E4.exe

        Filesize

        320KB

        MD5

        a89c8d227a541de4227f839646244132

        SHA1

        14d0a8d50c664c3ce18a94fd7ba61d8691223442

        SHA256

        3ddcfc4ea5bab122987f32f19d8e2c6e78833acbc0ac3626c5523bcd1fee10b6

        SHA512

        2aac45c9ddea6b6701f67ea787495d46c93c127089a03482323158d724e779850650e188ae0bd61d898f21804b142fedebffc55818136a7a3f4b156423eee2fe

      • C:\Users\Admin\AppData\Local\Temp\A7E4.exe

        Filesize

        229KB

        MD5

        73555577b5583f1b489da8f5fce2eda1

        SHA1

        0afadc286352067c3a4ec269efb5bc0e86745b2b

        SHA256

        d4e8e183d96d7ffbb8046253227c9f98e61d7abbf390f5e63f7dc4a3fc2ecbc8

        SHA512

        8c392eeeb2be3fbb20cdb56791421d7054086dcc163fd189c54bdf6e6a4b217cffe3b6c36a4deeea3bf010d651edbabb45cc086ba514ca86b578f062aee5d8bd

      • C:\Users\Admin\AppData\Local\Temp\iwaa51qmkms3u_1.exe

        Filesize

        1KB

        MD5

        74abeca6c738f2ff3555461c1c618ea8

        SHA1

        44920576a89ed34a67d65976538fd4bd1465e502

        SHA256

        d86f24b7cd9a5ff217739e5604f21c44d28d160e665bfd9c053591faec687124

        SHA512

        ba7d8bbef8648104ba1651d1d8cbf80e768133350e665462c302fab7b594b305edcff810e88fd366b2fcbf31332ba0772e265c9322f1436f7a173b10fbc26c84

      • C:\Users\Admin\AppData\Roaming\tesudcb

        Filesize

        203KB

        MD5

        d9077796101f063d05d1b18ef03639d8

        SHA1

        035d12383b9bcdbba8393fa643a375a19cbab559

        SHA256

        17d15c3e994b704c8b11393ee9e83dc7ecc3cdfd981820501beaf98c6e34cc94

        SHA512

        c79350993ced4a8e18b071e866a69b664143e35c5f6704afe4ff5f70437522d90722b29f0fd9bf6c66ddd331c5ebc65378915a3de062fd26ae213fbb252ac2ad

      • memory/332-90-0x00000000002A0000-0x0000000000306000-memory.dmp

        Filesize

        408KB

      • memory/332-89-0x0000000000690000-0x000000000069C000-memory.dmp

        Filesize

        48KB

      • memory/332-86-0x00000000002A0000-0x0000000000306000-memory.dmp

        Filesize

        408KB

      • memory/332-88-0x0000000000310000-0x0000000000316000-memory.dmp

        Filesize

        24KB

      • memory/332-104-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/332-106-0x0000000000310000-0x0000000000316000-memory.dmp

        Filesize

        24KB

      • memory/332-105-0x00000000002A0000-0x0000000000306000-memory.dmp

        Filesize

        408KB

      • memory/1160-73-0x00000000778B1000-0x00000000778B2000-memory.dmp

        Filesize

        4KB

      • memory/1284-58-0x00000000778B1000-0x00000000778B2000-memory.dmp

        Filesize

        4KB

      • memory/1284-4-0x0000000002980000-0x0000000002996000-memory.dmp

        Filesize

        88KB

      • memory/1284-93-0x0000000002640000-0x0000000002641000-memory.dmp

        Filesize

        4KB

      • memory/1620-99-0x0000000000F30000-0x0000000000F96000-memory.dmp

        Filesize

        408KB

      • memory/1620-102-0x0000000000090000-0x000000000009B000-memory.dmp

        Filesize

        44KB

      • memory/1620-98-0x0000000000F30000-0x0000000000F96000-memory.dmp

        Filesize

        408KB

      • memory/1620-101-0x0000000000F30000-0x0000000000F95000-memory.dmp

        Filesize

        404KB

      • memory/1620-107-0x0000000000090000-0x000000000009B000-memory.dmp

        Filesize

        44KB

      • memory/2584-52-0x0000000000E60000-0x00000000013F6000-memory.dmp

        Filesize

        5.6MB

      • memory/2584-50-0x0000000000E60000-0x00000000013F6000-memory.dmp

        Filesize

        5.6MB

      • memory/2696-27-0x0000000000320000-0x0000000000386000-memory.dmp

        Filesize

        408KB

      • memory/2696-26-0x00000000003A0000-0x00000000003A1000-memory.dmp

        Filesize

        4KB

      • memory/2696-25-0x0000000001DF0000-0x0000000001DFC000-memory.dmp

        Filesize

        48KB

      • memory/2696-23-0x0000000000320000-0x0000000000386000-memory.dmp

        Filesize

        408KB

      • memory/2696-22-0x0000000077A50000-0x0000000077A51000-memory.dmp

        Filesize

        4KB

      • memory/2696-21-0x00000000002A0000-0x00000000002AD000-memory.dmp

        Filesize

        52KB

      • memory/2696-37-0x0000000001DE0000-0x0000000001DE1000-memory.dmp

        Filesize

        4KB

      • memory/2696-20-0x0000000000290000-0x0000000000291000-memory.dmp

        Filesize

        4KB

      • memory/2696-19-0x0000000000320000-0x0000000000386000-memory.dmp

        Filesize

        408KB

      • memory/2696-18-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2696-34-0x0000000000320000-0x0000000000386000-memory.dmp

        Filesize

        408KB

      • memory/2844-31-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-41-0x00000000001D0000-0x0000000000294000-memory.dmp

        Filesize

        784KB

      • memory/2844-56-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-59-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-61-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-60-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-62-0x0000000077860000-0x0000000077A09000-memory.dmp

        Filesize

        1.7MB

      • memory/2844-63-0x00000000001D0000-0x0000000000294000-memory.dmp

        Filesize

        784KB

      • memory/2844-64-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-65-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-67-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-68-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-66-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-69-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2844-70-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-55-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-72-0x00000000001D0000-0x0000000000294000-memory.dmp

        Filesize

        784KB

      • memory/2844-82-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-54-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-57-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-53-0x00000000001D0000-0x0000000000294000-memory.dmp

        Filesize

        784KB

      • memory/2844-42-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-51-0x0000000000360000-0x000000000036C000-memory.dmp

        Filesize

        48KB

      • memory/2844-39-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-84-0x00000000001D0000-0x0000000000294000-memory.dmp

        Filesize

        784KB

      • memory/2844-38-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-91-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-35-0x00000000002A0000-0x00000000002A6000-memory.dmp

        Filesize

        24KB

      • memory/2844-97-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-36-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-32-0x00000000001D0000-0x0000000000294000-memory.dmp

        Filesize

        784KB

      • memory/2844-110-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-30-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-29-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/2844-109-0x0000000077A40000-0x0000000077BC1000-memory.dmp

        Filesize

        1.5MB

      • memory/3028-3-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/3028-2-0x00000000001B0000-0x00000000001B9000-memory.dmp

        Filesize

        36KB

      • memory/3028-5-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/3028-1-0x0000000000290000-0x0000000000390000-memory.dmp

        Filesize

        1024KB