Analysis
-
max time kernel
300s -
max time network
238s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe
Resource
win10-20231215-en
General
-
Target
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe
-
Size
172KB
-
MD5
3b37f011e11c5cc80ecaed20de1e9cef
-
SHA1
5d76f95fc61c279d25bbb989991d2e319212386c
-
SHA256
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668
-
SHA512
24b4caf8117e145294ac3d0fea9cb6af2a38107c4ae72494e8ead298547c2ff68a4edc20221d6511a790d73e517f5449c3d7d9fd4364666d228c80e516ab1e01
-
SSDEEP
3072:wAtL2vJQNJf0yslZZOAFW3K+6Pr01weTS65ihx6TN45:wOLeJQv0nG03Pr0yFh7
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 37 1360 rundll32.exe 42 2544 rundll32.exe 47 2724 rundll32.exe -
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1268 Process not Found -
Executes dropped EXE 7 IoCs
pid Process 2688 tevbsjr 2604 1610.exe 2556 Utsysc.exe 2136 Utsysc.exe 836 Utsysc.exe 1696 Utsysc.exe 480 Utsysc.exe -
Loads dropped DLL 44 IoCs
pid Process 2604 1610.exe 2604 1610.exe 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2456 WerFault.exe 2456 WerFault.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 268 rundll32.exe 268 rundll32.exe 268 rundll32.exe 268 rundll32.exe 2108 WerFault.exe 2108 WerFault.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1656 WerFault.exe 1656 WerFault.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 2544 rundll32.exe 2544 rundll32.exe 2544 rundll32.exe 2544 rundll32.exe 2724 rundll32.exe 2724 rundll32.exe 2724 rundll32.exe 2724 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tevbsjr Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tevbsjr Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tevbsjr -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe 3000 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3000 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe 2688 tevbsjr -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1268 Process not Found Token: SeShutdownPrivilege 1268 Process not Found Token: SeShutdownPrivilege 1268 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 1610.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2688 2744 taskeng.exe 31 PID 2744 wrote to memory of 2688 2744 taskeng.exe 31 PID 2744 wrote to memory of 2688 2744 taskeng.exe 31 PID 2744 wrote to memory of 2688 2744 taskeng.exe 31 PID 1268 wrote to memory of 2604 1268 Process not Found 32 PID 1268 wrote to memory of 2604 1268 Process not Found 32 PID 1268 wrote to memory of 2604 1268 Process not Found 32 PID 1268 wrote to memory of 2604 1268 Process not Found 32 PID 2604 wrote to memory of 2556 2604 1610.exe 33 PID 2604 wrote to memory of 2556 2604 1610.exe 33 PID 2604 wrote to memory of 2556 2604 1610.exe 33 PID 2604 wrote to memory of 2556 2604 1610.exe 33 PID 2556 wrote to memory of 2632 2556 Utsysc.exe 34 PID 2556 wrote to memory of 2632 2556 Utsysc.exe 34 PID 2556 wrote to memory of 2632 2556 Utsysc.exe 34 PID 2556 wrote to memory of 2632 2556 Utsysc.exe 34 PID 2556 wrote to memory of 1508 2556 Utsysc.exe 38 PID 2556 wrote to memory of 1508 2556 Utsysc.exe 38 PID 2556 wrote to memory of 1508 2556 Utsysc.exe 38 PID 2556 wrote to memory of 1508 2556 Utsysc.exe 38 PID 2556 wrote to memory of 1508 2556 Utsysc.exe 38 PID 2556 wrote to memory of 1508 2556 Utsysc.exe 38 PID 2556 wrote to memory of 1508 2556 Utsysc.exe 38 PID 1508 wrote to memory of 2668 1508 rundll32.exe 39 PID 1508 wrote to memory of 2668 1508 rundll32.exe 39 PID 1508 wrote to memory of 2668 1508 rundll32.exe 39 PID 1508 wrote to memory of 2668 1508 rundll32.exe 39 PID 2668 wrote to memory of 2456 2668 rundll32.exe 40 PID 2668 wrote to memory of 2456 2668 rundll32.exe 40 PID 2668 wrote to memory of 2456 2668 rundll32.exe 40 PID 2556 wrote to memory of 2128 2556 Utsysc.exe 41 PID 2556 wrote to memory of 2128 2556 Utsysc.exe 41 PID 2556 wrote to memory of 2128 2556 Utsysc.exe 41 PID 2556 wrote to memory of 2128 2556 Utsysc.exe 41 PID 2556 wrote to memory of 2128 2556 Utsysc.exe 41 PID 2556 wrote to memory of 2128 2556 Utsysc.exe 41 PID 2556 wrote to memory of 2128 2556 Utsysc.exe 41 PID 2128 wrote to memory of 268 2128 rundll32.exe 42 PID 2128 wrote to memory of 268 2128 rundll32.exe 42 PID 2128 wrote to memory of 268 2128 rundll32.exe 42 PID 2128 wrote to memory of 268 2128 rundll32.exe 42 PID 268 wrote to memory of 2108 268 rundll32.exe 43 PID 268 wrote to memory of 2108 268 rundll32.exe 43 PID 268 wrote to memory of 2108 268 rundll32.exe 43 PID 2556 wrote to memory of 2020 2556 Utsysc.exe 44 PID 2556 wrote to memory of 2020 2556 Utsysc.exe 44 PID 2556 wrote to memory of 2020 2556 Utsysc.exe 44 PID 2556 wrote to memory of 2020 2556 Utsysc.exe 44 PID 2556 wrote to memory of 2020 2556 Utsysc.exe 44 PID 2556 wrote to memory of 2020 2556 Utsysc.exe 44 PID 2556 wrote to memory of 2020 2556 Utsysc.exe 44 PID 2020 wrote to memory of 1828 2020 rundll32.exe 45 PID 2020 wrote to memory of 1828 2020 rundll32.exe 45 PID 2020 wrote to memory of 1828 2020 rundll32.exe 45 PID 2020 wrote to memory of 1828 2020 rundll32.exe 45 PID 1828 wrote to memory of 1656 1828 rundll32.exe 46 PID 1828 wrote to memory of 1656 1828 rundll32.exe 46 PID 1828 wrote to memory of 1656 1828 rundll32.exe 46 PID 2556 wrote to memory of 1360 2556 Utsysc.exe 47 PID 2556 wrote to memory of 1360 2556 Utsysc.exe 47 PID 2556 wrote to memory of 1360 2556 Utsysc.exe 47 PID 2556 wrote to memory of 1360 2556 Utsysc.exe 47 PID 2556 wrote to memory of 1360 2556 Utsysc.exe 47 PID 2556 wrote to memory of 1360 2556 Utsysc.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe"C:\Users\Admin\AppData\Local\Temp\396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3000
-
C:\Windows\system32\taskeng.exetaskeng.exe {04B07B5F-CF1F-405C-B307-A89989DDF3F6} S-1-5-21-3427588347-1492276948-3422228430-1000:QVMRJQQO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\tevbsjrC:\Users\Admin\AppData\Roaming\tevbsjr2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe2⤵
- Executes dropped EXE
PID:480
-
-
C:\Users\Admin\AppData\Local\Temp\1610.exeC:\Users\Admin\AppData\Local\Temp\1610.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2632
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2668 -s 3125⤵
- Loads dropped DLL
PID:2456
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 268 -s 3125⤵
- Loads dropped DLL
PID:2108
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1828 -s 3125⤵
- Loads dropped DLL
PID:1656
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1360
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2544
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD51d13f9a72c0c42ab2f1a5ee792230a53
SHA1e0f1a220aa315c974be5b09d8c465df2148a05b3
SHA256bbde834932f9d11fa3f1952a0a186b2c0d6c2937a16f4f811b5c709d5a340292
SHA512421175066b01617e58ecb996ed882b62f9af3c8414ef8964ac30f7701ff2f0356fcc35dea5b25240b90bdbc5470092e3b8ec463eb6efdbef22c702befa5030ea
-
Filesize
63KB
MD52f872309ee843f784277ac15f0e667b5
SHA166701f25d04392fde6027a3879fde958e74a38dc
SHA256c226544ad4ed32ce323c9df9f3f866b75a65f2898b563cb5c1a163b7c704a384
SHA512d09f6b8cd9455c009ba5a70667494c561d173b5b32c5d2c1a0c4b7cb0829f526ba6d8e4340696649921021b9f7189c1a241d9d43b9a825261d627a56ab100711
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
1.1MB
MD5f01f5bc76b9596e0cfeab8a272cba3a5
SHA119cab1291e4e518ae636f2fb3d41567e4e6e4722
SHA25683ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938
SHA512ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63
-
Filesize
172KB
MD53b37f011e11c5cc80ecaed20de1e9cef
SHA15d76f95fc61c279d25bbb989991d2e319212386c
SHA256396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668
SHA51224b4caf8117e145294ac3d0fea9cb6af2a38107c4ae72494e8ead298547c2ff68a4edc20221d6511a790d73e517f5449c3d7d9fd4364666d228c80e516ab1e01