Analysis
-
max time kernel
154s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe
Resource
win7-20240221-en
General
-
Target
067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe
-
Size
283KB
-
MD5
f44d23b0b845ca4388424f9d5be32890
-
SHA1
d46eac4684455e34a396eba79ddb01441359ebb6
-
SHA256
067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46
-
SHA512
a8943cc756b9c3339efb3fe8e24e0c24f4e285012a731b4e8e2f5e940a37d246879d469e1ee9825805670fd63f905cec91b1dcde6d01ee0aea72fe7abe711ede
-
SSDEEP
3072:c+tpp4K1PAppyBA1Q8EkKXU1iKL4i2Dva2ICXIIKcKU1KpVT/wV9tmX3m:cud14pEWC5/Hi2KCY5mUpVTEy
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5E24.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5E24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5E24.exe -
Deletes itself 1 IoCs
pid Process 3376 Process not Found -
Executes dropped EXE 3 IoCs
pid Process 3368 5E24.exe 5000 1272.exe 2996 1272.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine 5E24.exe -
Loads dropped DLL 1 IoCs
pid Process 3956 regsvr32.exe -
resource yara_rule behavioral2/memory/2996-46-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2996-48-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2996-49-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2996-50-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2996-51-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2996-55-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3368 5E24.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5000 set thread context of 2996 5000 1272.exe 116 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job 5E24.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3924 067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe 3924 067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found 3376 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3924 067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3368 3376 Process not Found 108 PID 3376 wrote to memory of 3368 3376 Process not Found 108 PID 3376 wrote to memory of 3368 3376 Process not Found 108 PID 3376 wrote to memory of 752 3376 Process not Found 109 PID 3376 wrote to memory of 752 3376 Process not Found 109 PID 752 wrote to memory of 3956 752 regsvr32.exe 110 PID 752 wrote to memory of 3956 752 regsvr32.exe 110 PID 752 wrote to memory of 3956 752 regsvr32.exe 110 PID 3376 wrote to memory of 5000 3376 Process not Found 115 PID 3376 wrote to memory of 5000 3376 Process not Found 115 PID 3376 wrote to memory of 5000 3376 Process not Found 115 PID 5000 wrote to memory of 2996 5000 1272.exe 116 PID 5000 wrote to memory of 2996 5000 1272.exe 116 PID 5000 wrote to memory of 2996 5000 1272.exe 116 PID 5000 wrote to memory of 2996 5000 1272.exe 116 PID 5000 wrote to memory of 2996 5000 1272.exe 116 PID 5000 wrote to memory of 2996 5000 1272.exe 116 PID 5000 wrote to memory of 2996 5000 1272.exe 116 PID 5000 wrote to memory of 2996 5000 1272.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe"C:\Users\Admin\AppData\Local\Temp\067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\5E24.exeC:\Users\Admin\AppData\Local\Temp\5E24.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:3368
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\D1CE.dll1⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\D1CE.dll2⤵
- Loads dropped DLL
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\1272.exeC:\Users\Admin\AppData\Local\Temp\1272.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\1272.exeC:\Users\Admin\AppData\Local\Temp\1272.exe2⤵
- Executes dropped EXE
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5996c2b1fb60f980ea6618aeefbe4cebf
SHA1a8553f7f723132a1d35f7a57cae1a2e267cbc2ac
SHA256f91c0a4753cdb98cce0ade020917fdefe7a8daf88d23b4c07595de741402ca50
SHA5124af8fb921a332c5ac3d43b85bc23c859e431702e00852537bf1831c7af8b990d880808d044a1317873c77fbdecb1af7c97bed9edd9e2185bcbfa390c463f9056
-
Filesize
68KB
MD5057f4ac5c9548c392815c2d90d3574a5
SHA155baf17a451733e28ea1eb64eed862ab25639e71
SHA2560f8413e98757cba0648565ccf5b3362a67492d54c8feaf956147d621f8abc24b
SHA51277b79c1381e9d88ea3049c31788f8be0ec87e4ef757a69a56cbc546666491b46be02bfc229e18a589c185c77841d6f13e6011ed4786943810744da20d71f1188
-
Filesize
1.8MB
MD560396068f6e960003173c9c3c8457dea
SHA1e03ccbfc85695e45657a17d67fdc07b724138013
SHA256decdd13661e2cfdc00ce9f3cdc1e5602960ed620022aa1fb7894cdf1bb15b677
SHA5125fc959c6f931b7ea05b08d53fbbba4e659d1f035201fceb2dabdeb7321942e1290b80e4338348ea8c5d7ef0d53f75ae7534e3c181e458d85a1c691ebaaebcebc
-
Filesize
1.7MB
MD57d2fdbafdacb6ace76d6cec1fca62fe7
SHA1dfa36a904216dfec15e6c927c69d70f9e199090d
SHA25688df16a770a8d37ef74944b9509cbc18b0167a240d6fc34636daa8b82d01dab5
SHA512915a73025defca5785e8c13de50b2ecaa764f075d1e88ff06df10ae136fa02f6b41bba62b45272f08f08ea75d1482b5d2d105446dbc41ee88708959e7f5ad5ac
-
Filesize
872KB
MD57068f25c1c5c16dbe96e4a2e3291577e
SHA1093e15c2122bc7f625889892241c27a2a33d116c
SHA25658a0090b76eac710c94a16d38cad3021f3f10e557dc4e7649b1a0588d9621852
SHA512e9fd8a20960a100aa164f187eff897cd4ede5831a0410140b0451d07241182073c99db3f24bfc5e27fcc1779feab65729aaeffb77de19c761ba6aed103816e42
-
Filesize
173KB
MD56639422d6c02f8eb5719cab054472e19
SHA179f354569c404b7ac851a8a500874936e17d3f67
SHA256105837dd954908f6e917f76348c1aecfb694775c5fc78c575369813242e66023
SHA5126c95c605c6363e5f9f5366588b9d4bed07262914389da1ee6ee80e0968e4c2c308b1b1ed4a62f20e90e9480d7b678366186735ae7265464ff43636b46abb65af