Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2024 14:43

General

  • Target

    efe103f9ccf08971d6d42c0a20c59e64e64d02999cebe8a3247e74f8a0ea439f.exe

  • Size

    213KB

  • MD5

    518fa1761d1903670c9c2a5cae38646d

  • SHA1

    bc735ff81eb03d5b2e93e4c6edc1a0bf303bcd1e

  • SHA256

    efe103f9ccf08971d6d42c0a20c59e64e64d02999cebe8a3247e74f8a0ea439f

  • SHA512

    a23723830cc4e1ffd271d75aa9abdabbe658ba9f47e81ec69a7b10a65024ec90d631097c878fd45526921de0b671120a603440e5d74f184507b632a95dcacd12

  • SSDEEP

    3072:SoMaibUPLJiUzDb2Q6weG7AkX6OSv+9pR5+:/ibUPnb2QveNk7+

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\efe103f9ccf08971d6d42c0a20c59e64e64d02999cebe8a3247e74f8a0ea439f.exe
    "C:\Users\Admin\AppData\Local\Temp\efe103f9ccf08971d6d42c0a20c59e64e64d02999cebe8a3247e74f8a0ea439f.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2588
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 368
      2⤵
      • Program crash
      PID:4516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2588 -ip 2588
    1⤵
      PID:4368
    • C:\Users\Admin\AppData\Local\Temp\B093.exe
      C:\Users\Admin\AppData\Local\Temp\B093.exe
      1⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        PID:3020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 1148
          3⤵
          • Program crash
          PID:3296
    • C:\Users\Admin\AppData\Local\Temp\B789.exe
      C:\Users\Admin\AppData\Local\Temp\B789.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3096
      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3020 -ip 3020
      1⤵
        PID:4736

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\B093.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\B789.exe

        Filesize

        48KB

        MD5

        8bf46a2dd941c891671095285890f457

        SHA1

        3d2fb63e32fffe83a36fee52cc08686307c2d7b4

        SHA256

        2e9c1f6aa28b7719acde5d039bd4c7914bc0577bd999cd9811d73a1a37ec4132

        SHA512

        9526bbf057a542542abf6cb28079b59f286a04205f8714f237705f9aa23b2e07e9cc59d289d8307121272e5b7caec0245ad08871b2dc1887554fc70d818781a4

      • C:\Users\Admin\AppData\Local\Temp\B789.exe

        Filesize

        292KB

        MD5

        270310beab2743b6167ebf26adef43cc

        SHA1

        576556d7a6612f1903d0ce812cf9fccd3a30dde7

        SHA256

        21c80da91ffc50ef40c3dc8aa9588f3879806e81861027cce6f45fde1dfa19d5

        SHA512

        59d697043fb3f21401b04b490ce33f3c7f96d28d773dfcd3a36f94ca1ed5768816bddafd4f62e61d6c96385c2a9b30bf0eca47814eec15aea541e0d69eab4158

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        469KB

        MD5

        4abf8b7885a7ff1166b83a97f7a7057b

        SHA1

        024d43a908b07d37db04b5656b484dea418f7b38

        SHA256

        e55e9141b273ffe9da8ba0152aba41065dd42598c923b343ec34faabba904950

        SHA512

        8a247caf8d74164f19b84b037d33962c601b6d81273d82d2142e677f5d871af89569e3c0d7037b94404ff9b0ec256c39457fb99c226b6a0b2fde4c03de91487a

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        368KB

        MD5

        9a729024de5d0f383b8dc5b9ca078fe2

        SHA1

        5eca69043ae793870bf42ffba72bf4297f1f1455

        SHA256

        54f635022b1bb487495511d96e52ff6bcd1bd907b1542aaf0536ab86b43715e0

        SHA512

        348ccbb6a2587f324ec2ded24b7531c1459449d26e9035d1f1494822b420b52a0228480189fcc0f8afb91b8af74167a97be1920b4829ad027ec87b5f5b27ea07

      • C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe

        Filesize

        237KB

        MD5

        7e9082b6952bd903161aec755b65adc7

        SHA1

        5fd218fd1341f8b6086f0cc1c7a933d1e04417a3

        SHA256

        ab97313c38e198a29b05f9f8fd510be5b73d0aac7aff56437169ce6cdec233e4

        SHA512

        e3b6c558686278e196225c38fb6aa919ed8f78d4f686f8d6d2ea4f07c1f15c847bfbde762bfc339b0fb9f2107abb7ec52fb599972b585c3b3c87b9c503498218

      • C:\Users\Admin\AppData\Local\Temp\lib.dll

        Filesize

        267KB

        MD5

        d4d4c8b68e89aa5d85c757435c9e8033

        SHA1

        7ab1f25a509159310d08e76ef3f152c4d96087d4

        SHA256

        11d4ebe102796d177ada551b174ee52a7dacf84e1c879d9d7345cd9c43096527

        SHA512

        400a433e062579242fa07b5947d6ad2f70be49e37a15cab5106974c74eec2bece18e5336f9d02c6526354593b7e0ce0a1c9d072585c792e0d1488449a6d9112d

      • C:\Users\Admin\AppData\Local\Temp\nskB893.tmp\System.dll

        Filesize

        12KB

        MD5

        dd87a973e01c5d9f8e0fcc81a0af7c7a

        SHA1

        c9206ced48d1e5bc648b1d0f54cccc18bf643a14

        SHA256

        7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

        SHA512

        4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

      • memory/1932-59-0x0000000072ED0000-0x00000000735E7000-memory.dmp

        Filesize

        7.1MB

      • memory/1932-64-0x0000000072ED0000-0x00000000735E7000-memory.dmp

        Filesize

        7.1MB

      • memory/2588-1-0x0000000000510000-0x0000000000610000-memory.dmp

        Filesize

        1024KB

      • memory/2588-8-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/2588-4-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/2588-3-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/2588-2-0x0000000002050000-0x0000000002059000-memory.dmp

        Filesize

        36KB

      • memory/3020-31-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3020-27-0x0000000000D90000-0x00000000011C4000-memory.dmp

        Filesize

        4.2MB

      • memory/3020-28-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3020-25-0x0000000000D90000-0x00000000011C4000-memory.dmp

        Filesize

        4.2MB

      • memory/3020-29-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3020-32-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

        Filesize

        4KB

      • memory/3020-60-0x00000000044C0000-0x00000000044C2000-memory.dmp

        Filesize

        8KB

      • memory/3020-63-0x0000000000800000-0x00000000008C4000-memory.dmp

        Filesize

        784KB

      • memory/3020-62-0x0000000000D90000-0x00000000011C3000-memory.dmp

        Filesize

        4.2MB

      • memory/3096-40-0x0000000000070000-0x0000000000606000-memory.dmp

        Filesize

        5.6MB

      • memory/3096-47-0x0000000000070000-0x0000000000606000-memory.dmp

        Filesize

        5.6MB

      • memory/3192-22-0x0000000002800000-0x0000000002801000-memory.dmp

        Filesize

        4KB

      • memory/3192-23-0x0000000002830000-0x000000000283C000-memory.dmp

        Filesize

        48KB

      • memory/3192-24-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3192-18-0x0000000002640000-0x000000000264D000-memory.dmp

        Filesize

        52KB

      • memory/3192-17-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3192-15-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/3192-21-0x0000000077994000-0x0000000077995000-memory.dmp

        Filesize

        4KB

      • memory/3192-19-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3192-34-0x0000000002280000-0x00000000022E6000-memory.dmp

        Filesize

        408KB

      • memory/3444-5-0x0000000006D00000-0x0000000006D16000-memory.dmp

        Filesize

        88KB