Analysis
-
max time kernel
300s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-02-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe
Resource
win10-20240214-en
General
-
Target
3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe
-
Size
286KB
-
MD5
b70a1bd49d4133d98946486d4ec6bb36
-
SHA1
9feed9636e3a411bd1d2a3e80e713fe53376d9c4
-
SHA256
3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede
-
SHA512
880b427c04cd532f7f49f496c5fb1f3a4244757deff6495c2b20d7b19631dd296a9a04ae968d9f3d51f3b022ea4c4d16a57e7c2a215c9a0b053b96dcfb290441
-
SSDEEP
3072:ufWRCy/dqG9gUvXg+CqJixR0/IJJQ79eh8o8EskJw64QO1N3:uCCy/PJZKWIJJL5j1O1N
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ E071.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E071.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E071.exe -
Deletes itself 1 IoCs
pid Process 1380 Process not Found -
Executes dropped EXE 5 IoCs
pid Process 2164 7224.exe 2728 C534.exe 1316 E071.exe 2080 E4E5.exe 2096 hiwuevt -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine E071.exe -
Loads dropped DLL 5 IoCs
pid Process 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1316 E071.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job E071.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1676 2728 WerFault.exe 29 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7224.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7224.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7224.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hiwuevt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hiwuevt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hiwuevt -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1632 3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe 1632 3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1632 3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe 2164 7224.exe 2096 hiwuevt -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1380 Process not Found Token: SeShutdownPrivilege 1380 Process not Found -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1380 Process not Found 1380 Process not Found 1316 E071.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1380 Process not Found 1380 Process not Found -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2164 1380 Process not Found 28 PID 1380 wrote to memory of 2164 1380 Process not Found 28 PID 1380 wrote to memory of 2164 1380 Process not Found 28 PID 1380 wrote to memory of 2164 1380 Process not Found 28 PID 1380 wrote to memory of 2728 1380 Process not Found 29 PID 1380 wrote to memory of 2728 1380 Process not Found 29 PID 1380 wrote to memory of 2728 1380 Process not Found 29 PID 1380 wrote to memory of 2728 1380 Process not Found 29 PID 2728 wrote to memory of 1676 2728 C534.exe 30 PID 2728 wrote to memory of 1676 2728 C534.exe 30 PID 2728 wrote to memory of 1676 2728 C534.exe 30 PID 2728 wrote to memory of 1676 2728 C534.exe 30 PID 1380 wrote to memory of 2704 1380 Process not Found 32 PID 1380 wrote to memory of 2704 1380 Process not Found 32 PID 1380 wrote to memory of 2704 1380 Process not Found 32 PID 2704 wrote to memory of 1976 2704 cmd.exe 33 PID 2704 wrote to memory of 1976 2704 cmd.exe 33 PID 2704 wrote to memory of 1976 2704 cmd.exe 33 PID 1380 wrote to memory of 1316 1380 Process not Found 36 PID 1380 wrote to memory of 1316 1380 Process not Found 36 PID 1380 wrote to memory of 1316 1380 Process not Found 36 PID 1380 wrote to memory of 1316 1380 Process not Found 36 PID 1380 wrote to memory of 2080 1380 Process not Found 37 PID 1380 wrote to memory of 2080 1380 Process not Found 37 PID 1380 wrote to memory of 2080 1380 Process not Found 37 PID 1380 wrote to memory of 2080 1380 Process not Found 37 PID 1624 wrote to memory of 2096 1624 taskeng.exe 39 PID 1624 wrote to memory of 2096 1624 taskeng.exe 39 PID 1624 wrote to memory of 2096 1624 taskeng.exe 39 PID 1624 wrote to memory of 2096 1624 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe"C:\Users\Admin\AppData\Local\Temp\3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1632
-
C:\Users\Admin\AppData\Local\Temp\7224.exeC:\Users\Admin\AppData\Local\Temp\7224.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2164
-
C:\Users\Admin\AppData\Local\Temp\C534.exeC:\Users\Admin\AppData\Local\Temp\C534.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 962⤵
- Loads dropped DLL
- Program crash
PID:1676
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CA63.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\E071.exeC:\Users\Admin\AppData\Local\Temp\E071.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:1316
-
C:\Users\Admin\AppData\Local\Temp\E4E5.exeC:\Users\Admin\AppData\Local\Temp\E4E5.exe1⤵
- Executes dropped EXE
PID:2080
-
C:\Windows\system32\taskeng.exetaskeng.exe {C376B137-08BD-4668-8444-0FE3C3F5AF8F} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\hiwuevtC:\Users\Admin\AppData\Roaming\hiwuevt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530bf54977db8781722ac8aefa312d5ad
SHA11a0f8eb463a9b57e9088e44d51e1cd56fea22e7b
SHA2560c3bc27398cdaaa63a8ff165e430df0bf6639a862c9634d85a54088a542b8144
SHA512b20df583ce0f2765026667cf0f7dc3f0938ab49f384e4fb9b44347af0c1eed29b048005337962609a6f66dcf75bc881efb9c47a357bbcdc812ca8047b5082c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5041fe502a0e57a3fdbc1e0860c7debb7
SHA181733995729ce55deaa4ad8c5fca619b25bd31ed
SHA25609206ee582d981894533f3416411ad2f9a45f309f2a88e649188f071ffacfffd
SHA5127aff2dc3161d1bb54b5ac2fc3945dc5b8c0adb87233dde9ed0acaf65c04fe2aae4a7d297974598dd9a2861c4656658b053df8a53090e5b0387649f9f862beb5c
-
Filesize
259KB
MD55ead0a4dc3bf605775d48f0442ba371e
SHA136250ca49ef272946f09e442a65625bbde8ce714
SHA2564f61b6ed6fa23715adf50cd5f3a74a427fc65006404338d9d9ad242d02f1222f
SHA51206f479022c5cb1de9fa5ae96766f8b35c8e692bb86f7bfad4fa583a65b0b44f68ce0b895f9845b55b02b49a02462377561a3d06eed00ef84ec9f3290a8bc2b85
-
Filesize
6.3MB
MD5b1e8d4d7dd26612c17eccbf66b280e7c
SHA197dd5e81a4014fb54ef5ac3f1db88519843c85c2
SHA256e3940372b04a4cb2177ae409c195debccfe004600d73a39d429a577d248d4cb2
SHA512ff70dd3103128cd36bd1da3a734e635ec76d53a5629fc1f05941d6cadb9e82310da0ea298dcf449ef17c42a70ea7d787a75585ffa37a74f9007ca91a4481ecc8
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
1.8MB
MD5a1c2cf87e829efcbfd8d16d5f73f40f3
SHA1b33ccd4b135e3780a4674e9354c9a85b7366ddfe
SHA2565b44413298e5c987de2e4253b422b106b90fb82858d9a413fdd373d1a8a5a3db
SHA512889d89e3751b7b2516cdd2daa6a9107c0cbef987e7dc224871f82936eaabf11fb5455ae73f0348d5a4bd7c014f10378b8c5a9ecaf033f1f0ea0ebabb87a1f307
-
Filesize
63KB
MD5cbfbeaf0a6e70056f43406053cd61f1e
SHA1b7088a9f29b8ab84aedaffec81441580775d5393
SHA256fa776a4e5e0653f7856a19c3a9fbdad306eb9365cb553bc223d8075be5f5cd3b
SHA5122930b11123191108d66e1bba5cb43f34ca963c424f6dd9c61751db62cef3039773dd100c179909d30099953513ca6eb07e29732af7928d2602c35a8020271c5c
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
286KB
MD5b70a1bd49d4133d98946486d4ec6bb36
SHA19feed9636e3a411bd1d2a3e80e713fe53376d9c4
SHA2563db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede
SHA512880b427c04cd532f7f49f496c5fb1f3a4244757deff6495c2b20d7b19631dd296a9a04ae968d9f3d51f3b022ea4c4d16a57e7c2a215c9a0b053b96dcfb290441
-
Filesize
4.7MB
MD54988fa3920604697b7240ae87280e2af
SHA1015604ced6ef2648341e2b34247247956635edf5
SHA256d8fda066185864723e14cffd9c2120ef237e5da01f4ec534ba0f5a36b33291d7
SHA51229e50c6d97ce3c3748b79a9e8709f4d652c91c75788a3efcc05ae35cf72afdee660207fb44d32ed48a296450b7d7d9a6f31bee42762620249b4a8c54e7dab8dd
-
Filesize
5.2MB
MD51e56fe08249ae4137d84897c3e9f799d
SHA113aa825a665fc60ac7b3652c1cb69c32192a8e32
SHA256255aafa347542e1f41adbaa81f05e6d0bb10986da06dd730b6710a2b7f932efc
SHA5125ebe5bcccc16afd806c122e319605a141c93801b663de74b3835325e105bdc33b5ede1f12cf03b5cfb995e1e2c19b343aab314b8de5aea4b54e636a671cfa6f5
-
Filesize
5.2MB
MD5ba3df4b6ec3f462ed528e9be24e5fcdc
SHA16ef6283bcbc8b54b2be7e3f9137226e46c6b557d
SHA2569e166ec0c59c7783b1ed6cf197e4b466f4f9f28a6dbebe4f106753a9af2ad1e5
SHA512f37ef5b071d94cf96a8302aa679d02d15591470b89fc6b98f47ae6cebf1c762f61ccc083ea85bab4b397e9298de4a1e621921dd986d01835734803de01098e4e
-
Filesize
6.0MB
MD59ad7cac7637e9da68e08def673093b34
SHA16fcce51db3f59e09aaf45d66f777df677dc06294
SHA256a8397eedce27f46ab0fb4dfa685fa1d5e3a51e2c03bcbd5c0dc4d1fd05203aae
SHA51212bad1d362840712458f6dd7faf4aa0a9547731044255a906ee9458c555ad27e59de2f91f1e63e8e1b38fef21b6ae48fc037cd2c9952ecd41b9b13906def0f65
-
Filesize
5.5MB
MD50317a1d1b4b09658a4068e12ecf5ad1e
SHA14d5ed0c874a3b1c25cf8ec22bad426e548fbc6db
SHA2568b2097457c32c2c21a4e424be678d8efa305d6bc5da5fa8089b4f750e41f8c14
SHA5125f1e3aa8cf4677faa71e92898eab026ba4ad08ca5f583ae161292159e34895a3a6da024c28458795d9364ba0c91cd7111f5d28cae5c3f3ffb1b7927463c53d0d