Analysis

  • max time kernel
    300s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 03:39

General

  • Target

    496c9e3dca599f72f707270424f07ccd3037e419d7fed441e699db0c14140de1.exe

  • Size

    294KB

  • MD5

    99ea8a333d23ec742ec8a7263b1eae56

  • SHA1

    6ee2160e4f2959b10e841a5257bf84d639cea728

  • SHA256

    496c9e3dca599f72f707270424f07ccd3037e419d7fed441e699db0c14140de1

  • SHA512

    4325985432a557b19e80a5b3e8ad9043208496adbb5e7f76924d81720f3abcb6190b9c687fd1927403fd61b78a7bc93f07f8f83063d6104c993c2f58a2198b4b

  • SSDEEP

    6144:Y1uHh8eVTJQ4JRs43u9TmxhXDqJjBPfaP:iCVTJQ4PshmWtBnaP

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://humydrole.com/tmp/index.php

http://trunk-co.ru/tmp/index.php

http://weareelight.com/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.14

C2

http://anfesq.com

http://cbinr.com

http://rimakc.ru

Attributes
  • install_dir

    68fd3d7ade

  • install_file

    Utsysc.exe

  • strings_key

    27ec7fd6f50f63b8af0c1d3deefcc8fe

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\496c9e3dca599f72f707270424f07ccd3037e419d7fed441e699db0c14140de1.exe
    "C:\Users\Admin\AppData\Local\Temp\496c9e3dca599f72f707270424f07ccd3037e419d7fed441e699db0c14140de1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2608
  • C:\Users\Admin\AppData\Local\Temp\925.exe
    C:\Users\Admin\AppData\Local\Temp\925.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:620
  • C:\Windows\SysWOW64\schtasks.exe
    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F
    1⤵
    • Creates scheduled task(s)
    PID:864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 248
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:1344
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {82EFD351-1557-4753-9EFC-170AA1EA9D90} S-1-5-21-1268429524-3929314613-1992311491-1000:XBTLDBHN\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:2200
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:2980
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:2844
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:2028
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          11KB

          MD5

          0e4478c3fc345883f65dbd7158fe4e33

          SHA1

          168d947195c1a35845813270f1c57786a6511792

          SHA256

          157a5b6c177e500ee7716fded9ac4901b72082338f11c7679d0435d6f412cc30

          SHA512

          b061036c3158500fd44440c9323903298634e826e479672e5a313fb5ba3f31de03717b8400959a8191bea5e91ad9618abbb14d5b1ff5864c14ea3be397ec3552

        • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          469KB

          MD5

          555b5949f8a9f335d16e1749746c1b27

          SHA1

          ded7c6a6024506869475e4a9c3ce2570e921e61a

          SHA256

          6410bc60052f38e9f58873a2241a3cdab6cc178c8f7ab05912991f6112e0c862

          SHA512

          b86f1a0f73862403cc158fa16b013145e12ea86bfd2ef42d97f81051209c46711fdc503162c7e201eb8ddc62e948320de9d3ab20ff1ccc0e5c2ce5aee997ce02

        • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          427KB

          MD5

          c97e14573e40a432360f23865bfc530f

          SHA1

          f41c03f5ec3530ab0581fa6cff58cac76172bb90

          SHA256

          1ae25a140f71966641cd59b08adeb4fb093daf3f8249b59c7bba2dc9b9954609

          SHA512

          7c4b9c846ade08d00cbef5852353345693b9a67424f1f8248b6f6d72da568489ff86c7d5af47abf837d72ccff5fe68c8a17af739aa7e2f9d47026fc1f1d23a8a

        • C:\Users\Admin\AppData\Local\Temp\925.exe

          Filesize

          121KB

          MD5

          3eab8fa8214dfa9a3edcb4940ab85039

          SHA1

          54b7cecf6789676b40aaad13ad486e4fd4694584

          SHA256

          5b417dd7a992d40616bd7891fbd37e3ca803cce2e0daaa23e5b194728f54a4d2

          SHA512

          355da234175adc004e38ec1398a6e9b8dcea6821909934e7f60dfae85cef66d0fe918922b79b06e963a4b21abd05ce1469bfde243fda77b1a97f3f8d783fa981

        • C:\Users\Admin\AppData\Local\Temp\925.exe

          Filesize

          50KB

          MD5

          825154cf12f85d39bb641debad83c2dd

          SHA1

          d2e0dcc64fa45d19b31978b3277319c30466a6c4

          SHA256

          eb28c0a01076973fe1ac339f97d310f97eeb130dc14d401e977b8000fc886e25

          SHA512

          a121ad388eb70b059235aa8548fb6a6824589b98a956b690d70de4cdf3808fa219c516e35029186b19467a1904a10a978e581fb7b36b21f8e852a993365e5cb7

        • C:\Users\Admin\AppData\Local\Temp\925.exe

          Filesize

          29KB

          MD5

          e96135086c9310ac1cefc67d9e33d49e

          SHA1

          1b2f692e364b721397a3bb2b8ee1a2260bbc4fea

          SHA256

          9fb4231e35b45315c895976fbd967adf75e816fb4c6b20995122384eeb2a4357

          SHA512

          b507f4f42a85f6f6c845b1efbe2bf18a6d2393ec8d791666bb4aaa14f1f77ab15965624b53de34b7d0faccbd1b4cddcab20bb2e9fa13a2412c121ba743eb9474

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          53KB

          MD5

          f37d7661a711fb0f47860fcb39ad69f9

          SHA1

          e4040ece30a073d7b1a85c87cd14b0df0eb17c54

          SHA256

          3c2bfacbea581209087602932831d23c51f1f7933e2ec1ad1e94864b7b07466e

          SHA512

          793709ac1c091811469e8b56812ad604ecfbd480f8984a5a97e7c423b5b23ecd50203462479ad58c743dd7b68fbac72d2449ac9602c9dd718cca89990e879968

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          133KB

          MD5

          e0e85a5cf5ac5232ef92e7fd103999be

          SHA1

          46c1491f896e4c1ebac152544e72bb16c44e93f8

          SHA256

          3fb1a6c37d5ef68326c618e69a32d19a5b60cfbfb2b0c1a9542a7c09446ebd10

          SHA512

          569ca424f7bfb471db864fcd1bb97de1854acf0c8c846fef6bbea036e329fcb70b79338e657a38961f0ff63b368694579ab1e686d10f04705652436f9002f0f6

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          47KB

          MD5

          6de02ee87e1ae4438c94b3c14e2cc025

          SHA1

          2659d899ad5832db8902924406f1d782f780f061

          SHA256

          94f2a0a9614aa872a4993a485e01b3dcf048f3353c35478b11270a24c909e25b

          SHA512

          b5e6d6b8ad8b2010e2ca0de887c2eff8c411eedce54a95c16594a3a4d30a135e277779b97beb5044f383a686cdf09a139131fa597eda7761f6d590fee3db885d

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          10KB

          MD5

          64b45efed60e6f8412b84d0961b2c00f

          SHA1

          eb5a6862b79beb5560143c8a5a8a24636c5ac7f0

          SHA256

          9e83272b88a418a39a0db8232d6064c081351024b0af36937732e3bd76caa175

          SHA512

          2ee93e1a422c1f797aef1271becb50225cd84abc09e1926933cd833951063928b268c25553b7a82623443ffbf8094b923a9a778ecee9171ccef726a38f8b80f2

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          8KB

          MD5

          c5ad7ac92949511cf4afccef67fd21aa

          SHA1

          683d1443a887114df520ab9e2b5cedd94cedb82d

          SHA256

          3e3125c88020292ff7ccc4feeaa97ce0039837c8a2cfc80d527f12190ca9bc0c

          SHA512

          77bb4b4a676666afcbe61a0150605d897ff067c821c21814ee26ec7fd806185606222bea5276209f1830b2ebd3d5882a9e1187ce21a8a18dac35f02ada1a4067

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          1KB

          MD5

          d9f9a6ffe3ec74093a3d0123bf843233

          SHA1

          281e5f062ef74923978c73dcdefdac85be051490

          SHA256

          557f5c8ce6f543153b5acd06c40d0ae87fd2493be551d94145fe48d8f4c630ff

          SHA512

          8e0d8ca4bdd93715bbc9fb831bde9484f5b5acc772f444fc191b9c61231527d7a2b813e7c9be0c336763621369bf3fcb6c5229205571ca01f59872a61d451cef

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          24KB

          MD5

          c4502da7ce3fcc9357257ee0c4806d86

          SHA1

          e6e685978f744642232e21d4e4c5820c340837a0

          SHA256

          8304c565da21aad570f46a28d3af4687fec5e9f637e2eb1ccf2f9d132a28dac5

          SHA512

          064c24ff63424badd51b64cacac751a8f7e91048f2f8e931ca5cb8497b8119c6d38967d5231d42a80f57a7cda3da1aad403b287daa3d4bd6381ec0a370a55450

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          28KB

          MD5

          ed8d1dd75cdc9060b7229bba35c726ac

          SHA1

          93a54baad3f8c7785aa70c3855aeb713b9802c9e

          SHA256

          f96e917c90476482197efdc809f60c08c10ea1e1e2ef98471558054510767130

          SHA512

          1235fac2656e24bc333cd600098ad672f2fd400932ec7b2ebe25bc8b0c707cc79e4373936d81245c3178e1280796bbc162ddb21969803d38b5c3b20a65557eac

        • \Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe

          Filesize

          51KB

          MD5

          b0002537e428ccab72e2e2209a3f78b9

          SHA1

          480b2cb6d867a09f0e415c491547a2ebee152ddf

          SHA256

          f2cd5af4f6aeaa0967e299d429e66fb97b4d9f6db1acfdc3276349575ed8568c

          SHA512

          02057a31983836694e46746441ec66c6c571548cf68315373d1dd89b7b362fd883f6303fb2f871741bd7d2d3b3f0ed6a702d42151ab6c69cf47656085a55b459

        • memory/620-54-0x0000000000530000-0x0000000000630000-memory.dmp

          Filesize

          1024KB

        • memory/620-38-0x0000000000530000-0x0000000000630000-memory.dmp

          Filesize

          1024KB

        • memory/620-47-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/620-39-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/1180-4-0x0000000002A90000-0x0000000002AA6000-memory.dmp

          Filesize

          88KB

        • memory/2028-84-0x00000000005D0000-0x00000000006D0000-memory.dmp

          Filesize

          1024KB

        • memory/2028-83-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2028-87-0x00000000005D0000-0x00000000006D0000-memory.dmp

          Filesize

          1024KB

        • memory/2200-51-0x00000000002F0000-0x00000000003F0000-memory.dmp

          Filesize

          1024KB

        • memory/2200-53-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2608-1-0x0000000000930000-0x0000000000A30000-memory.dmp

          Filesize

          1024KB

        • memory/2608-3-0x0000000000400000-0x00000000007D3000-memory.dmp

          Filesize

          3.8MB

        • memory/2608-2-0x0000000000220000-0x000000000022B000-memory.dmp

          Filesize

          44KB

        • memory/2608-5-0x0000000000400000-0x00000000007D3000-memory.dmp

          Filesize

          3.8MB

        • memory/2636-20-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2636-19-0x00000000002B0000-0x000000000031F000-memory.dmp

          Filesize

          444KB

        • memory/2636-18-0x0000000000500000-0x0000000000600000-memory.dmp

          Filesize

          1024KB

        • memory/2636-21-0x0000000002650000-0x0000000002651000-memory.dmp

          Filesize

          4KB

        • memory/2636-34-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2636-36-0x00000000002B0000-0x000000000031F000-memory.dmp

          Filesize

          444KB

        • memory/2636-35-0x0000000000500000-0x0000000000600000-memory.dmp

          Filesize

          1024KB

        • memory/2740-94-0x0000000000570000-0x0000000000670000-memory.dmp

          Filesize

          1024KB

        • memory/2740-95-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2844-74-0x00000000005D0000-0x00000000006D0000-memory.dmp

          Filesize

          1024KB

        • memory/2844-73-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2980-64-0x0000000000273000-0x00000000002AD000-memory.dmp

          Filesize

          232KB

        • memory/2980-63-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB