Analysis
-
max time kernel
133s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-05-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe
Resource
win10-20240404-en
General
-
Target
538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe
-
Size
693KB
-
MD5
83741bbca9631aa4925203fbddc0ad7d
-
SHA1
f636ef4f3279cd49d1036a70293f8390ecc96a3e
-
SHA256
538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185
-
SHA512
55ee1b215e46024c3bb3722518d476be148c3c48d60d744c53fecba48b7a02ba9ab2f58b436b9657e4748d72d6696bc5e6f477f7805f91fa66841debd00b9a5b
-
SSDEEP
12288:tXBffJMAUAyQAg8Y3ElBvCm5KUwzq2uE2na367joJqTOX7gXX7:tXBfmPQXMqm5wzq2uDa367joJqaXQ7
Malware Config
Extracted
smokeloader
pub3
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Labs.pifdescription pid process target process PID 3136 created 3416 3136 Labs.pif Explorer.EXE -
Executes dropped EXE 2 IoCs
Processes:
Labs.pifLabs.pifpid process 3136 Labs.pif 4752 Labs.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Labs.pifdescription pid process target process PID 3136 set thread context of 4752 3136 Labs.pif Labs.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Labs.pifdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Labs.pif Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Labs.pif Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Labs.pif -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2084 tasklist.exe 3808 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Labs.pifpid process 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exetasklist.exedescription pid process Token: SeDebugPrivilege 2084 tasklist.exe Token: SeDebugPrivilege 3808 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Labs.pifpid process 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Labs.pifpid process 3136 Labs.pif 3136 Labs.pif 3136 Labs.pif -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.execmd.exeLabs.pifdescription pid process target process PID 5060 wrote to memory of 2880 5060 538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe cmd.exe PID 5060 wrote to memory of 2880 5060 538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe cmd.exe PID 5060 wrote to memory of 2880 5060 538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe cmd.exe PID 2880 wrote to memory of 2084 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 2084 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 2084 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 3056 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 3056 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 3056 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 3808 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 3808 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 3808 2880 cmd.exe tasklist.exe PID 2880 wrote to memory of 4584 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 4584 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 4584 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 3384 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 3384 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 3384 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 4612 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 4612 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 4612 2880 cmd.exe findstr.exe PID 2880 wrote to memory of 684 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 684 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 684 2880 cmd.exe cmd.exe PID 2880 wrote to memory of 3136 2880 cmd.exe Labs.pif PID 2880 wrote to memory of 3136 2880 cmd.exe Labs.pif PID 2880 wrote to memory of 3136 2880 cmd.exe Labs.pif PID 2880 wrote to memory of 4272 2880 cmd.exe PING.EXE PID 2880 wrote to memory of 4272 2880 cmd.exe PING.EXE PID 2880 wrote to memory of 4272 2880 cmd.exe PING.EXE PID 3136 wrote to memory of 4752 3136 Labs.pif Labs.pif PID 3136 wrote to memory of 4752 3136 Labs.pif Labs.pif PID 3136 wrote to memory of 4752 3136 Labs.pif Labs.pif PID 3136 wrote to memory of 4752 3136 Labs.pif Labs.pif PID 3136 wrote to memory of 4752 3136 Labs.pif Labs.pif
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe"C:\Users\Admin\AppData\Local\Temp\538af0e39f24f16e4e52cad03295a359304d8f458c1fe18d0681e884112f2185.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Origins Origins.cmd & Origins.cmd & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c md 551157254⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V "SlutSteLouisTranslation" Cyprus4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Breeding + Fuji + Weather 55115725\s4⤵
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55115725\Labs.pif55115725\Labs.pif 55115725\s4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55115725\Labs.pifC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55115725\Labs.pif2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55115725\Labs.pifFilesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55115725\sFilesize
242KB
MD5832180873e27da9b7a218ec02099691a
SHA109a26d9ac5619df11650bf11e41c5dd96ea371d2
SHA25619e0ed3240d70f9ac0602c8507cdcb12b448d8f4aea26f5f0a6913f9517f1a3f
SHA5122abe2fd0d9e423b75d1d49d28711402c12c20ba7a88aa0c5360ddded3bac92f7f07b4fca874232e8f8c108427f3264e179a1a2f6f96f79aab1f8f07736f92ab6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\AdvocacyFilesize
40KB
MD53e0a5939f55f64dc128ec03642f09392
SHA174fc5265b92bf9b807e023e968f94528904918e6
SHA2564b0c83524efd0db079aba2519aaf676b784207ac84a7de69918e56c698d81a91
SHA512ea6eb18fb83dfb46c5461e518a33e4a2279c803931e13fd5dd9d962eb4af35637c2011708b32f1d0457798bdad40f59dfb35ee770aa472cab2ef4901eddb0082
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\BreedingFilesize
75KB
MD53ec78865d37dba4270b52656bfcd5d51
SHA1761877d874e583014bfe9c5f0d5ba71ba4f788a6
SHA2567c8734f0a4571438a469037571f7ad8a7513e779fd65f3d547d1426bad7b2034
SHA512cb7cafaa16c342f9d5e4a3c9bcebe32b1b2106ad811132be75a4c9f9222fea9ddc5ba5fb0c9cef6626c01e81215f550c060e4300e9d64d83065e806b783e80c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\CyprusFilesize
210B
MD5e5ecf7084f37757a977cb7854faf0dd2
SHA16778ea5ac5ecc59171883c2aa7204373f46c5fb1
SHA25610d22d0f44bcdf23a31d0097069e1d095a86e2113580bfc61f50b7ac3218a4d2
SHA5127f4eef0637c68154be4341c02da291e8b81e64ecd7ed5cba5d30a2e1a2e63839c1682fdade36a9da06124321aec610efaf23b4b5fcdd1bf4c6be104e7c0d9ceb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\FolkFilesize
121KB
MD500425db818e6fd2f0eeb0cf37469b749
SHA1d9bd6e0afca273aa8a931360c2f91c0d9d1463a1
SHA256da879d5eb37e5c0ef62422b95adb8aa39607bb6c6d1efa817cb8353633b8d0eb
SHA5129b8d7aa19308b7376b4933e09613bac281d0ab332bce661b7e590f6568519c66a6d307883b3274e6668ad61b4ee52e519d8a574f6202ad827b9f0a2aa8366721
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\FujiFilesize
60KB
MD5901f468eeda506282d7906687c36ef22
SHA10fb000fa798d648c1309cc6599692ed6ac4d4990
SHA2562f64e2c562e065ae15a95be85d128e6f99f6d201b3b18a8cf5dbb1ab8cb87d62
SHA51217b4768ce6075ea83b774cf37bc2c2f2b7f6b78156c883cb6fa38422513fd8e19e03556a5baf549e31b4f02de78638a3f480421440f4e38ea32e8cd014cee0e0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\MindFilesize
98KB
MD583aeea636c54d733cc32ab493a5364d4
SHA1545c1357944c51e9f8d2110d01dfa2076a716613
SHA2560d5602ba1e91c3672992926d40ade260db5df228af923df30c5bf4242df2f133
SHA512f61acfb0b7ace3331945dd1b623fed445b8e2641380861708d1146ca595bb921b81025f9e39aa8c94f7fef20635f009fd8bd4697227f61ed7b5dee56466b616a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\OrdersFilesize
221KB
MD5634d131aef5fb9666cdcaf3c8c2c4260
SHA187200be917ff801478dea404ef60980c45d05cde
SHA2564536f5904c52e8e2b0b7aa3c5cf2527fe09dad507a40335473d4386eef02e0d7
SHA512aa87118cd7cf36b567d58b0db75bf3e2058c8e3f7ace69e8be0e7f79e10ad316101bbdd3facaf9e725b75e4b755b8f674c1070a51da4dbc0720f4d1de1dbd3c0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\OriginsFilesize
23KB
MD514dbb5fcfe93369164f6423ef2a9a618
SHA1c5d414a05eecfd9ba26ede311dbe0c6addc62f79
SHA2566cb0f1e1d71431257f46db15167cd8bf22313e6ab3425bad00c64ea918f213a5
SHA51228e64e8d41da778cd1ba5c29667fd54f3ca5af276d87f8aa3d14ec77a1c15e04f5a58d7c0e5df8807d2c5381960f3fc25394f949365d09ebf8455a63470f2e8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\TittenFilesize
104KB
MD5237d2f88a43c21c9bc5599be91b3571b
SHA1e94251dd329300f7c74631cdaafd5f504c4866fa
SHA256698e3aba58edb38fb5c26cb561c65811636a18f8dd28edbe2cf9fcba87df229c
SHA51279249b8a15e807c2af0423d2fb5615d96e95ee1a7e4e6e10fa196838194c1ee16f11c41d5580c9d40a693937fecf392e1c607439e3012bb035a99fa7a1334213
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\TowardsFilesize
288KB
MD59747e2f0863c6acee2cad8e96980658a
SHA13da9cfb884a513a5ecd9138d09287055a423d110
SHA2566f47415606c5b750d66c7340f65a3fecafe28b2e7a83dadc3dc154d72b727fff
SHA512a48acf816e1d607925a549b904a52665c5aaab37a3a9f198183e78c7ebff22806c1d74b934b01298da82b5701d553d1da4ebf1862099ed0091cedfe0571bb744
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\WeatherFilesize
107KB
MD5c7980f56319f536020f8bef4bb8974c0
SHA1adb8adf76b9add121cefbce1c58ca5510d21f671
SHA2569e5bdbe0a3f24b4700e379f38fe40928ebfe69fc2fb2e9d2fd942b6cf7991545
SHA512cb37715791f3e3d8c4bd30ccc8e3e8e84f4a8720467f80e742d70aa6e9755f1ecec9db8cf55d4d8f8572dce818f55ff7c3771bbacd6fa597c4db04ae56389e70
-
memory/4752-40-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/4752-41-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB