Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileRepMalware.15116.31352.exe
Resource
win7-20240221-en
General
-
Target
SecuriteInfo.com.FileRepMalware.15116.31352.exe
-
Size
208KB
-
MD5
9b10a29569abdddb99d729e07f51d62a
-
SHA1
c152b192772a1fdc2dcf17faf4319fb0173ce55d
-
SHA256
a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef
-
SHA512
237b5c3f390030d256cba7af05f8b4d45f0c7459127891a12d3a644b28df2da09109325e32457e83a1af93885abd75fc9da79bb4864157ebc15275f6673617b1
-
SSDEEP
3072:PMCZ3MKPMkeED9EqQvbMaOnrDN08QKuV9w1RBeg8+/yGYV:kCZ5MiD9EqQvZOG8QKOkRBeA
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Signatures
-
Glupteba payload 2 IoCs
resource yara_rule behavioral1/memory/2056-117-0x0000000002A60000-0x000000000334B000-memory.dmp family_glupteba behavioral1/memory/2056-119-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1232 Process not Found -
Executes dropped EXE 8 IoCs
pid Process 1796 2127.exe 1488 50A2.exe 2872 InstallSetup_four.exe 2056 288c47bbc1871b439df19ff4df68f076.exe 2068 april.exe 2388 april.tmp 1340 textultraedit.exe 1028 7E09.exe -
Loads dropped DLL 15 IoCs
pid Process 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 524 regsvr32.exe 1488 50A2.exe 1488 50A2.exe 1488 50A2.exe 1488 50A2.exe 2068 april.exe 2388 april.tmp 2388 april.tmp 2388 april.tmp 2388 april.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2708 1796 WerFault.exe 30 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SecuriteInfo.com.FileRepMalware.15116.31352.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SecuriteInfo.com.FileRepMalware.15116.31352.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SecuriteInfo.com.FileRepMalware.15116.31352.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1760 SecuriteInfo.com.FileRepMalware.15116.31352.exe 1760 SecuriteInfo.com.FileRepMalware.15116.31352.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1760 SecuriteInfo.com.FileRepMalware.15116.31352.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1232 Process not Found Token: SeShutdownPrivilege 1232 Process not Found Token: SeShutdownPrivilege 1232 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1232 Process not Found 1232 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1232 Process not Found 1232 Process not Found -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1796 1232 Process not Found 30 PID 1232 wrote to memory of 1796 1232 Process not Found 30 PID 1232 wrote to memory of 1796 1232 Process not Found 30 PID 1232 wrote to memory of 1796 1232 Process not Found 30 PID 1796 wrote to memory of 2708 1796 2127.exe 31 PID 1796 wrote to memory of 2708 1796 2127.exe 31 PID 1796 wrote to memory of 2708 1796 2127.exe 31 PID 1796 wrote to memory of 2708 1796 2127.exe 31 PID 1232 wrote to memory of 2164 1232 Process not Found 32 PID 1232 wrote to memory of 2164 1232 Process not Found 32 PID 1232 wrote to memory of 2164 1232 Process not Found 32 PID 1232 wrote to memory of 2164 1232 Process not Found 32 PID 1232 wrote to memory of 2164 1232 Process not Found 32 PID 2164 wrote to memory of 524 2164 regsvr32.exe 33 PID 2164 wrote to memory of 524 2164 regsvr32.exe 33 PID 2164 wrote to memory of 524 2164 regsvr32.exe 33 PID 2164 wrote to memory of 524 2164 regsvr32.exe 33 PID 2164 wrote to memory of 524 2164 regsvr32.exe 33 PID 2164 wrote to memory of 524 2164 regsvr32.exe 33 PID 2164 wrote to memory of 524 2164 regsvr32.exe 33 PID 1232 wrote to memory of 1488 1232 Process not Found 34 PID 1232 wrote to memory of 1488 1232 Process not Found 34 PID 1232 wrote to memory of 1488 1232 Process not Found 34 PID 1232 wrote to memory of 1488 1232 Process not Found 34 PID 1488 wrote to memory of 2872 1488 50A2.exe 35 PID 1488 wrote to memory of 2872 1488 50A2.exe 35 PID 1488 wrote to memory of 2872 1488 50A2.exe 35 PID 1488 wrote to memory of 2872 1488 50A2.exe 35 PID 1488 wrote to memory of 2872 1488 50A2.exe 35 PID 1488 wrote to memory of 2872 1488 50A2.exe 35 PID 1488 wrote to memory of 2872 1488 50A2.exe 35 PID 1488 wrote to memory of 2056 1488 50A2.exe 36 PID 1488 wrote to memory of 2056 1488 50A2.exe 36 PID 1488 wrote to memory of 2056 1488 50A2.exe 36 PID 1488 wrote to memory of 2056 1488 50A2.exe 36 PID 1488 wrote to memory of 2068 1488 50A2.exe 37 PID 1488 wrote to memory of 2068 1488 50A2.exe 37 PID 1488 wrote to memory of 2068 1488 50A2.exe 37 PID 1488 wrote to memory of 2068 1488 50A2.exe 37 PID 1488 wrote to memory of 2068 1488 50A2.exe 37 PID 1488 wrote to memory of 2068 1488 50A2.exe 37 PID 1488 wrote to memory of 2068 1488 50A2.exe 37 PID 2068 wrote to memory of 2388 2068 april.exe 38 PID 2068 wrote to memory of 2388 2068 april.exe 38 PID 2068 wrote to memory of 2388 2068 april.exe 38 PID 2068 wrote to memory of 2388 2068 april.exe 38 PID 2068 wrote to memory of 2388 2068 april.exe 38 PID 2068 wrote to memory of 2388 2068 april.exe 38 PID 2068 wrote to memory of 2388 2068 april.exe 38 PID 2388 wrote to memory of 1340 2388 april.tmp 39 PID 2388 wrote to memory of 1340 2388 april.tmp 39 PID 2388 wrote to memory of 1340 2388 april.tmp 39 PID 2388 wrote to memory of 1340 2388 april.tmp 39 PID 1232 wrote to memory of 1028 1232 Process not Found 40 PID 1232 wrote to memory of 1028 1232 Process not Found 40 PID 1232 wrote to memory of 1028 1232 Process not Found 40 PID 1232 wrote to memory of 1028 1232 Process not Found 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.15116.31352.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.15116.31352.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1760
-
C:\Users\Admin\AppData\Local\Temp\2127.exeC:\Users\Admin\AppData\Local\Temp\2127.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 5602⤵
- Loads dropped DLL
- Program crash
PID:2708
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\DC9A.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\DC9A.dll2⤵
- Loads dropped DLL
PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\50A2.exeC:\Users\Admin\AppData\Local\Temp\50A2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\april.exe"C:\Users\Admin\AppData\Local\Temp\april.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\is-KIAKH.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-KIAKH.tmp\april.tmp" /SL5="$70178,1478464,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe"C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -i4⤵
- Executes dropped EXE
PID:1340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7E09.exeC:\Users\Admin\AppData\Local\Temp\7E09.exe1⤵
- Executes dropped EXE
PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD50de49b7358184b13c717ea9a823f12bb
SHA1a764efe549b694c7ce05773c55b7d582b6f4ba2d
SHA25648c26d758ee7acee07033f1583de83451a9e1f07facf958b786c654786f7f18f
SHA512d10361e573912aad2dd49791c14cb6eec6d271eb5353b9c500e2824eb229e96799ecc982e96abb3fbd610eef6cb55487873bbac9dfbf0a68872beac746e9044a
-
Filesize
3.0MB
MD50965f27ce1a0976b67118936d60395d2
SHA1b32863577cce4f46532ecdac4bfa8d5911740d95
SHA2562239355af6cb94a440df8a4db0208386a25a866adab4864a89d703a8101c063b
SHA5125a098d198fe29bbe5d1aca7c1ea86f0b1c5003e8aa845ff6e9e006a1676440b34ebba456024ff2ca70513ab13a144b901b2ad5eaa204fcd4223f92f20045326e
-
Filesize
2.9MB
MD5c4f218933cded080ee5bd66afe9a398f
SHA115bc5362800a09e3f2ae21b83708bc5e0585bdf0
SHA25644c8c035ff7a20198579b1952749a5359988944f5fdfa67f28c1435bbda9474b
SHA512321629cd203e3d47a03fcb4989da162e12dd72d039644e93ce816cda10f5a335bea61260cae61f81ed23003b4afa637d40c1fb3437a3427ca47a7b7afbbef859
-
Filesize
6.2MB
MD501a662109a24994cfed9daef68feddeb
SHA1df29b74541171333ccb76ab1f53f010cda1981d5
SHA25645ad76a00bebad5671ad39411a85e149d64cf44db0d0198ae59f42b3cb68e4ac
SHA51265a71aa14732467cb22372330df16ee5a39ff784684ffb74b383086d4e3b13ae77cf6899dded5e24da77ed6fc3c182564c4081a3e7d11c624783f1ed6505620f
-
Filesize
64KB
MD514ff4cfd65851296a419118726173236
SHA1df3ed686f3d7cea4e68de098c60f05355a48eefa
SHA2563ad83e03ac13770f03b6fa6cb398a693f9fdde6dd35304206d7167b39ae2e9df
SHA512507eb79257f44928202cbd20d503aae03cfbdc0b70abac12ef6bb0974ca4c950ab3c773609d3d035b6dbe8216598096c17dfc1fca32b5c974125cefd8c41ca3f
-
Filesize
209KB
MD5194d8318814d71e196c1b6af2a24bf59
SHA1e3c476bc0ffa062708623c5cb731be0861f752b8
SHA2566c4051e3e07f470bbb10a554745c5afb363b5ec7d464842eb0b818def4a88fca
SHA512ad7c792e569bd0ec1d4a8fa65cbda65d89958d9b975d9175f16d82d73851a3bd075c1d01a72457c34505415b6cf5cc849abfc73d9a08da5bd9fac02669f07abe
-
Filesize
2.8MB
MD538ffc828bfad53560c9452cd0478a03f
SHA1c01e858704510e985c8e3d63e22260adeb23b41e
SHA2560decc206e5a04d212f90db772cfb67a2c0cd981fa14e20349c3684a893575451
SHA512d611938c53c3b2adf7999e062e264f941fd23ad226e4299db577f6bf45920142be253474a1063dec6685b7f457cd33992de4f5875552947f227a0c8b723a3329
-
Filesize
366KB
MD5f98c75a2502a2f5251b262e4aeaf1c16
SHA10edb55ec7e7768a39f1bf37dc27aecd04507f63c
SHA256392ff6fc0a544611919098a630cebfd47ecd210cdc34c97081bfe31c938ba67c
SHA512b05969d381c66f06b3ec8af2a76312e3bf6cef34e84ef062685a16062ee50f0aa198a8d2d7641939ec2c66f08e3439357f15087eb51a7ef1b63a6683a129bd58
-
Filesize
704KB
MD5c55b4b3d8dc63b6db70cb3bab2e35d78
SHA1404f73bdb298ff79a327801603a83f060739d075
SHA2568ab8bc08226477e13a12836b2ba4238106e55a6da07e40016a11584f8923d3c5
SHA512c5932af3de17f695ebc912f9fd67b9b42141fb4543f818c317dbf1a7a7dbccf09ebfb4cb27b0dea434b945f0314bc8c13b185c6550c65ee5de90b38bec37999b
-
Filesize
1.8MB
MD5a84541841e8d381cefe71b9467c439c3
SHA14e45c5d8ec17818e67a9d1b65183be203d54b7bd
SHA256c4529e757bce9a52ff52cecff2b89344d33acc4cc3a23577b4f560396ab3beda
SHA51243b28773d2d5529577c21a82d520e01716625a90b734f750722ee97abd92a9845267ce02b41cf75f0f50d165020b278f76386efbe8106979c429047b4f54dd49
-
Filesize
896KB
MD541cba0216f1037ca607c9b6c541892a5
SHA1922f126eec2b7e47bcde6fc933e1a73df2377ac1
SHA25652ba534f97aec8376c1eb9caf2b1f6e3ef999847dcb2fbeba364bf8282c063df
SHA5127d103751d0e6b532d102533771da08c6b1113c8849796d1d50ce337173b373f2566f51a5d67409f94871494ab7329862bdb9a3b1e88f00ff90a10ddb10ebbaa1
-
Filesize
2.8MB
MD50bc4214e70803517face2cc3936d0291
SHA16f8ba49d97976145cdf2a5969975f9bc98dc413e
SHA25689caa650fa0db35d4c4647ae466f4c4e144feab589cbdfd3b3ae7ea3d422c316
SHA5120a6eb243552e2a4b1dfe11c740573afad32c287b9b6a77822d76d2addf0591262c2cebb80afdf374b51e5aeedcb257eb73f823360cf938e9d9b71d2ff2bf62c0
-
Filesize
4.0MB
MD5af7e759c136c2210868cdcda074fe0df
SHA16f09bef442789f07c23e70aea90bc18abaaa4a1e
SHA256d79ce700fbead0883a9635e12d0a0a3fe8bd256e6ee002f218870194e1cbb461
SHA5129c7f9c8043bc0b7e38349e73815d76eeec6fcb5b4451c9bc92360317cc632768c6d238004837f8d4a50bfdcb11081fb7ebe95a27457a49a569aeeb66df6011c1
-
Filesize
4.1MB
MD5abc868cf6f8183990f8d476dbe1224ba
SHA1b9226909d1c0472af5eabd6949232d509ecf38cb
SHA25617573c321796456afc4e0fdf9eb00326636410dbbcd2c4c92495ef39a2f48924
SHA512d1c1e5c11cb58430b8f9455fbbdb094fc51cdb75382b1e7d1b03c08936f553cfb73c71c9869428e8a77ad3e9de8cde15bbd733b4843cb9ed9dc394d1a160ba01
-
Filesize
2.9MB
MD5441e0b373665cbb5c31b83046144c19f
SHA1d8df44336a6933c8bbc8ef3e7417771a04bdf72c
SHA256cf5db7b441e8c5c899f808436d53848b2d37ba3167776902e3ad94a2629f7b30
SHA512e9afa8a09a5b9b32562c10c28348cac3bb25da25dff6bb638f2c1460ceb8ec517a1a291fbd2066de938adbce5787e068bf1454cd63f2113942bdca160aca2d96
-
Filesize
347KB
MD5fdbfc670cbaa530c028d21d3e1e9ac93
SHA1403c364112a731a9ab385d55ceebd553642366b6
SHA25600fd7954211ad9de09690b51918914cbb85298946a8ee28be4cc8fa2cd0a46c1
SHA5128bb357990a988fe1b45faf521fe155e4280ec19f49adaecccd111c34b00a6a6f0cdc4b4b2bdd8944e2abd2e72c84a686d5739ae27a2889adb41c03cc4302268f
-
Filesize
748KB
MD5fa84e57499ec4c1035373b00e2d1688b
SHA131ee3304a97b161b23993f1ab518e71977db1d24
SHA25671a710cb9f5ecfcb0cb5492cddd095a80a6c36e66bdeede5f56371ebcbf7740a
SHA512412527732c254d1cd7b2d6b0397e109a2ba2cb03b418d24abb2cfb449e3b01764439b6ad482e472de136fc268de3b1a42c3af4ff22dbd78d065002ad6eee983b
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
677KB
MD533da9dc521f467c0405d3ef5377ce04b
SHA15249d7ce5dfabe5ee6d2fc7d3f3eba1e866b7d1f
SHA256dbab8a7b2b45fc7001d5e34d3d45ccbe93a7591f12910281acf2c32f8c4e631c
SHA512a3093637e1d731eab58080e10706db1afbf6e79fbac6593733b61033f97875ecbe230311e9741d349625ec3a66a6435318846d35290db8cd00af76d692699a55
-
Filesize
960KB
MD58036e6116071f460b5c53be27dee03f9
SHA1ae76fcc6304450e8bb82e2dc9aa060cfa2cbb440
SHA25646a481b869a7b9c1b9f89ca03c38a6bbae5585d62e06db31f9baa3db8d4a1e22
SHA512ed01c47efb78646965f89df33668ba737e7b0488b66d2accec5ef523606a0c4d3037311e9572f7ed878d5b2c6d890e3aef7828670d3ad53049729b48b57d5c9e