Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 18:10

General

  • Target

    684bcee9dcb5326013108c4f4fb40dce8d98bc937a00b64e9d9f9754d0c78377.exe

  • Size

    311KB

  • MD5

    6842403982c36b6c450fde3035eb7043

  • SHA1

    d40806e8623b10811703aadf27d5b055da6e98a5

  • SHA256

    684bcee9dcb5326013108c4f4fb40dce8d98bc937a00b64e9d9f9754d0c78377

  • SHA512

    2d10d7bb85475a86f85019228a88cebf0da92ed5cb24102facbb34a875f3666d0ebf0783b1db1b996f2087feb672f337e91cb72c8b899c632496344a42e4ab37

  • SSDEEP

    3072:uQLPli/LX0eRJibugxk++1iyvoBgDym4BV9JxNcdOOQVmRZ+pfTK7KVDrc+B5f2B:uQLPwkvB+iIoBoSVPW3ofTgYn79oUq

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Disables taskbar notifications via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • NSIS installer 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • NTFS ADS 2 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\684bcee9dcb5326013108c4f4fb40dce8d98bc937a00b64e9d9f9754d0c78377.exe
    "C:\Users\Admin\AppData\Local\Temp\684bcee9dcb5326013108c4f4fb40dce8d98bc937a00b64e9d9f9754d0c78377.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2108
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\5EB3.exe
      C:\Users\Admin\AppData\Local\Temp\5EB3.exe
      2⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • NTFS ADS
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Users\Admin\AppData\Local\Temp\97e5koc9k15_1.exe
          /suac
          4⤵
          • Modifies firewall policy service
          • Sets file execution options in registry
          • Executes dropped EXE
          • Checks for any installed AV software in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Windows\SysWOW64\regedit.exe
            "C:\Windows\SysWOW64\regedit.exe"
            5⤵
            • Modifies security service
            • Sets file execution options in registry
            • Sets service image path in registry
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:1620
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\97E5KO~1.EXE" /RL HIGHEST
            5⤵
            • Creates scheduled task(s)
            PID:1524
    • C:\Users\Admin\AppData\Local\Temp\6394.exe
      C:\Users\Admin\AppData\Local\Temp\6394.exe
      2⤵
      • Executes dropped EXE
      PID:2824
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1172
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:2912

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5EB3.exe

        Filesize

        360KB

        MD5

        80c413180b6bd0dd664adc4e0665b494

        SHA1

        e791e4a3391fc6b7bcb58399cd4fa3c52a06b940

        SHA256

        6d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880

        SHA512

        347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a

      • C:\Users\Admin\AppData\Local\Temp\6394.exe

        Filesize

        352KB

        MD5

        30d18c0408b46035627a2c98856b1016

        SHA1

        05ac7712ceaebbc700dbb5eb48f71fc5cfd969a3

        SHA256

        acf81e7741158976f648e3a2a58cb670df1df138c52606b195cbd685fe1eb8ba

        SHA512

        134c48fb6e390e9c80612c7297c83da8a13ac18b7af01018846e89c44e02339a5a5f8003e1e0b175ff2420cf12fe0f645d7130c292c933163099f2c217f903cf

      • C:\Users\Admin\AppData\Local\Temp\6394.exe

        Filesize

        430KB

        MD5

        429f4fb6c635e0b8fb9d156ab5029432

        SHA1

        16d2a1d62039ef4777240f56ceae86ebaf0ac557

        SHA256

        5d2dfc056b5883fc6e7b47855a16d2fdb90276b3f3d69fa412939bbcdfa35614

        SHA512

        22454b659319e9155ca17044dc296b9d984ba6062f08fd052c787b86c1b48e34fe6d5b420d8a9dc621363b543884e2ce15db2eec88bbbb16f2c76d908d59fef2

      • C:\Users\Admin\AppData\Local\Temp\6394.exe

        Filesize

        410KB

        MD5

        384df6477cba1f52dcced9e465ab3064

        SHA1

        104875925c94358b4901c7efe94e7c610b4af9bf

        SHA256

        fdd447767a80c1af7105a629657cc1c744f39433c62486697497d485b8b9c4b9

        SHA512

        84ef8a6ab128ce0ff4a6a4c784fd8b6b57abe80e191e04b7bcc3a293df25657d83cd8e70fc150fe5dbb85b3be2584fbd2f65c0b1783abb52f4d5feeb9d28e832

      • C:\Users\Admin\AppData\Roaming\eigvecc

        Filesize

        311KB

        MD5

        6842403982c36b6c450fde3035eb7043

        SHA1

        d40806e8623b10811703aadf27d5b055da6e98a5

        SHA256

        684bcee9dcb5326013108c4f4fb40dce8d98bc937a00b64e9d9f9754d0c78377

        SHA512

        2d10d7bb85475a86f85019228a88cebf0da92ed5cb24102facbb34a875f3666d0ebf0783b1db1b996f2087feb672f337e91cb72c8b899c632496344a42e4ab37

      • memory/1200-4-0x0000000003A20000-0x0000000003A36000-memory.dmp

        Filesize

        88KB

      • memory/1200-96-0x0000000003030000-0x0000000003031000-memory.dmp

        Filesize

        4KB

      • memory/1200-62-0x0000000077961000-0x0000000077962000-memory.dmp

        Filesize

        4KB

      • memory/1620-102-0x0000000000260000-0x00000000002C6000-memory.dmp

        Filesize

        408KB

      • memory/1620-104-0x0000000000260000-0x00000000002C5000-memory.dmp

        Filesize

        404KB

      • memory/1620-105-0x00000000000D0000-0x00000000000DB000-memory.dmp

        Filesize

        44KB

      • memory/1620-101-0x0000000000260000-0x00000000002C6000-memory.dmp

        Filesize

        408KB

      • memory/1824-91-0x0000000000230000-0x0000000000236000-memory.dmp

        Filesize

        24KB

      • memory/1824-88-0x0000000001CD0000-0x0000000001D36000-memory.dmp

        Filesize

        408KB

      • memory/1824-93-0x0000000001DC0000-0x0000000001DCC000-memory.dmp

        Filesize

        48KB

      • memory/1824-92-0x0000000001CD0000-0x0000000001D36000-memory.dmp

        Filesize

        408KB

      • memory/1824-89-0x0000000001CD0000-0x0000000001D36000-memory.dmp

        Filesize

        408KB

      • memory/1824-107-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/1824-109-0x0000000000230000-0x0000000000236000-memory.dmp

        Filesize

        24KB

      • memory/1824-108-0x0000000001CD0000-0x0000000001D36000-memory.dmp

        Filesize

        408KB

      • memory/2108-5-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2108-1-0x0000000000560000-0x0000000000660000-memory.dmp

        Filesize

        1024KB

      • memory/2108-3-0x0000000000400000-0x0000000000454000-memory.dmp

        Filesize

        336KB

      • memory/2108-2-0x0000000000220000-0x0000000000229000-memory.dmp

        Filesize

        36KB

      • memory/2696-18-0x0000000000010000-0x000000000006D000-memory.dmp

        Filesize

        372KB

      • memory/2696-22-0x0000000000430000-0x0000000000496000-memory.dmp

        Filesize

        408KB

      • memory/2696-24-0x0000000077B00000-0x0000000077B01000-memory.dmp

        Filesize

        4KB

      • memory/2696-25-0x0000000000550000-0x0000000000551000-memory.dmp

        Filesize

        4KB

      • memory/2696-26-0x0000000001EF0000-0x0000000001EFC000-memory.dmp

        Filesize

        48KB

      • memory/2696-27-0x0000000000430000-0x0000000000496000-memory.dmp

        Filesize

        408KB

      • memory/2696-28-0x0000000000430000-0x0000000000496000-memory.dmp

        Filesize

        408KB

      • memory/2696-21-0x00000000003A0000-0x00000000003AD000-memory.dmp

        Filesize

        52KB

      • memory/2696-39-0x0000000000430000-0x0000000000496000-memory.dmp

        Filesize

        408KB

      • memory/2696-38-0x0000000000390000-0x0000000000396000-memory.dmp

        Filesize

        24KB

      • memory/2696-37-0x0000000000570000-0x0000000000571000-memory.dmp

        Filesize

        4KB

      • memory/2696-20-0x0000000000390000-0x0000000000396000-memory.dmp

        Filesize

        24KB

      • memory/2696-19-0x0000000000430000-0x0000000000496000-memory.dmp

        Filesize

        408KB

      • memory/2712-57-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-85-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-59-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-34-0x00000000001F0000-0x00000000001F6000-memory.dmp

        Filesize

        24KB

      • memory/2712-61-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-60-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-63-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-64-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-65-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-67-0x0000000077910000-0x0000000077AB9000-memory.dmp

        Filesize

        1.7MB

      • memory/2712-66-0x00000000001F0000-0x00000000001F6000-memory.dmp

        Filesize

        24KB

      • memory/2712-68-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2712-70-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-69-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-72-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-71-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-73-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-75-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-111-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-58-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-87-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2712-35-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-41-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-50-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2712-51-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-56-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2712-94-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-54-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2712-30-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-100-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-53-0x00000000004A0000-0x00000000004AC000-memory.dmp

        Filesize

        48KB

      • memory/2712-48-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-31-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-32-0x0000000077AF0000-0x0000000077C71000-memory.dmp

        Filesize

        1.5MB

      • memory/2712-33-0x00000000000D0000-0x0000000000194000-memory.dmp

        Filesize

        784KB

      • memory/2824-49-0x0000000000A50000-0x0000000000FE6000-memory.dmp

        Filesize

        5.6MB

      • memory/2824-55-0x0000000000A50000-0x0000000000FE6000-memory.dmp

        Filesize

        5.6MB

      • memory/2912-76-0x0000000077961000-0x0000000077962000-memory.dmp

        Filesize

        4KB