Resubmissions

16-02-2024 03:57

240216-eh6exage7x 10

15-02-2024 04:48

240215-ffgjfahe94 10

Analysis

  • max time kernel
    300s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-02-2024 04:48

General

  • Target

    3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe

  • Size

    286KB

  • MD5

    b70a1bd49d4133d98946486d4ec6bb36

  • SHA1

    9feed9636e3a411bd1d2a3e80e713fe53376d9c4

  • SHA256

    3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede

  • SHA512

    880b427c04cd532f7f49f496c5fb1f3a4244757deff6495c2b20d7b19631dd296a9a04ae968d9f3d51f3b022ea4c4d16a57e7c2a215c9a0b053b96dcfb290441

  • SSDEEP

    3072:ufWRCy/dqG9gUvXg+CqJixR0/IJJQ79eh8o8EskJw64QO1N3:uCCy/PJZKWIJJL5j1O1N

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe
    "C:\Users\Admin\AppData\Local\Temp\3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1632
  • C:\Users\Admin\AppData\Local\Temp\7224.exe
    C:\Users\Admin\AppData\Local\Temp\7224.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2164
  • C:\Users\Admin\AppData\Local\Temp\C534.exe
    C:\Users\Admin\AppData\Local\Temp\C534.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 96
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:1676
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\CA63.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:1976
    • C:\Users\Admin\AppData\Local\Temp\E071.exe
      C:\Users\Admin\AppData\Local\Temp\E071.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious use of FindShellTrayWindow
      PID:1316
    • C:\Users\Admin\AppData\Local\Temp\E4E5.exe
      C:\Users\Admin\AppData\Local\Temp\E4E5.exe
      1⤵
      • Executes dropped EXE
      PID:2080
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {C376B137-08BD-4668-8444-0FE3C3F5AF8F} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Users\Admin\AppData\Roaming\hiwuevt
        C:\Users\Admin\AppData\Roaming\hiwuevt
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:2096

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      30bf54977db8781722ac8aefa312d5ad

      SHA1

      1a0f8eb463a9b57e9088e44d51e1cd56fea22e7b

      SHA256

      0c3bc27398cdaaa63a8ff165e430df0bf6639a862c9634d85a54088a542b8144

      SHA512

      b20df583ce0f2765026667cf0f7dc3f0938ab49f384e4fb9b44347af0c1eed29b048005337962609a6f66dcf75bc881efb9c47a357bbcdc812ca8047b5082c58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      041fe502a0e57a3fdbc1e0860c7debb7

      SHA1

      81733995729ce55deaa4ad8c5fca619b25bd31ed

      SHA256

      09206ee582d981894533f3416411ad2f9a45f309f2a88e649188f071ffacfffd

      SHA512

      7aff2dc3161d1bb54b5ac2fc3945dc5b8c0adb87233dde9ed0acaf65c04fe2aae4a7d297974598dd9a2861c4656658b053df8a53090e5b0387649f9f862beb5c

    • C:\Users\Admin\AppData\Local\Temp\7224.exe

      Filesize

      259KB

      MD5

      5ead0a4dc3bf605775d48f0442ba371e

      SHA1

      36250ca49ef272946f09e442a65625bbde8ce714

      SHA256

      4f61b6ed6fa23715adf50cd5f3a74a427fc65006404338d9d9ad242d02f1222f

      SHA512

      06f479022c5cb1de9fa5ae96766f8b35c8e692bb86f7bfad4fa583a65b0b44f68ce0b895f9845b55b02b49a02462377561a3d06eed00ef84ec9f3290a8bc2b85

    • C:\Users\Admin\AppData\Local\Temp\C534.exe

      Filesize

      6.3MB

      MD5

      b1e8d4d7dd26612c17eccbf66b280e7c

      SHA1

      97dd5e81a4014fb54ef5ac3f1db88519843c85c2

      SHA256

      e3940372b04a4cb2177ae409c195debccfe004600d73a39d429a577d248d4cb2

      SHA512

      ff70dd3103128cd36bd1da3a734e635ec76d53a5629fc1f05941d6cadb9e82310da0ea298dcf449ef17c42a70ea7d787a75585ffa37a74f9007ca91a4481ecc8

    • C:\Users\Admin\AppData\Local\Temp\CA63.bat

      Filesize

      77B

      MD5

      55cc761bf3429324e5a0095cab002113

      SHA1

      2cc1ef4542a4e92d4158ab3978425d517fafd16d

      SHA256

      d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

      SHA512

      33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

    • C:\Users\Admin\AppData\Local\Temp\E071.exe

      Filesize

      1.8MB

      MD5

      a1c2cf87e829efcbfd8d16d5f73f40f3

      SHA1

      b33ccd4b135e3780a4674e9354c9a85b7366ddfe

      SHA256

      5b44413298e5c987de2e4253b422b106b90fb82858d9a413fdd373d1a8a5a3db

      SHA512

      889d89e3751b7b2516cdd2daa6a9107c0cbef987e7dc224871f82936eaabf11fb5455ae73f0348d5a4bd7c014f10378b8c5a9ecaf033f1f0ea0ebabb87a1f307

    • C:\Users\Admin\AppData\Local\Temp\E4E5.exe

      Filesize

      63KB

      MD5

      cbfbeaf0a6e70056f43406053cd61f1e

      SHA1

      b7088a9f29b8ab84aedaffec81441580775d5393

      SHA256

      fa776a4e5e0653f7856a19c3a9fbdad306eb9365cb553bc223d8075be5f5cd3b

      SHA512

      2930b11123191108d66e1bba5cb43f34ca963c424f6dd9c61751db62cef3039773dd100c179909d30099953513ca6eb07e29732af7928d2602c35a8020271c5c

    • C:\Users\Admin\AppData\Local\Temp\TarD86D.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Roaming\hiwuevt

      Filesize

      286KB

      MD5

      b70a1bd49d4133d98946486d4ec6bb36

      SHA1

      9feed9636e3a411bd1d2a3e80e713fe53376d9c4

      SHA256

      3db942a351d54b698e9836bb4a6fd9ddd0ae96e90033549f9f12517a25bf3ede

      SHA512

      880b427c04cd532f7f49f496c5fb1f3a4244757deff6495c2b20d7b19631dd296a9a04ae968d9f3d51f3b022ea4c4d16a57e7c2a215c9a0b053b96dcfb290441

    • \Users\Admin\AppData\Local\Temp\C534.exe

      Filesize

      4.7MB

      MD5

      4988fa3920604697b7240ae87280e2af

      SHA1

      015604ced6ef2648341e2b34247247956635edf5

      SHA256

      d8fda066185864723e14cffd9c2120ef237e5da01f4ec534ba0f5a36b33291d7

      SHA512

      29e50c6d97ce3c3748b79a9e8709f4d652c91c75788a3efcc05ae35cf72afdee660207fb44d32ed48a296450b7d7d9a6f31bee42762620249b4a8c54e7dab8dd

    • \Users\Admin\AppData\Local\Temp\C534.exe

      Filesize

      5.2MB

      MD5

      1e56fe08249ae4137d84897c3e9f799d

      SHA1

      13aa825a665fc60ac7b3652c1cb69c32192a8e32

      SHA256

      255aafa347542e1f41adbaa81f05e6d0bb10986da06dd730b6710a2b7f932efc

      SHA512

      5ebe5bcccc16afd806c122e319605a141c93801b663de74b3835325e105bdc33b5ede1f12cf03b5cfb995e1e2c19b343aab314b8de5aea4b54e636a671cfa6f5

    • \Users\Admin\AppData\Local\Temp\C534.exe

      Filesize

      5.2MB

      MD5

      ba3df4b6ec3f462ed528e9be24e5fcdc

      SHA1

      6ef6283bcbc8b54b2be7e3f9137226e46c6b557d

      SHA256

      9e166ec0c59c7783b1ed6cf197e4b466f4f9f28a6dbebe4f106753a9af2ad1e5

      SHA512

      f37ef5b071d94cf96a8302aa679d02d15591470b89fc6b98f47ae6cebf1c762f61ccc083ea85bab4b397e9298de4a1e621921dd986d01835734803de01098e4e

    • \Users\Admin\AppData\Local\Temp\C534.exe

      Filesize

      6.0MB

      MD5

      9ad7cac7637e9da68e08def673093b34

      SHA1

      6fcce51db3f59e09aaf45d66f777df677dc06294

      SHA256

      a8397eedce27f46ab0fb4dfa685fa1d5e3a51e2c03bcbd5c0dc4d1fd05203aae

      SHA512

      12bad1d362840712458f6dd7faf4aa0a9547731044255a906ee9458c555ad27e59de2f91f1e63e8e1b38fef21b6ae48fc037cd2c9952ecd41b9b13906def0f65

    • \Users\Admin\AppData\Local\Temp\C534.exe

      Filesize

      5.5MB

      MD5

      0317a1d1b4b09658a4068e12ecf5ad1e

      SHA1

      4d5ed0c874a3b1c25cf8ec22bad426e548fbc6db

      SHA256

      8b2097457c32c2c21a4e424be678d8efa305d6bc5da5fa8089b4f750e41f8c14

      SHA512

      5f1e3aa8cf4677faa71e92898eab026ba4ad08ca5f583ae161292159e34895a3a6da024c28458795d9364ba0c91cd7111f5d28cae5c3f3ffb1b7927463c53d0d

    • memory/1316-181-0x0000000002670000-0x0000000002671000-memory.dmp

      Filesize

      4KB

    • memory/1316-179-0x00000000008B0000-0x0000000000D7B000-memory.dmp

      Filesize

      4.8MB

    • memory/1316-208-0x00000000008B0000-0x0000000000D7B000-memory.dmp

      Filesize

      4.8MB

    • memory/1316-180-0x0000000002550000-0x0000000002551000-memory.dmp

      Filesize

      4KB

    • memory/1316-182-0x0000000002320000-0x0000000002321000-memory.dmp

      Filesize

      4KB

    • memory/1316-183-0x0000000002CF0000-0x0000000002CF1000-memory.dmp

      Filesize

      4KB

    • memory/1316-184-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/1316-185-0x0000000000880000-0x0000000000881000-memory.dmp

      Filesize

      4KB

    • memory/1316-186-0x0000000002310000-0x0000000002311000-memory.dmp

      Filesize

      4KB

    • memory/1316-187-0x00000000024C0000-0x00000000024C1000-memory.dmp

      Filesize

      4KB

    • memory/1316-188-0x0000000002330000-0x0000000002331000-memory.dmp

      Filesize

      4KB

    • memory/1316-189-0x00000000029C0000-0x00000000029C1000-memory.dmp

      Filesize

      4KB

    • memory/1316-192-0x0000000000890000-0x0000000000891000-memory.dmp

      Filesize

      4KB

    • memory/1316-190-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

      Filesize

      4KB

    • memory/1316-191-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/1316-178-0x0000000077970000-0x0000000077972000-memory.dmp

      Filesize

      8KB

    • memory/1316-177-0x00000000008B0000-0x0000000000D7B000-memory.dmp

      Filesize

      4.8MB

    • memory/1380-218-0x0000000004B70000-0x0000000004B86000-memory.dmp

      Filesize

      88KB

    • memory/1380-4-0x0000000002DE0000-0x0000000002DF6000-memory.dmp

      Filesize

      88KB

    • memory/1380-20-0x0000000003E90000-0x0000000003EA6000-memory.dmp

      Filesize

      88KB

    • memory/1632-5-0x0000000000400000-0x0000000002BF4000-memory.dmp

      Filesize

      40.0MB

    • memory/1632-1-0x0000000002CD0000-0x0000000002DD0000-memory.dmp

      Filesize

      1024KB

    • memory/1632-3-0x0000000000400000-0x0000000002BF4000-memory.dmp

      Filesize

      40.0MB

    • memory/1632-2-0x0000000000220000-0x000000000022B000-memory.dmp

      Filesize

      44KB

    • memory/2080-200-0x00000000740D0000-0x00000000747BE000-memory.dmp

      Filesize

      6.9MB

    • memory/2080-210-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

      Filesize

      256KB

    • memory/2080-199-0x0000000000470000-0x000000000048A000-memory.dmp

      Filesize

      104KB

    • memory/2080-201-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

      Filesize

      256KB

    • memory/2080-209-0x0000000000780000-0x0000000000790000-memory.dmp

      Filesize

      64KB

    • memory/2080-198-0x0000000000B00000-0x0000000000B14000-memory.dmp

      Filesize

      80KB

    • memory/2080-211-0x00000000740D0000-0x00000000747BE000-memory.dmp

      Filesize

      6.9MB

    • memory/2080-212-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

      Filesize

      256KB

    • memory/2096-216-0x0000000002C80000-0x0000000002D80000-memory.dmp

      Filesize

      1024KB

    • memory/2096-217-0x0000000000400000-0x0000000002BF4000-memory.dmp

      Filesize

      40.0MB

    • memory/2096-219-0x0000000000400000-0x0000000002BF4000-memory.dmp

      Filesize

      40.0MB

    • memory/2164-18-0x0000000002CA0000-0x0000000002DA0000-memory.dmp

      Filesize

      1024KB

    • memory/2164-21-0x0000000000400000-0x0000000002BEC000-memory.dmp

      Filesize

      39.9MB

    • memory/2164-19-0x0000000000400000-0x0000000002BEC000-memory.dmp

      Filesize

      39.9MB

    • memory/2728-60-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2728-57-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2728-45-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/2728-30-0x00000000000F0000-0x00000000000F1000-memory.dmp

      Filesize

      4KB

    • memory/2728-42-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/2728-39-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/2728-32-0x0000000000270000-0x000000000109B000-memory.dmp

      Filesize

      14.2MB

    • memory/2728-47-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/2728-50-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2728-36-0x00000000000F0000-0x00000000000F1000-memory.dmp

      Filesize

      4KB

    • memory/2728-52-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2728-44-0x0000000077980000-0x0000000077981000-memory.dmp

      Filesize

      4KB

    • memory/2728-41-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/2728-203-0x0000000000270000-0x000000000109B000-memory.dmp

      Filesize

      14.2MB

    • memory/2728-55-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2728-62-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2728-65-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/2728-34-0x0000000000270000-0x000000000109B000-memory.dmp

      Filesize

      14.2MB

    • memory/2728-67-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/2728-70-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/2728-33-0x00000000000F0000-0x00000000000F1000-memory.dmp

      Filesize

      4KB

    • memory/2728-37-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB