Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 21:23

General

  • Target

    SecuriteInfo.com.FileRepMalware.15116.31352.exe

  • Size

    208KB

  • MD5

    9b10a29569abdddb99d729e07f51d62a

  • SHA1

    c152b192772a1fdc2dcf17faf4319fb0173ce55d

  • SHA256

    a550df762611e5384f725b245f433687a508e5fca325d5cac656e9328abab4ef

  • SHA512

    237b5c3f390030d256cba7af05f8b4d45f0c7459127891a12d3a644b28df2da09109325e32457e83a1af93885abd75fc9da79bb4864157ebc15275f6673617b1

  • SSDEEP

    3072:PMCZ3MKPMkeED9EqQvbMaOnrDN08QKuV9w1RBeg8+/yGYV:kCZ5MiD9EqQvZOG8QKOkRBeA

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 15 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.15116.31352.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.15116.31352.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1760
  • C:\Users\Admin\AppData\Local\Temp\2127.exe
    C:\Users\Admin\AppData\Local\Temp\2127.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 560
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2708
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\DC9A.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\DC9A.dll
      2⤵
      • Loads dropped DLL
      PID:524
  • C:\Users\Admin\AppData\Local\Temp\50A2.exe
    C:\Users\Admin\AppData\Local\Temp\50A2.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
      2⤵
      • Executes dropped EXE
      PID:2872
    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
      "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
      2⤵
      • Executes dropped EXE
      PID:2056
    • C:\Users\Admin\AppData\Local\Temp\april.exe
      "C:\Users\Admin\AppData\Local\Temp\april.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\is-KIAKH.tmp\april.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-KIAKH.tmp\april.tmp" /SL5="$70178,1478464,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe
          "C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -i
          4⤵
          • Executes dropped EXE
          PID:1340
  • C:\Users\Admin\AppData\Local\Temp\7E09.exe
    C:\Users\Admin\AppData\Local\Temp\7E09.exe
    1⤵
    • Executes dropped EXE
    PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2127.exe

    Filesize

    4.8MB

    MD5

    0de49b7358184b13c717ea9a823f12bb

    SHA1

    a764efe549b694c7ce05773c55b7d582b6f4ba2d

    SHA256

    48c26d758ee7acee07033f1583de83451a9e1f07facf958b786c654786f7f18f

    SHA512

    d10361e573912aad2dd49791c14cb6eec6d271eb5353b9c500e2824eb229e96799ecc982e96abb3fbd610eef6cb55487873bbac9dfbf0a68872beac746e9044a

  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

    Filesize

    3.0MB

    MD5

    0965f27ce1a0976b67118936d60395d2

    SHA1

    b32863577cce4f46532ecdac4bfa8d5911740d95

    SHA256

    2239355af6cb94a440df8a4db0208386a25a866adab4864a89d703a8101c063b

    SHA512

    5a098d198fe29bbe5d1aca7c1ea86f0b1c5003e8aa845ff6e9e006a1676440b34ebba456024ff2ca70513ab13a144b901b2ad5eaa204fcd4223f92f20045326e

  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

    Filesize

    2.9MB

    MD5

    c4f218933cded080ee5bd66afe9a398f

    SHA1

    15bc5362800a09e3f2ae21b83708bc5e0585bdf0

    SHA256

    44c8c035ff7a20198579b1952749a5359988944f5fdfa67f28c1435bbda9474b

    SHA512

    321629cd203e3d47a03fcb4989da162e12dd72d039644e93ce816cda10f5a335bea61260cae61f81ed23003b4afa637d40c1fb3437a3427ca47a7b7afbbef859

  • C:\Users\Admin\AppData\Local\Temp\50A2.exe

    Filesize

    6.2MB

    MD5

    01a662109a24994cfed9daef68feddeb

    SHA1

    df29b74541171333ccb76ab1f53f010cda1981d5

    SHA256

    45ad76a00bebad5671ad39411a85e149d64cf44db0d0198ae59f42b3cb68e4ac

    SHA512

    65a71aa14732467cb22372330df16ee5a39ff784684ffb74b383086d4e3b13ae77cf6899dded5e24da77ed6fc3c182564c4081a3e7d11c624783f1ed6505620f

  • C:\Users\Admin\AppData\Local\Temp\7E09.exe

    Filesize

    64KB

    MD5

    14ff4cfd65851296a419118726173236

    SHA1

    df3ed686f3d7cea4e68de098c60f05355a48eefa

    SHA256

    3ad83e03ac13770f03b6fa6cb398a693f9fdde6dd35304206d7167b39ae2e9df

    SHA512

    507eb79257f44928202cbd20d503aae03cfbdc0b70abac12ef6bb0974ca4c950ab3c773609d3d035b6dbe8216598096c17dfc1fca32b5c974125cefd8c41ca3f

  • C:\Users\Admin\AppData\Local\Temp\7E09.exe

    Filesize

    209KB

    MD5

    194d8318814d71e196c1b6af2a24bf59

    SHA1

    e3c476bc0ffa062708623c5cb731be0861f752b8

    SHA256

    6c4051e3e07f470bbb10a554745c5afb363b5ec7d464842eb0b818def4a88fca

    SHA512

    ad7c792e569bd0ec1d4a8fa65cbda65d89958d9b975d9175f16d82d73851a3bd075c1d01a72457c34505415b6cf5cc849abfc73d9a08da5bd9fac02669f07abe

  • C:\Users\Admin\AppData\Local\Temp\DC9A.dll

    Filesize

    2.8MB

    MD5

    38ffc828bfad53560c9452cd0478a03f

    SHA1

    c01e858704510e985c8e3d63e22260adeb23b41e

    SHA256

    0decc206e5a04d212f90db772cfb67a2c0cd981fa14e20349c3684a893575451

    SHA512

    d611938c53c3b2adf7999e062e264f941fd23ad226e4299db577f6bf45920142be253474a1063dec6685b7f457cd33992de4f5875552947f227a0c8b723a3329

  • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

    Filesize

    366KB

    MD5

    f98c75a2502a2f5251b262e4aeaf1c16

    SHA1

    0edb55ec7e7768a39f1bf37dc27aecd04507f63c

    SHA256

    392ff6fc0a544611919098a630cebfd47ecd210cdc34c97081bfe31c938ba67c

    SHA512

    b05969d381c66f06b3ec8af2a76312e3bf6cef34e84ef062685a16062ee50f0aa198a8d2d7641939ec2c66f08e3439357f15087eb51a7ef1b63a6683a129bd58

  • C:\Users\Admin\AppData\Local\Temp\april.exe

    Filesize

    704KB

    MD5

    c55b4b3d8dc63b6db70cb3bab2e35d78

    SHA1

    404f73bdb298ff79a327801603a83f060739d075

    SHA256

    8ab8bc08226477e13a12836b2ba4238106e55a6da07e40016a11584f8923d3c5

    SHA512

    c5932af3de17f695ebc912f9fd67b9b42141fb4543f818c317dbf1a7a7dbccf09ebfb4cb27b0dea434b945f0314bc8c13b185c6550c65ee5de90b38bec37999b

  • C:\Users\Admin\AppData\Local\Temp\april.exe

    Filesize

    1.8MB

    MD5

    a84541841e8d381cefe71b9467c439c3

    SHA1

    4e45c5d8ec17818e67a9d1b65183be203d54b7bd

    SHA256

    c4529e757bce9a52ff52cecff2b89344d33acc4cc3a23577b4f560396ab3beda

    SHA512

    43b28773d2d5529577c21a82d520e01716625a90b734f750722ee97abd92a9845267ce02b41cf75f0f50d165020b278f76386efbe8106979c429047b4f54dd49

  • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe

    Filesize

    896KB

    MD5

    41cba0216f1037ca607c9b6c541892a5

    SHA1

    922f126eec2b7e47bcde6fc933e1a73df2377ac1

    SHA256

    52ba534f97aec8376c1eb9caf2b1f6e3ef999847dcb2fbeba364bf8282c063df

    SHA512

    7d103751d0e6b532d102533771da08c6b1113c8849796d1d50ce337173b373f2566f51a5d67409f94871494ab7329862bdb9a3b1e88f00ff90a10ddb10ebbaa1

  • \Users\Admin\AppData\Local\Temp\2127.exe

    Filesize

    2.8MB

    MD5

    0bc4214e70803517face2cc3936d0291

    SHA1

    6f8ba49d97976145cdf2a5969975f9bc98dc413e

    SHA256

    89caa650fa0db35d4c4647ae466f4c4e144feab589cbdfd3b3ae7ea3d422c316

    SHA512

    0a6eb243552e2a4b1dfe11c740573afad32c287b9b6a77822d76d2addf0591262c2cebb80afdf374b51e5aeedcb257eb73f823360cf938e9d9b71d2ff2bf62c0

  • \Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

    Filesize

    4.0MB

    MD5

    af7e759c136c2210868cdcda074fe0df

    SHA1

    6f09bef442789f07c23e70aea90bc18abaaa4a1e

    SHA256

    d79ce700fbead0883a9635e12d0a0a3fe8bd256e6ee002f218870194e1cbb461

    SHA512

    9c7f9c8043bc0b7e38349e73815d76eeec6fcb5b4451c9bc92360317cc632768c6d238004837f8d4a50bfdcb11081fb7ebe95a27457a49a569aeeb66df6011c1

  • \Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

    Filesize

    4.1MB

    MD5

    abc868cf6f8183990f8d476dbe1224ba

    SHA1

    b9226909d1c0472af5eabd6949232d509ecf38cb

    SHA256

    17573c321796456afc4e0fdf9eb00326636410dbbcd2c4c92495ef39a2f48924

    SHA512

    d1c1e5c11cb58430b8f9455fbbdb094fc51cdb75382b1e7d1b03c08936f553cfb73c71c9869428e8a77ad3e9de8cde15bbd733b4843cb9ed9dc394d1a160ba01

  • \Users\Admin\AppData\Local\Temp\DC9A.dll

    Filesize

    2.9MB

    MD5

    441e0b373665cbb5c31b83046144c19f

    SHA1

    d8df44336a6933c8bbc8ef3e7417771a04bdf72c

    SHA256

    cf5db7b441e8c5c899f808436d53848b2d37ba3167776902e3ad94a2629f7b30

    SHA512

    e9afa8a09a5b9b32562c10c28348cac3bb25da25dff6bb638f2c1460ceb8ec517a1a291fbd2066de938adbce5787e068bf1454cd63f2113942bdca160aca2d96

  • \Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

    Filesize

    347KB

    MD5

    fdbfc670cbaa530c028d21d3e1e9ac93

    SHA1

    403c364112a731a9ab385d55ceebd553642366b6

    SHA256

    00fd7954211ad9de09690b51918914cbb85298946a8ee28be4cc8fa2cd0a46c1

    SHA512

    8bb357990a988fe1b45faf521fe155e4280ec19f49adaecccd111c34b00a6a6f0cdc4b4b2bdd8944e2abd2e72c84a686d5739ae27a2889adb41c03cc4302268f

  • \Users\Admin\AppData\Local\Temp\april.exe

    Filesize

    748KB

    MD5

    fa84e57499ec4c1035373b00e2d1688b

    SHA1

    31ee3304a97b161b23993f1ab518e71977db1d24

    SHA256

    71a710cb9f5ecfcb0cb5492cddd095a80a6c36e66bdeede5f56371ebcbf7740a

    SHA512

    412527732c254d1cd7b2d6b0397e109a2ba2cb03b418d24abb2cfb449e3b01764439b6ad482e472de136fc268de3b1a42c3af4ff22dbd78d065002ad6eee983b

  • \Users\Admin\AppData\Local\Temp\is-D47AO.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • \Users\Admin\AppData\Local\Temp\is-D47AO.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-KIAKH.tmp\april.tmp

    Filesize

    677KB

    MD5

    33da9dc521f467c0405d3ef5377ce04b

    SHA1

    5249d7ce5dfabe5ee6d2fc7d3f3eba1e866b7d1f

    SHA256

    dbab8a7b2b45fc7001d5e34d3d45ccbe93a7591f12910281acf2c32f8c4e631c

    SHA512

    a3093637e1d731eab58080e10706db1afbf6e79fbac6593733b61033f97875ecbe230311e9741d349625ec3a66a6435318846d35290db8cd00af76d692699a55

  • \Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe

    Filesize

    960KB

    MD5

    8036e6116071f460b5c53be27dee03f9

    SHA1

    ae76fcc6304450e8bb82e2dc9aa060cfa2cbb440

    SHA256

    46a481b869a7b9c1b9f89ca03c38a6bbae5585d62e06db31f9baa3db8d4a1e22

    SHA512

    ed01c47efb78646965f89df33668ba737e7b0488b66d2accec5ef523606a0c4d3037311e9572f7ed878d5b2c6d890e3aef7828670d3ad53049729b48b57d5c9e

  • memory/524-28-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/524-33-0x00000000025D0000-0x00000000026F2000-memory.dmp

    Filesize

    1.1MB

  • memory/524-32-0x0000000002490000-0x00000000025D0000-memory.dmp

    Filesize

    1.2MB

  • memory/524-36-0x00000000025D0000-0x00000000026F2000-memory.dmp

    Filesize

    1.1MB

  • memory/524-37-0x00000000025D0000-0x00000000026F2000-memory.dmp

    Filesize

    1.1MB

  • memory/524-29-0x0000000010000000-0x00000000102F2000-memory.dmp

    Filesize

    2.9MB

  • memory/1232-4-0x00000000025C0000-0x00000000025D6000-memory.dmp

    Filesize

    88KB

  • memory/1340-120-0x0000000000400000-0x00000000005AA000-memory.dmp

    Filesize

    1.7MB

  • memory/1488-43-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/1488-44-0x0000000001150000-0x0000000001794000-memory.dmp

    Filesize

    6.3MB

  • memory/1488-66-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/1760-1-0x00000000004F0000-0x00000000005F0000-memory.dmp

    Filesize

    1024KB

  • memory/1760-3-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/1760-5-0x0000000000400000-0x0000000000473000-memory.dmp

    Filesize

    460KB

  • memory/1760-2-0x00000000002A0000-0x00000000002AB000-memory.dmp

    Filesize

    44KB

  • memory/1760-7-0x00000000002A0000-0x00000000002AB000-memory.dmp

    Filesize

    44KB

  • memory/1796-18-0x00000000000B0000-0x0000000000586000-memory.dmp

    Filesize

    4.8MB

  • memory/1796-17-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/1796-19-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/2056-119-0x0000000000400000-0x0000000000D1C000-memory.dmp

    Filesize

    9.1MB

  • memory/2056-111-0x0000000002660000-0x0000000002A58000-memory.dmp

    Filesize

    4.0MB

  • memory/2056-116-0x0000000002660000-0x0000000002A58000-memory.dmp

    Filesize

    4.0MB

  • memory/2056-117-0x0000000002A60000-0x000000000334B000-memory.dmp

    Filesize

    8.9MB

  • memory/2068-72-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2388-81-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2388-118-0x00000000033B0000-0x000000000355A000-memory.dmp

    Filesize

    1.7MB

  • memory/2872-70-0x0000000000400000-0x00000000004A5000-memory.dmp

    Filesize

    660KB

  • memory/2872-69-0x0000000001C40000-0x0000000001CA7000-memory.dmp

    Filesize

    412KB

  • memory/2872-68-0x00000000002D0000-0x00000000003D0000-memory.dmp

    Filesize

    1024KB