Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2024 07:00

General

  • Target

    4d7e2a4ab9f09783e56841978e10cb46.exe

  • Size

    229KB

  • MD5

    4d7e2a4ab9f09783e56841978e10cb46

  • SHA1

    ce52a86b7e843859f3284954d82ca239fe7e5eaf

  • SHA256

    63719285660c135f9b71eecf5e5da4a4684471b9041dd36d6ee8b7aede2922db

  • SHA512

    6d59e96fe4bc517a9696cb59c215fe6ddbb3f9f122e6f4586b764b4321055c2dc5c69a4a9d851ac7028bebe15dc5d20989bac8f6d4aefffaa2a521fc4d7dd7ea

  • SSDEEP

    3072:znqLS1HySqzJLBdUSJiA/1KvZY4O74WpsvxaEZEkVWRG1XRTNZ/9rkWgl+J:znwFBB74qExaeEAjNZlrk

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d7e2a4ab9f09783e56841978e10cb46.exe
    "C:\Users\Admin\AppData\Local\Temp\4d7e2a4ab9f09783e56841978e10cb46.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 368
      2⤵
      • Program crash
      PID:3308
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4948 -ip 4948
    1⤵
      PID:2860
    • C:\Users\Admin\AppData\Local\Temp\9BE2.exe
      C:\Users\Admin\AppData\Local\Temp\9BE2.exe
      1⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2028
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 1072
          3⤵
          • Program crash
          PID:792
    • C:\Users\Admin\AppData\Local\Temp\A0E4.exe
      C:\Users\Admin\AppData\Local\Temp\A0E4.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2028 -ip 2028
      1⤵
        PID:2400

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\9BE2.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\A0E4.exe

        Filesize

        176KB

        MD5

        f6e2056c53eb1db77bfbe5aae34441c0

        SHA1

        7e04d5cc3c2539b15ef0fd4679ace55e93c2e4bd

        SHA256

        a69df6375d00d117d033acc2c71f5d69383742f958e668de8ed3b50185b5c6e4

        SHA512

        7475bae22a2bdd919ee2f515f77d01557a9c7b084e3f0c040c46cab57ce1e3b1b6b791720945caaae92c2396bf8ef2a1f47178fbe7f795ec7183c19b39aa5a8c

      • C:\Users\Admin\AppData\Local\Temp\A0E4.exe

        Filesize

        136KB

        MD5

        c3d0d513c44161ef1c4d724714afc85c

        SHA1

        b1be7e991732ae29d3a97b4b4e38abb7e143c28b

        SHA256

        84bd22865d0eef56ab0317f5da8bfa1ba8fba23f2c1005f08cb3b4076bb8906c

        SHA512

        51274a06874ee1830df53498a2f6b4bb371ac7f5e09ae2ba2ec1ceca6fffa331b0d6b467408956bc877108a64756920e1658ebc57819694ad7bab39663feea47

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        141KB

        MD5

        b977361b97937973ec04b79f54e5b4ed

        SHA1

        3310abe696aae32d722c64025aa8c96a8ac46fbf

        SHA256

        5732de5b9d4aa76e7947db5262c5a7d4da231f2e1912e7d21b12401d550c290c

        SHA512

        1b0c382d3bb0ad88cfec7e08c29764628bcfa50864ea0908ded281f1d43a4cd4f2621c202abd6f44d8ef674fca22f85e875a2f151d3649c52374e1332e8ab86a

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        92KB

        MD5

        ef56c12deb8209769397f7b80c44e140

        SHA1

        ad440dd9679d31a47146c0a0b67b90bd98e9a004

        SHA256

        3392b039c59c67af1660c4ce92eb3b22ddd3d053f5d42623a14b1fd72f7e8921

        SHA512

        ed600a734d45d544c1aad629d5dfac627c24eb5ec00372c881a55375c0514ba454c9c32510194756db31b24984d225fda31ebe0aded351157dc95f6c29e8917f

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        613KB

        MD5

        d3945eeb39bb7519ffd7149bdc6185f0

        SHA1

        aeec89970f1a308429a5b2abb378a0a132e48098

        SHA256

        46599c4e18dafcab8c14045bf9973614eece92574c78244cee517b9a5935c323

        SHA512

        b39c1d7176d7fcd50d2ef8e02333dcebd0cd7132ab3608d656a805939d7d3b7310e47136ebc16c8224b66dc63a13f7aa478a82268a46693622a9334fd6b36f17

      • C:\Users\Admin\AppData\Local\Temp\lib.dll

        Filesize

        452KB

        MD5

        27ac765a275c6ccf7f90fc5d13948a78

        SHA1

        0fc603e7f4df20e67218efad638078d867121fed

        SHA256

        5209b23cc0692d8f981caaa2c8c5ecdc58a076dd5c5dd0418a0ecaf3240808a8

        SHA512

        852321deec2f5a7cc80c939cd45fecc37740a3c83bb0ef0dce6e98259287518db81ede0458e6352b01ee4f1a9b3f19678826fd8fdd471e8ce241f0485913ad22

      • C:\Users\Admin\AppData\Local\Temp\nswA27B.tmp\System.dll

        Filesize

        12KB

        MD5

        dd87a973e01c5d9f8e0fcc81a0af7c7a

        SHA1

        c9206ced48d1e5bc648b1d0f54cccc18bf643a14

        SHA256

        7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

        SHA512

        4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

      • memory/1032-47-0x0000000000520000-0x0000000000AB6000-memory.dmp

        Filesize

        5.6MB

      • memory/1032-40-0x0000000000520000-0x0000000000AB6000-memory.dmp

        Filesize

        5.6MB

      • memory/2028-28-0x0000000001000000-0x00000000010C4000-memory.dmp

        Filesize

        784KB

      • memory/2028-60-0x0000000001000000-0x00000000010C4000-memory.dmp

        Filesize

        784KB

      • memory/2028-61-0x0000000004850000-0x0000000004852000-memory.dmp

        Filesize

        8KB

      • memory/2028-64-0x0000000001000000-0x00000000010C4000-memory.dmp

        Filesize

        784KB

      • memory/2028-25-0x0000000000260000-0x0000000000694000-memory.dmp

        Filesize

        4.2MB

      • memory/2028-27-0x0000000000260000-0x0000000000694000-memory.dmp

        Filesize

        4.2MB

      • memory/2028-29-0x0000000001000000-0x00000000010C4000-memory.dmp

        Filesize

        784KB

      • memory/2028-63-0x0000000000260000-0x0000000000693000-memory.dmp

        Filesize

        4.2MB

      • memory/2028-31-0x0000000001000000-0x00000000010C4000-memory.dmp

        Filesize

        784KB

      • memory/3340-4-0x0000000002AC0000-0x0000000002AD6000-memory.dmp

        Filesize

        88KB

      • memory/3364-24-0x0000000000920000-0x0000000000986000-memory.dmp

        Filesize

        408KB

      • memory/3364-17-0x0000000000990000-0x000000000099D000-memory.dmp

        Filesize

        52KB

      • memory/3364-23-0x0000000002800000-0x0000000002801000-memory.dmp

        Filesize

        4KB

      • memory/3364-22-0x0000000000920000-0x0000000000986000-memory.dmp

        Filesize

        408KB

      • memory/3364-20-0x0000000002830000-0x000000000283C000-memory.dmp

        Filesize

        48KB

      • memory/3364-16-0x0000000000920000-0x0000000000986000-memory.dmp

        Filesize

        408KB

      • memory/3364-14-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/3364-19-0x0000000000920000-0x0000000000986000-memory.dmp

        Filesize

        408KB

      • memory/3364-33-0x0000000000920000-0x0000000000986000-memory.dmp

        Filesize

        408KB

      • memory/3364-18-0x0000000077524000-0x0000000077525000-memory.dmp

        Filesize

        4KB

      • memory/3364-34-0x0000000002820000-0x0000000002821000-memory.dmp

        Filesize

        4KB

      • memory/3880-59-0x0000000072A60000-0x0000000073177000-memory.dmp

        Filesize

        7.1MB

      • memory/3880-65-0x0000000072A60000-0x0000000073177000-memory.dmp

        Filesize

        7.1MB

      • memory/4948-2-0x0000000002180000-0x0000000002189000-memory.dmp

        Filesize

        36KB

      • memory/4948-3-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4948-1-0x00000000005D0000-0x00000000006D0000-memory.dmp

        Filesize

        1024KB

      • memory/4948-7-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB