Analysis Overview
SHA256
77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428
Threat Level: Known bad
The file 77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428 was found to be: Known bad.
Malicious Activity Summary
SmokeLoader
Executes dropped EXE
Deletes itself
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Checks SCSI registry key(s)
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-02-22 04:48
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-02-22 04:48
Reported
2024-02-22 04:54
Platform
win7-20240221-en
Max time kernel
300s
Max time network
118s
Command Line
Signatures
SmokeLoader
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\afrifiv | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\afrifiv | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\afrifiv | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\afrifiv | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\afrifiv | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2504 wrote to memory of 1976 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\afrifiv |
| PID 2504 wrote to memory of 1976 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\afrifiv |
| PID 2504 wrote to memory of 1976 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\afrifiv |
| PID 2504 wrote to memory of 1976 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\afrifiv |
Processes
C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe
"C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {C7A08A51-5EBD-4221-BD25-E0DAFB7E3C3C} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]
C:\Users\Admin\AppData\Roaming\afrifiv
C:\Users\Admin\AppData\Roaming\afrifiv
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | sjyey.com | udp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
Files
memory/1968-1-0x0000000002E50000-0x0000000002F50000-memory.dmp
memory/1968-2-0x0000000000220000-0x000000000022B000-memory.dmp
memory/1968-3-0x0000000000400000-0x0000000002D35000-memory.dmp
memory/1968-5-0x0000000000400000-0x0000000002D35000-memory.dmp
memory/1200-4-0x0000000002F20000-0x0000000002F36000-memory.dmp
C:\Users\Admin\AppData\Roaming\afrifiv
| MD5 | 100f4f22057827ac5d99eaf584e5b19e |
| SHA1 | 8114fa644df30503d6ea1f66b4ceb3a46be8722b |
| SHA256 | 77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428 |
| SHA512 | 5da698636c2ec0530193c45314ee197c0f4ce984d7297a1cdfcb335489822dbd7a7d98f046452a2d7610dbc1497854a972a4791984ed897fc5b4861510048939 |
memory/1976-14-0x0000000002EE0000-0x0000000002FE0000-memory.dmp
memory/1976-15-0x0000000000400000-0x0000000002D35000-memory.dmp
memory/1200-16-0x00000000030A0000-0x00000000030B6000-memory.dmp
memory/1976-17-0x0000000000400000-0x0000000002D35000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-02-22 04:48
Reported
2024-02-22 04:54
Platform
win10-20240221-en
Max time kernel
300s
Max time network
255s
Command Line
Signatures
SmokeLoader
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\rrbfvrr | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\rrbfvrr | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\rrbfvrr | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\rrbfvrr | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\rrbfvrr | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe
"C:\Users\Admin\AppData\Local\Temp\77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428.exe"
C:\Users\Admin\AppData\Roaming\rrbfvrr
C:\Users\Admin\AppData\Roaming\rrbfvrr
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | sjyey.com | udp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| US | 8.8.8.8:53 | 233.117.119.201.in-addr.arpa | udp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| MX | 201.119.117.233:80 | sjyey.com | tcp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 27.178.89.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
Files
memory/316-1-0x0000000002FC0000-0x00000000030C0000-memory.dmp
memory/316-2-0x0000000002DA0000-0x0000000002DAB000-memory.dmp
memory/316-3-0x0000000000400000-0x0000000002D35000-memory.dmp
memory/3388-4-0x00000000006E0000-0x00000000006F6000-memory.dmp
memory/316-5-0x0000000000400000-0x0000000002D35000-memory.dmp
C:\Users\Admin\AppData\Roaming\rrbfvrr
| MD5 | 100f4f22057827ac5d99eaf584e5b19e |
| SHA1 | 8114fa644df30503d6ea1f66b4ceb3a46be8722b |
| SHA256 | 77d4e1a7b1dc1a646cb0955793d2cd8734d04d2f0ed48c8a72a029b94063a428 |
| SHA512 | 5da698636c2ec0530193c45314ee197c0f4ce984d7297a1cdfcb335489822dbd7a7d98f046452a2d7610dbc1497854a972a4791984ed897fc5b4861510048939 |
memory/2824-14-0x0000000002E90000-0x0000000002F90000-memory.dmp
memory/2824-15-0x0000000000400000-0x0000000002D35000-memory.dmp
memory/3388-16-0x00000000022A0000-0x00000000022B6000-memory.dmp
memory/2824-17-0x0000000000400000-0x0000000002D35000-memory.dmp