Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 02:03

General

  • Target

    067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe

  • Size

    283KB

  • MD5

    f44d23b0b845ca4388424f9d5be32890

  • SHA1

    d46eac4684455e34a396eba79ddb01441359ebb6

  • SHA256

    067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46

  • SHA512

    a8943cc756b9c3339efb3fe8e24e0c24f4e285012a731b4e8e2f5e940a37d246879d469e1ee9825805670fd63f905cec91b1dcde6d01ee0aea72fe7abe711ede

  • SSDEEP

    3072:c+tpp4K1PAppyBA1Q8EkKXU1iKL4i2Dva2ICXIIKcKU1KpVT/wV9tmX3m:cud14pEWC5/Hi2KCY5mUpVTEy

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • UPX dump on OEP (original entry point) 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe
    "C:\Users\Admin\AppData\Local\Temp\067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2020
  • C:\Users\Admin\AppData\Local\Temp\EA20.exe
    C:\Users\Admin\AppData\Local\Temp\EA20.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    PID:1892
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\979F.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\979F.dll
      2⤵
      • Loads dropped DLL
      PID:2352
  • C:\Users\Admin\AppData\Local\Temp\F643.exe
    C:\Users\Admin\AppData\Local\Temp\F643.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\F643.exe
      C:\Users\Admin\AppData\Local\Temp\F643.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmp

    Filesize

    2.6MB

    MD5

    8ad5c815ea30b4bb9f76a25873350c69

    SHA1

    8731bcf8a7b8bd9c1688e1347cb0629cd672eb3c

    SHA256

    0e8b3fd97fa9544dae27c14c28e887457033a785cc892b734cdc049113c38295

    SHA512

    41c4ba676452d2a1447a34798c1c87fd4506707cf68082878cb1f95f0882ded7e075c2b574faf85c3976d7bf94bb4dcb3463442c5ec7f4cf8af4b26d56c165a1

  • C:\Users\Admin\AppData\Local\Temp\979F.dll

    Filesize

    2.8MB

    MD5

    b0fb18cfcac1983582e7fd67b2843ce8

    SHA1

    ca29cf7cee80be38c5d667d5e8c00e6ea11b3294

    SHA256

    4132c2587cfe85b944d95835d8d0bf92a08a0f831ea26a45c826146048347f45

    SHA512

    4d9e1b14ef1a8adc15d38846c0a4e1d762e76fd944c76621ef6ac3a8482d14e40cfd4d7a14853d7a99cca2a99aa438eba996e842f1172f5f9a8f34ba1d97daf9

  • C:\Users\Admin\AppData\Local\Temp\EA20.exe

    Filesize

    1.8MB

    MD5

    60396068f6e960003173c9c3c8457dea

    SHA1

    e03ccbfc85695e45657a17d67fdc07b724138013

    SHA256

    decdd13661e2cfdc00ce9f3cdc1e5602960ed620022aa1fb7894cdf1bb15b677

    SHA512

    5fc959c6f931b7ea05b08d53fbbba4e659d1f035201fceb2dabdeb7321942e1290b80e4338348ea8c5d7ef0d53f75ae7534e3c181e458d85a1c691ebaaebcebc

  • C:\Users\Admin\AppData\Local\Temp\F643.exe

    Filesize

    1.8MB

    MD5

    996c2b1fb60f980ea6618aeefbe4cebf

    SHA1

    a8553f7f723132a1d35f7a57cae1a2e267cbc2ac

    SHA256

    f91c0a4753cdb98cce0ade020917fdefe7a8daf88d23b4c07595de741402ca50

    SHA512

    4af8fb921a332c5ac3d43b85bc23c859e431702e00852537bf1831c7af8b990d880808d044a1317873c77fbdecb1af7c97bed9edd9e2185bcbfa390c463f9056

  • C:\Users\Admin\AppData\Local\Temp\F643.exe

    Filesize

    681KB

    MD5

    82129878fbdaae18f2dd7cdf8b273a37

    SHA1

    60f115ee74403cc2fcf550911f7a547a3dcb2482

    SHA256

    dd7190f80688f898019834ddc8d685c48d93d0d71e39d309c05f6f38971928c4

    SHA512

    9925f40f41d86824c3f630a197fa850c475a815f89aa1ffeec7906d9aa2a807f31448cc487460a9058db64e786c61509b1e87609b530b32f049f7e5101fc1735

  • C:\Users\Admin\AppData\Local\Temp\F643.exe

    Filesize

    310KB

    MD5

    dec92e7bf943946141b2a999fb0257a2

    SHA1

    1a1a53eb69b98ad5a03b84a805102ed8506c38d4

    SHA256

    24c4de03b80b1b8d69c946a6d4182a308322e6f8a812272c1f6eff742216d95a

    SHA512

    1eb56e10298e02ab14632637e9bb50f46fa7a357c3dccebe49935308a8e07e6fc88882a1ef32b57205abe0514dc1c9cdb96a79f3de462abe4aa37a68c4f63fbc

  • \Users\Admin\AppData\Local\Temp\979F.dll

    Filesize

    1.2MB

    MD5

    47699f8651c2f50120170810e2d5b3dd

    SHA1

    3d6427904204359df583d71f8eeb063d5f362cb8

    SHA256

    83af37a1bd314be2b029ca77bd12b071509c9906be9200c390fc0a780575bdbc

    SHA512

    1025890eb85091b6879d0f7837a3e5943c184dee7781ab41c6ec466b8da0b35353618cbc2109e40a586f689aee224c82ae17d566755a0833a4b0d7d0946ed799

  • \Users\Admin\AppData\Local\Temp\979F.dll

    Filesize

    452KB

    MD5

    bffa42eff5a23fe379d394d0a73376f8

    SHA1

    43d179f9e6e2974c3d68f067bbaebec167586ac3

    SHA256

    bbb9d3a013602777241db4cce0e8fdbf71c0b0d5eba2b77b61a6fd5062dd9c8a

    SHA512

    b8d2579e2d0641f863cddf3ff753a10b5fcb7761b4218b05c5900c3f072cb103bea10c53415fd11dba8c35698c93973fabb26c3c918ebfc9382aae3c209199aa

  • \Users\Admin\AppData\Local\Temp\F643.exe

    Filesize

    367KB

    MD5

    dc8362e6644665f1c8796f7338f1e7f9

    SHA1

    8a27958a727caae8a8c81ff54d6e2b54186ba59a

    SHA256

    a60edd35df7cb08d66844c06f385299e488290a961b4163bef12f8dd668b869a

    SHA512

    88bcc8db5b1f983991028f051d491dba3856468d193cf93037bd355a2a3a9f48727de51cda92b41b03419e1511c554efd5d6ccb98613c861653ac0a3a64fd091

  • memory/1392-4-0x00000000026F0000-0x0000000002706000-memory.dmp

    Filesize

    88KB

  • memory/1668-66-0x0000000002070000-0x0000000002227000-memory.dmp

    Filesize

    1.7MB

  • memory/1668-61-0x0000000001EB0000-0x0000000002068000-memory.dmp

    Filesize

    1.7MB

  • memory/1668-60-0x0000000001EB0000-0x0000000002068000-memory.dmp

    Filesize

    1.7MB

  • memory/1764-71-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-67-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-74-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-73-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-72-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-83-0x0000000002E30000-0x0000000002F3F000-memory.dmp

    Filesize

    1.1MB

  • memory/1764-80-0x0000000002E30000-0x0000000002F3F000-memory.dmp

    Filesize

    1.1MB

  • memory/1764-70-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-91-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-90-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-89-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-64-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1764-92-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-84-0x0000000002E30000-0x0000000002F3F000-memory.dmp

    Filesize

    1.1MB

  • memory/1764-101-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/1764-76-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/1764-79-0x0000000002D00000-0x0000000002E2B000-memory.dmp

    Filesize

    1.2MB

  • memory/1892-24-0x0000000000C50000-0x0000000000C51000-memory.dmp

    Filesize

    4KB

  • memory/1892-30-0x00000000008E0000-0x00000000008E1000-memory.dmp

    Filesize

    4KB

  • memory/1892-18-0x0000000000C70000-0x0000000001118000-memory.dmp

    Filesize

    4.7MB

  • memory/1892-19-0x00000000776B0000-0x00000000776B2000-memory.dmp

    Filesize

    8KB

  • memory/1892-21-0x00000000009C0000-0x00000000009C1000-memory.dmp

    Filesize

    4KB

  • memory/1892-29-0x0000000000870000-0x0000000000871000-memory.dmp

    Filesize

    4KB

  • memory/1892-28-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1892-41-0x0000000000C70000-0x0000000001118000-memory.dmp

    Filesize

    4.7MB

  • memory/1892-36-0x0000000002670000-0x0000000002671000-memory.dmp

    Filesize

    4KB

  • memory/1892-34-0x0000000000C60000-0x0000000000C61000-memory.dmp

    Filesize

    4KB

  • memory/1892-35-0x0000000000850000-0x0000000000851000-memory.dmp

    Filesize

    4KB

  • memory/1892-32-0x0000000002520000-0x0000000002521000-memory.dmp

    Filesize

    4KB

  • memory/1892-31-0x00000000008F0000-0x00000000008F1000-memory.dmp

    Filesize

    4KB

  • memory/1892-20-0x0000000000C70000-0x0000000001118000-memory.dmp

    Filesize

    4.7MB

  • memory/1892-22-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB

  • memory/1892-27-0x0000000000900000-0x0000000000901000-memory.dmp

    Filesize

    4KB

  • memory/1892-23-0x0000000000910000-0x0000000000911000-memory.dmp

    Filesize

    4KB

  • memory/1892-26-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB

  • memory/1892-25-0x00000000005B0000-0x00000000005B1000-memory.dmp

    Filesize

    4KB

  • memory/2020-1-0x0000000001BD0000-0x0000000001CD0000-memory.dmp

    Filesize

    1024KB

  • memory/2020-8-0x0000000000220000-0x000000000022B000-memory.dmp

    Filesize

    44KB

  • memory/2020-5-0x0000000000400000-0x0000000001A34000-memory.dmp

    Filesize

    22.2MB

  • memory/2020-3-0x0000000000400000-0x0000000001A34000-memory.dmp

    Filesize

    22.2MB

  • memory/2020-2-0x0000000000220000-0x000000000022B000-memory.dmp

    Filesize

    44KB

  • memory/2352-49-0x0000000002340000-0x000000000244F000-memory.dmp

    Filesize

    1.1MB

  • memory/2352-46-0x0000000010000000-0x00000000102CE000-memory.dmp

    Filesize

    2.8MB

  • memory/2352-45-0x00000000000C0000-0x00000000000C6000-memory.dmp

    Filesize

    24KB

  • memory/2352-48-0x0000000002210000-0x000000000233B000-memory.dmp

    Filesize

    1.2MB

  • memory/2352-53-0x0000000002340000-0x000000000244F000-memory.dmp

    Filesize

    1.1MB

  • memory/2352-52-0x0000000002340000-0x000000000244F000-memory.dmp

    Filesize

    1.1MB