Analysis
-
max time kernel
288s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
02/02/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe
Resource
win10-20231215-en
General
-
Target
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe
-
Size
172KB
-
MD5
3b37f011e11c5cc80ecaed20de1e9cef
-
SHA1
5d76f95fc61c279d25bbb989991d2e319212386c
-
SHA256
396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668
-
SHA512
24b4caf8117e145294ac3d0fea9cb6af2a38107c4ae72494e8ead298547c2ff68a4edc20221d6511a790d73e517f5449c3d7d9fd4364666d228c80e516ab1e01
-
SSDEEP
3072:wAtL2vJQNJf0yslZZOAFW3K+6Pr01weTS65ihx6TN45:wOLeJQv0nG03Pr0yFh7
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://sjyey.com/tmp/index.php
http://babonwo.ru/tmp/index.php
http://mth.com.ua/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
amadey
4.14
http://anfesq.com
http://cbinr.com
http://rimakc.ru
-
install_dir
68fd3d7ade
-
install_file
Utsysc.exe
-
strings_key
27ec7fd6f50f63b8af0c1d3deefcc8fe
-
url_paths
/forum/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 3272 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 4356 gwvgfis 1960 37E4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 732 1960 WerFault.exe 74 4184 1960 WerFault.exe 74 4024 1960 WerFault.exe 74 4540 1960 WerFault.exe 74 2728 1960 WerFault.exe 74 4676 1960 WerFault.exe 74 5080 1960 WerFault.exe 74 2024 1960 WerFault.exe 74 4028 1960 WerFault.exe 74 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gwvgfis Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gwvgfis Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gwvgfis -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4516 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe 4516 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found 3272 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4516 396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe 4356 gwvgfis -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found Token: SeShutdownPrivilege 3272 Process not Found Token: SeCreatePagefilePrivilege 3272 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3272 wrote to memory of 1960 3272 Process not Found 74 PID 3272 wrote to memory of 1960 3272 Process not Found 74 PID 3272 wrote to memory of 1960 3272 Process not Found 74 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe"C:\Users\Admin\AppData\Local\Temp\396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4516
-
C:\Users\Admin\AppData\Roaming\gwvgfisC:\Users\Admin\AppData\Roaming\gwvgfis1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4356
-
C:\Users\Admin\AppData\Local\Temp\37E4.exeC:\Users\Admin\AppData\Local\Temp\37E4.exe1⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 5602⤵
- Program crash
PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 6362⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7682⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7762⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 8042⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7322⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 10442⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 10722⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 10082⤵
- Program crash
PID:4028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD51d13f9a72c0c42ab2f1a5ee792230a53
SHA1e0f1a220aa315c974be5b09d8c465df2148a05b3
SHA256bbde834932f9d11fa3f1952a0a186b2c0d6c2937a16f4f811b5c709d5a340292
SHA512421175066b01617e58ecb996ed882b62f9af3c8414ef8964ac30f7701ff2f0356fcc35dea5b25240b90bdbc5470092e3b8ec463eb6efdbef22c702befa5030ea
-
Filesize
172KB
MD53b37f011e11c5cc80ecaed20de1e9cef
SHA15d76f95fc61c279d25bbb989991d2e319212386c
SHA256396d8d11ef9b4a8817cd4ea51de19407d9c98a9696ddf7c8a5d28f29c856a668
SHA51224b4caf8117e145294ac3d0fea9cb6af2a38107c4ae72494e8ead298547c2ff68a4edc20221d6511a790d73e517f5449c3d7d9fd4364666d228c80e516ab1e01