Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2024 03:52

General

  • Target

    d9077796101f063d05d1b18ef03639d8.exe

  • Size

    203KB

  • MD5

    d9077796101f063d05d1b18ef03639d8

  • SHA1

    035d12383b9bcdbba8393fa643a375a19cbab559

  • SHA256

    17d15c3e994b704c8b11393ee9e83dc7ecc3cdfd981820501beaf98c6e34cc94

  • SHA512

    c79350993ced4a8e18b071e866a69b664143e35c5f6704afe4ff5f70437522d90722b29f0fd9bf6c66ddd331c5ebc65378915a3de062fd26ae213fbb252ac2ad

  • SSDEEP

    3072:pfUB/bLaZdXUNc8iirJiM21K7uLX6Qn+62oM42fL4iBNkRDxs+cmH:pfUVclVrXpbGEx7co

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9077796101f063d05d1b18ef03639d8.exe
    "C:\Users\Admin\AppData\Local\Temp\d9077796101f063d05d1b18ef03639d8.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:688
  • C:\Users\Admin\AppData\Local\Temp\C14C.exe
    C:\Users\Admin\AppData\Local\Temp\C14C.exe
    1⤵
    • Sets file execution options in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:404
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • Modifies firewall policy service
      • Sets file execution options in registry
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      PID:1496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 1068
        3⤵
        • Program crash
        PID:4864
  • C:\Users\Admin\AppData\Local\Temp\C797.exe
    C:\Users\Admin\AppData\Local\Temp\C797.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4612
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1496 -ip 1496
    1⤵
      PID:1264

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\C14C.exe

      Filesize

      321KB

      MD5

      1125b315c69626788696e6a03491ceb4

      SHA1

      1252d5bea1ba7951d15ae7c0cda23abbddf2c00f

      SHA256

      eada560ce6a0074853fdcd046268288b115a8a101c515853ba6bcc0eb40f1e95

      SHA512

      9200acb31d1674c3ae526b2e35dd460280f4480ccbaea071b012f38efd0612e35a5cbaae9e4a960fd5cba7ed183b17a075e24fc2de0475224491433b6410071b

    • C:\Users\Admin\AppData\Local\Temp\C14C.exe

      Filesize

      331KB

      MD5

      f6660e3807506efbb60709e849fdd00a

      SHA1

      bf0c0c1cd9f89ecc584738f29b65222bc495e1cd

      SHA256

      aa17e3feb34a29f711d3907917649327e29c567877b715a969712414cecf8fe2

      SHA512

      2fbefd6e928869443297ceef6ea6fce7bf90e6494cc7a02f1a87aa60efaec93009ab3a3dc9dfb171bb2bd4535c20be1a5664960c9d2fcc6e033e533c55ef6ad7

    • C:\Users\Admin\AppData\Local\Temp\C797.exe

      Filesize

      357KB

      MD5

      b38682f7d14298951724ad37229b75a2

      SHA1

      3803cfa85e8f027f4193668620f0227b3f6a06f9

      SHA256

      ae99e7d9e46b443175615e2169ff67a5964cdc8a739a26bc5a9391c54fec9604

      SHA512

      ec5d110c537e9373266112aa47d1b35eccf7dd8baab150c2d65ad1e03403cb985705b3e14d83ed829e3865a120bb5a9a3199e2509a208212414b3c615a58c02c

    • C:\Users\Admin\AppData\Local\Temp\C797.exe

      Filesize

      583KB

      MD5

      1d190dcdbbcebe1d7959ba345f116eef

      SHA1

      dcb51182488d978f048d09f168b15931e54ffeee

      SHA256

      d74120bd344966d0cd1ec643db449321cc92e3cebe0a38eb703993a5019a2530

      SHA512

      30270109fbb337a645939f5c7a1e0f6bd75737b6a3c91c7646ac92188a288060f4970babeed4530ac9bef0c406ca1a2790b9c972d5fc6893f1f6aeacf44bdb85

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      160KB

      MD5

      f987c82e7de9089152b51acdd8fceb16

      SHA1

      64a28795019ca8b5c347f76784531167cf40f830

      SHA256

      d4750f6fcc8af45836f12ef1ead2dce78a8a2d0c2384d9b9761908eaa377d92a

      SHA512

      adbab6a60306f6d64e276a1d823258ca8eb3fc441c1839ed9d713a4ad88e50afe89cd32f24ac052d90d10de1f86b6a344b6ae6725c969187b86662e12b6cdcbd

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      151KB

      MD5

      dc3beb842d706fa841c702a250334c7e

      SHA1

      0d73448720876fee0d220bc4696ef45cea607465

      SHA256

      88a2ad58659c9a488a62b4792014bae1803eae5f53ba68f671d78a672c475a32

      SHA512

      3b3455425f7b5673cd61fd88e240b8b579a74b7d46db85334101c73137e710cb187ed616774c613b83b851332005cd6be669e7b7b2035577aa5a4c277d480bfc

    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

      Filesize

      205KB

      MD5

      03f2efb9d110c7fe400c930ad96e9987

      SHA1

      9cb13d2ef3c8ea1d66281cd3f0910817882dc801

      SHA256

      1ce3e971819f9fc217350aa69ae08ba391d5b8e5f4c0c480ab4e21c91dd77fd2

      SHA512

      567c7e520902a2416fa800a710d3a2f3b6645edc5eceac5ab7cd98eef6b415416e216fe9ce3c0650e4649e7a0c9784483c39be5d26e725b7202511c7e0973bf7

    • C:\Users\Admin\AppData\Local\Temp\lib.dll

      Filesize

      17KB

      MD5

      d86e666a6cec7c9cd722083348b5b263

      SHA1

      bc43e5aeeb20547401d6fe8b3229dc055e82c750

      SHA256

      97f4616493612bffe90d01e1a78985cadbb8cdc20747cea6a0d37cf240bda12c

      SHA512

      962a8ae930ecd468cafae63ff4d4451a36ef4208164bc9f65a6a2449317a371c9f07fe31af16b68b55a1b4f6d02e7de221c33d2e5a616cf0575d2099020a1d4d

    • C:\Users\Admin\AppData\Local\Temp\nshCB8E.tmp\System.dll

      Filesize

      12KB

      MD5

      dd87a973e01c5d9f8e0fcc81a0af7c7a

      SHA1

      c9206ced48d1e5bc648b1d0f54cccc18bf643a14

      SHA256

      7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

      SHA512

      4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

    • memory/404-17-0x00000000022D0000-0x0000000002336000-memory.dmp

      Filesize

      408KB

    • memory/404-41-0x00000000022D0000-0x0000000002336000-memory.dmp

      Filesize

      408KB

    • memory/404-19-0x0000000077744000-0x0000000077745000-memory.dmp

      Filesize

      4KB

    • memory/404-20-0x00000000022D0000-0x0000000002336000-memory.dmp

      Filesize

      408KB

    • memory/404-21-0x0000000002830000-0x000000000283C000-memory.dmp

      Filesize

      48KB

    • memory/404-23-0x00000000022D0000-0x0000000002336000-memory.dmp

      Filesize

      408KB

    • memory/404-24-0x0000000002800000-0x0000000002801000-memory.dmp

      Filesize

      4KB

    • memory/404-18-0x0000000000630000-0x000000000063D000-memory.dmp

      Filesize

      52KB

    • memory/404-40-0x0000000002820000-0x0000000002821000-memory.dmp

      Filesize

      4KB

    • memory/404-15-0x0000000000010000-0x000000000006D000-memory.dmp

      Filesize

      372KB

    • memory/688-2-0x0000000002180000-0x0000000002189000-memory.dmp

      Filesize

      36KB

    • memory/688-3-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/688-5-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/688-1-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/688-8-0x0000000002180000-0x0000000002189000-memory.dmp

      Filesize

      36KB

    • memory/1108-36-0x0000000000D10000-0x00000000012A6000-memory.dmp

      Filesize

      5.6MB

    • memory/1108-48-0x0000000000D10000-0x00000000012A6000-memory.dmp

      Filesize

      5.6MB

    • memory/1496-25-0x00000000001F0000-0x0000000000624000-memory.dmp

      Filesize

      4.2MB

    • memory/1496-38-0x0000000000C90000-0x0000000000D54000-memory.dmp

      Filesize

      784KB

    • memory/1496-32-0x0000000000C90000-0x0000000000D54000-memory.dmp

      Filesize

      784KB

    • memory/1496-37-0x0000000000C90000-0x0000000000D54000-memory.dmp

      Filesize

      784KB

    • memory/1496-27-0x00000000001F0000-0x0000000000624000-memory.dmp

      Filesize

      4.2MB

    • memory/1496-34-0x0000000000C90000-0x0000000000D54000-memory.dmp

      Filesize

      784KB

    • memory/1496-61-0x00000000045A0000-0x00000000045A2000-memory.dmp

      Filesize

      8KB

    • memory/1496-63-0x00000000001F0000-0x0000000000623000-memory.dmp

      Filesize

      4.2MB

    • memory/1496-64-0x0000000000C90000-0x0000000000D54000-memory.dmp

      Filesize

      784KB

    • memory/3576-4-0x0000000003390000-0x00000000033A6000-memory.dmp

      Filesize

      88KB

    • memory/4612-60-0x0000000072F30000-0x0000000073647000-memory.dmp

      Filesize

      7.1MB

    • memory/4612-65-0x0000000072F30000-0x0000000073647000-memory.dmp

      Filesize

      7.1MB