Analysis

  • max time kernel
    154s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 02:03

General

  • Target

    067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe

  • Size

    283KB

  • MD5

    f44d23b0b845ca4388424f9d5be32890

  • SHA1

    d46eac4684455e34a396eba79ddb01441359ebb6

  • SHA256

    067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46

  • SHA512

    a8943cc756b9c3339efb3fe8e24e0c24f4e285012a731b4e8e2f5e940a37d246879d469e1ee9825805670fd63f905cec91b1dcde6d01ee0aea72fe7abe711ede

  • SSDEEP

    3072:c+tpp4K1PAppyBA1Q8EkKXU1iKL4i2Dva2ICXIIKcKU1KpVT/wV9tmX3m:cud14pEWC5/Hi2KCY5mUpVTEy

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe
    "C:\Users\Admin\AppData\Local\Temp\067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3924
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:932
    • C:\Users\Admin\AppData\Local\Temp\5E24.exe
      C:\Users\Admin\AppData\Local\Temp\5E24.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      PID:3368
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\D1CE.dll
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\D1CE.dll
        2⤵
        • Loads dropped DLL
        PID:3956
    • C:\Users\Admin\AppData\Local\Temp\1272.exe
      C:\Users\Admin\AppData\Local\Temp\1272.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Users\Admin\AppData\Local\Temp\1272.exe
        C:\Users\Admin\AppData\Local\Temp\1272.exe
        2⤵
        • Executes dropped EXE
        PID:2996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1272.exe

      Filesize

      1.8MB

      MD5

      996c2b1fb60f980ea6618aeefbe4cebf

      SHA1

      a8553f7f723132a1d35f7a57cae1a2e267cbc2ac

      SHA256

      f91c0a4753cdb98cce0ade020917fdefe7a8daf88d23b4c07595de741402ca50

      SHA512

      4af8fb921a332c5ac3d43b85bc23c859e431702e00852537bf1831c7af8b990d880808d044a1317873c77fbdecb1af7c97bed9edd9e2185bcbfa390c463f9056

    • C:\Users\Admin\AppData\Local\Temp\1272.exe

      Filesize

      68KB

      MD5

      057f4ac5c9548c392815c2d90d3574a5

      SHA1

      55baf17a451733e28ea1eb64eed862ab25639e71

      SHA256

      0f8413e98757cba0648565ccf5b3362a67492d54c8feaf956147d621f8abc24b

      SHA512

      77b79c1381e9d88ea3049c31788f8be0ec87e4ef757a69a56cbc546666491b46be02bfc229e18a589c185c77841d6f13e6011ed4786943810744da20d71f1188

    • C:\Users\Admin\AppData\Local\Temp\5E24.exe

      Filesize

      1.8MB

      MD5

      60396068f6e960003173c9c3c8457dea

      SHA1

      e03ccbfc85695e45657a17d67fdc07b724138013

      SHA256

      decdd13661e2cfdc00ce9f3cdc1e5602960ed620022aa1fb7894cdf1bb15b677

      SHA512

      5fc959c6f931b7ea05b08d53fbbba4e659d1f035201fceb2dabdeb7321942e1290b80e4338348ea8c5d7ef0d53f75ae7534e3c181e458d85a1c691ebaaebcebc

    • C:\Users\Admin\AppData\Local\Temp\D1CE.dll

      Filesize

      1.7MB

      MD5

      7d2fdbafdacb6ace76d6cec1fca62fe7

      SHA1

      dfa36a904216dfec15e6c927c69d70f9e199090d

      SHA256

      88df16a770a8d37ef74944b9509cbc18b0167a240d6fc34636daa8b82d01dab5

      SHA512

      915a73025defca5785e8c13de50b2ecaa764f075d1e88ff06df10ae136fa02f6b41bba62b45272f08f08ea75d1482b5d2d105446dbc41ee88708959e7f5ad5ac

    • C:\Users\Admin\AppData\Local\Temp\D1CE.dll

      Filesize

      872KB

      MD5

      7068f25c1c5c16dbe96e4a2e3291577e

      SHA1

      093e15c2122bc7f625889892241c27a2a33d116c

      SHA256

      58a0090b76eac710c94a16d38cad3021f3f10e557dc4e7649b1a0588d9621852

      SHA512

      e9fd8a20960a100aa164f187eff897cd4ede5831a0410140b0451d07241182073c99db3f24bfc5e27fcc1779feab65729aaeffb77de19c761ba6aed103816e42

    • C:\Users\Admin\AppData\Local\Temp\D1CE.dll

      Filesize

      173KB

      MD5

      6639422d6c02f8eb5719cab054472e19

      SHA1

      79f354569c404b7ac851a8a500874936e17d3f67

      SHA256

      105837dd954908f6e917f76348c1aecfb694775c5fc78c575369813242e66023

      SHA512

      6c95c605c6363e5f9f5366588b9d4bed07262914389da1ee6ee80e0968e4c2c308b1b1ed4a62f20e90e9480d7b678366186735ae7265464ff43636b46abb65af

    • memory/2996-55-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/2996-49-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/2996-48-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/2996-50-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/2996-46-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/2996-51-0x0000000000400000-0x0000000000848000-memory.dmp

      Filesize

      4.3MB

    • memory/2996-57-0x0000000000D60000-0x0000000000D66000-memory.dmp

      Filesize

      24KB

    • memory/3368-19-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-32-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-23-0x0000000005A60000-0x0000000005A61000-memory.dmp

      Filesize

      4KB

    • memory/3368-25-0x0000000005A10000-0x0000000005A11000-memory.dmp

      Filesize

      4KB

    • memory/3368-26-0x0000000005A50000-0x0000000005A51000-memory.dmp

      Filesize

      4KB

    • memory/3368-27-0x0000000005A80000-0x0000000005A81000-memory.dmp

      Filesize

      4KB

    • memory/3368-28-0x0000000005A70000-0x0000000005A71000-memory.dmp

      Filesize

      4KB

    • memory/3368-29-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-30-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-18-0x00000000778D4000-0x00000000778D6000-memory.dmp

      Filesize

      8KB

    • memory/3368-22-0x0000000005A20000-0x0000000005A21000-memory.dmp

      Filesize

      4KB

    • memory/3368-35-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-36-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-20-0x0000000005A30000-0x0000000005A31000-memory.dmp

      Filesize

      4KB

    • memory/3368-41-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-17-0x0000000000F70000-0x0000000001418000-memory.dmp

      Filesize

      4.7MB

    • memory/3368-24-0x0000000005A00000-0x0000000005A01000-memory.dmp

      Filesize

      4KB

    • memory/3368-21-0x0000000005A40000-0x0000000005A41000-memory.dmp

      Filesize

      4KB

    • memory/3376-5-0x00000000027E0000-0x00000000027F6000-memory.dmp

      Filesize

      88KB

    • memory/3924-6-0x0000000000400000-0x0000000001A34000-memory.dmp

      Filesize

      22.2MB

    • memory/3924-1-0x0000000000400000-0x0000000001A34000-memory.dmp

      Filesize

      22.2MB

    • memory/3924-9-0x0000000001AC0000-0x0000000001ACB000-memory.dmp

      Filesize

      44KB

    • memory/3924-4-0x0000000000400000-0x0000000001A34000-memory.dmp

      Filesize

      22.2MB

    • memory/3924-3-0x0000000001AC0000-0x0000000001ACB000-memory.dmp

      Filesize

      44KB

    • memory/3924-2-0x0000000001CC0000-0x0000000001DC0000-memory.dmp

      Filesize

      1024KB

    • memory/3956-52-0x0000000000920000-0x0000000000926000-memory.dmp

      Filesize

      24KB

    • memory/3956-53-0x0000000010000000-0x00000000102CE000-memory.dmp

      Filesize

      2.8MB

    • memory/3956-60-0x0000000002800000-0x000000000292B000-memory.dmp

      Filesize

      1.2MB

    • memory/5000-44-0x0000000002430000-0x00000000025E7000-memory.dmp

      Filesize

      1.7MB

    • memory/5000-43-0x0000000002270000-0x000000000242C000-memory.dmp

      Filesize

      1.7MB