Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2024 06:57

General

  • Target

    4d7e2a4ab9f09783e56841978e10cb46.exe

  • Size

    229KB

  • MD5

    4d7e2a4ab9f09783e56841978e10cb46

  • SHA1

    ce52a86b7e843859f3284954d82ca239fe7e5eaf

  • SHA256

    63719285660c135f9b71eecf5e5da4a4684471b9041dd36d6ee8b7aede2922db

  • SHA512

    6d59e96fe4bc517a9696cb59c215fe6ddbb3f9f122e6f4586b764b4321055c2dc5c69a4a9d851ac7028bebe15dc5d20989bac8f6d4aefffaa2a521fc4d7dd7ea

  • SSDEEP

    3072:znqLS1HySqzJLBdUSJiA/1KvZY4O74WpsvxaEZEkVWRG1XRTNZ/9rkWgl+J:znwFBB74qExaeEAjNZlrk

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d7e2a4ab9f09783e56841978e10cb46.exe
    "C:\Users\Admin\AppData\Local\Temp\4d7e2a4ab9f09783e56841978e10cb46.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 368
      2⤵
      • Program crash
      PID:4236
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3744 -ip 3744
    1⤵
      PID:1552
    • C:\Users\Admin\AppData\Local\Temp\A2C8.exe
      C:\Users\Admin\AppData\Local\Temp\A2C8.exe
      1⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        PID:3324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 1140
          3⤵
          • Program crash
          PID:4132
    • C:\Users\Admin\AppData\Local\Temp\A6FF.exe
      C:\Users\Admin\AppData\Local\Temp\A6FF.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:5112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3324 -ip 3324
      1⤵
        PID:4856

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\A2C8.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\A6FF.exe

        Filesize

        185KB

        MD5

        45ca463aea4e1aee0a8ab3eaba1ae9fb

        SHA1

        ca1c9fe5beb44728d7ea7416aef28c1a352ba82d

        SHA256

        e2e7987f3555801b55e5273db6d6acdc521b40f12c5b1fe1e97751e61a11884d

        SHA512

        7c72014998eccd5c9032f7105d202d592bdd0555f63e1feb8b3b4e841ae3bc7baf2a5f370f47ae11973a6ac53de5e4651519a0bcc8eae6c14dbc86a89ed92121

      • C:\Users\Admin\AppData\Local\Temp\A6FF.exe

        Filesize

        176KB

        MD5

        893e1085b7f35449e812ff669bc2c376

        SHA1

        93bd76a9e8a79eced63d4d2db519b2eafcdb78c4

        SHA256

        f10f51f44ba53c69968bdbb21fbb8d11496fbe5bd0c47094a69a4db38eb07e72

        SHA512

        59dd9026f88f3187742d5a75890cb5634f753df087e516ed02418dc7e028b08233173c1525cff4782c7a898b62aba0bacba05d10f3107928d20d578b9b3608e4

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        128KB

        MD5

        a61d881bc01e4062a0dfe5999867d660

        SHA1

        99271faf35467f4f4eb34fabbef8b72ffb75dc50

        SHA256

        7bf50e93fd5fdf9a898c6995449419b4fe13cccd75336c2565c7062e6d14d123

        SHA512

        486734b310063ceb768340e37428eeef0541c485a477b72cc58f2f623b5f126c6ec0253086a8f7438e013c05cc846f22e0464eedfd7cef5ad29eb2829f7c0005

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        69KB

        MD5

        103b71c499e1717f88bee53b4150ceea

        SHA1

        8e5464cedfd13766067a0a5b1ac72cf4b842ff7e

        SHA256

        fe99ddc355b2d8ae7c6dde1fde6fb2c8766db0bce0f025f54df99c5b0295dc72

        SHA512

        db9cc1f9c0234ef5fb903003f77b2daa922130f1298a9f3a161b616f0922dd700d8a0a9d413dadecc75351ba1f3449263e69cb60204121eba794a5e20bc32bb5

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        8KB

        MD5

        2f99b1dd42880842ad975d080c012711

        SHA1

        e4948d944a564a52880a64ec6dd5d4aa48621fe7

        SHA256

        be3dd4375479a1a2461d5391be742f1c0c69542238ec142e8ff89b4b9f92a2c4

        SHA512

        eaab490eaea19affe82070dcfcbed04b9e98aef5a421e1a82c99964165929058f38c29792bfff2978688b1761770aed11d8be336c5e7a17717eb4f170ab9765e

      • C:\Users\Admin\AppData\Local\Temp\lib.dll

        Filesize

        43KB

        MD5

        b1426b56371e625f63e7bf64c5419e0e

        SHA1

        19cd0e50f8c92bd6067dcf4a6a87412b65463983

        SHA256

        835b9cbc5acd23df3fd3ec27a0623d5c6c904eeb1a7140d1191a8ad314120618

        SHA512

        fe25a30fe4d5b1c2fbfa095315407043c7a5a5270432ebf96f67cf825eae7f10f20bb305a57f88f137628f6dad84b01361193650f7d3fc8daaa75af2b0dfb725

      • C:\Users\Admin\AppData\Local\Temp\nsoA8F3.tmp\System.dll

        Filesize

        12KB

        MD5

        dd87a973e01c5d9f8e0fcc81a0af7c7a

        SHA1

        c9206ced48d1e5bc648b1d0f54cccc18bf643a14

        SHA256

        7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

        SHA512

        4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

      • memory/764-17-0x00000000007A0000-0x00000000007AD000-memory.dmp

        Filesize

        52KB

      • memory/764-16-0x00000000022B0000-0x0000000002316000-memory.dmp

        Filesize

        408KB

      • memory/764-23-0x00000000022B0000-0x0000000002316000-memory.dmp

        Filesize

        408KB

      • memory/764-22-0x0000000002830000-0x000000000283C000-memory.dmp

        Filesize

        48KB

      • memory/764-21-0x0000000002800000-0x0000000002801000-memory.dmp

        Filesize

        4KB

      • memory/764-20-0x0000000077294000-0x0000000077295000-memory.dmp

        Filesize

        4KB

      • memory/764-18-0x00000000022B0000-0x0000000002316000-memory.dmp

        Filesize

        408KB

      • memory/764-14-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/764-43-0x00000000022B0000-0x0000000002316000-memory.dmp

        Filesize

        408KB

      • memory/3324-38-0x0000000002530000-0x0000000002531000-memory.dmp

        Filesize

        4KB

      • memory/3324-24-0x0000000000090000-0x00000000004C4000-memory.dmp

        Filesize

        4.2MB

      • memory/3324-61-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3324-28-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3324-60-0x0000000000090000-0x00000000004C3000-memory.dmp

        Filesize

        4.2MB

      • memory/3324-27-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3324-26-0x0000000000090000-0x00000000004C4000-memory.dmp

        Filesize

        4.2MB

      • memory/3324-31-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3324-58-0x00000000040E0000-0x00000000040E2000-memory.dmp

        Filesize

        8KB

      • memory/3456-4-0x0000000006EE0000-0x0000000006EF6000-memory.dmp

        Filesize

        88KB

      • memory/3744-7-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3744-1-0x0000000000510000-0x0000000000610000-memory.dmp

        Filesize

        1024KB

      • memory/3744-2-0x0000000002180000-0x0000000002189000-memory.dmp

        Filesize

        36KB

      • memory/3744-3-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4812-46-0x0000000000460000-0x00000000009F6000-memory.dmp

        Filesize

        5.6MB

      • memory/4812-36-0x0000000000460000-0x00000000009F6000-memory.dmp

        Filesize

        5.6MB