Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 14:39

General

  • Target

    150e9ffdac7f2361c2efa735929aa268.exe

  • Size

    776KB

  • MD5

    150e9ffdac7f2361c2efa735929aa268

  • SHA1

    3ed43e5fb5cd202d91fe31c4a0f8674e5fdb0759

  • SHA256

    d54259b35ece6e39b159317128bfd62f88abbaadd92537379c4bae078e82fe69

  • SHA512

    a56ef522fab3213f2f1d5a15d92615f0a039bf8f8c113e36e38f254b6d58185e5aa0449384d15ac52f1f6ac8d07159ac05d245926fba14ac61462e0911cb39a3

  • SSDEEP

    24576:pMwUwtgszGQgXxHjejMOlF3NdRruHycftxFA:pMwhd0SZlp/YtTA

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry class 20 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\150e9ffdac7f2361c2efa735929aa268.exe
      "C:\Users\Admin\AppData\Local\Temp\150e9ffdac7f2361c2efa735929aa268.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k move Hwy Hwy.cmd & Hwy.cmd & exit
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2516
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "wrsa.exe opssvc.exe"
          4⤵
            PID:2504
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2592
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
            4⤵
              PID:2676
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c md 1181
              4⤵
                PID:2528
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V "perulesserpalacecorrespondence" Video
                4⤵
                  PID:2536
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b Outlook + Imports 1181\U
                  4⤵
                    PID:2020
                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\1181\End.pif
                    1181\End.pif 1181\U
                    4⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:1200
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 5 127.0.0.1
                    4⤵
                    • Runs ping.exe
                    PID:1276
              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\1181\End.pif
                "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\1181\End.pif"
                2⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:2148
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {5396995C-4AE1-496A-B0DE-2A425BE460E6} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2016
              • C:\Users\Admin\AppData\Roaming\huricau
                C:\Users\Admin\AppData\Roaming\huricau
                2⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:2056

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\1181\U

              Filesize

              221KB

              MD5

              d47cb3f68132f19369656bb4f968c833

              SHA1

              51fa6ec2db958c68463ee45040f8f7207222dd20

              SHA256

              ff61738c19939a7408bbf2885b5d9a6ee9201d6bb71e1db6f4442d976589605d

              SHA512

              7118d378fdc473fe72f8e045cc08f4dc1ddc930f1628c7aa4ea2e77a475c6718f5d5f7bd8399bf3290130dba5a64d6af4f0de5cde65a9b86f8ceb3fde1704382

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Agrees

              Filesize

              62KB

              MD5

              8dcf0ec428376a2bf753bbfc5d6778ae

              SHA1

              2d4647f5c7983425561915d0fd48ce7896af1038

              SHA256

              4da04943476417fe8b9dab26b5b23496a921b3505f405c51d8c6b5f5ba8ce31b

              SHA512

              8eb62ae4dba92fb7d75fe196c95ff5d1f1b4172b7dafd55a27de2cd268ecefb04eb27d712556e8e4d17a7d5e3d9032d1b7ee0d7adb643a702f066b78fdaf9dda

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Capability

              Filesize

              16KB

              MD5

              7f448b99739213fc83c724547dc384d5

              SHA1

              fb36b6d68a52e2cb31da6949e8fbd0c9a3a8d0aa

              SHA256

              9ab1297161e801881bb75276e562e6b91a822df226a507be927e102d3706d2cf

              SHA512

              15b2f0636de847d1becd116f05b4d0f9f73940d64bfa9c69889b0a57c7c219f9d607cd4cdd04abca72d8aa96a116b33a5dbdda8e6f5f794dea1306fc54a58379

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Charging

              Filesize

              65KB

              MD5

              3091af9118ae26ad838b8d32f9fd8269

              SHA1

              4e0fbfa7f5316e7459f4431842fcee0433df385e

              SHA256

              d733b28fae8e531edf10b4175b00f1a9c333e06dbd950f74980977eb0e17ab8e

              SHA512

              43a24d9c3799c0b4a40b8e144ed13a05d31a92c03cd095efa9144800865566bbf851ef45aeb67d10a7912480fb0253d4e21b556794a8c19fdad0317377e73665

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Confusion

              Filesize

              8KB

              MD5

              3845cae93bf3f8c55bdaa2aceffd4742

              SHA1

              03b768473c8cc7cba6a073d79557189f595ff121

              SHA256

              df043072990892e2d5a70b214d924bc2db03fd838bca7d8fd283c8e50d31e380

              SHA512

              425f4d21969a0caade46856aadc40c285719f838f362499faa1fa3a39c63ac8af7ff84ac85d91313ee5bd0e57a8ca389cb1bc64327ffd1bd92732d9be0f163b2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Documents

              Filesize

              44KB

              MD5

              1f10a9c5618faf2a6fe60c968e51c785

              SHA1

              0bea51e44df6ab4331058c82cb7f1dcf0b64895e

              SHA256

              3ad1a2235b6b0deb7c387329723c4f5cf36c4032977bb5bccf90a56a90769f60

              SHA512

              532a307da30f88f68093f6830a592d46e2702b6cc54941dfecdf6161dd77c6be14f2e23bba67665b62f86f384707cdcbd714d1c5443756db15f85b0fb96019f9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Encounter

              Filesize

              45KB

              MD5

              c59bbdd6e7860f60ac0f5968abcfecb2

              SHA1

              145cfbfc647bf26a04fd0e1a6280ba827a5995ce

              SHA256

              356996ada99749863fbdf577307bd29288bbb20c6eb3f5bc3985d5055a8b0b74

              SHA512

              388ade789ee78f8d235ff309507cce34443c5cde08c3bb10f6bc8f7fb5952af613915b464950eed7447dd549e8deccf72c7fb940500daf62cdb893465e563df3

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Final

              Filesize

              42KB

              MD5

              597754dc836787de4bac9cf2db5d3e34

              SHA1

              fe4c82d2a35e26222d58f1ce8f8c95d2091637d7

              SHA256

              511364a6dee2b2b1524dd4d1ef5d94a3ff70d7a24121ee38ea68e5820ecba47d

              SHA512

              7a26feca330d14e237494d1b462c176d4844ff6dc874af142b77af7cc7c70b1cb999bbcb2f2bac18b9250beff249459ecf8c69927a44a17b66a0b4714822e342

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Goal

              Filesize

              48KB

              MD5

              108d75e7972aaa42682547974686163a

              SHA1

              cc31c1feb416557f1d4f4647000fdaed7df6fd5e

              SHA256

              44616ac50fb81013e90d95df4af787d0aaa70d8ff6f9b81f83fa4aaa03e9f97e

              SHA512

              1b906df98eac64cc107c7837c8294c963a14dfe5e8ea619b35c0cd0c91c5ee78c6db3b65919a3bbd2a694ea15356efb490c45bf0eb2294459e457bf2e875f486

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hormone

              Filesize

              62KB

              MD5

              a13a0fd9a4edb4290c8a0265f0dce304

              SHA1

              a66fe66b666fce86bce99e1eed4ae972c67a81cd

              SHA256

              700fa0779f67665a1c5737ddfed7c0a8aa42cdfdf76d660bb66f944fa47ca295

              SHA512

              68ef1fae3162b3e63694a579499c275823f88065481f63bcc065f3c0e656dfbb9060dd145ba55d76cd8b9b8f96fcb5cd225c16f93d00f804f8575553b1b19564

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hwy

              Filesize

              16KB

              MD5

              a08db366ff5035c09967e0e421cf2177

              SHA1

              a0edeed66ce1cdf044d7b9c169e0d8612a083514

              SHA256

              42359e3c847a71813923214f4dc3a550ecfc71042339132c599339ecaa72c5c1

              SHA512

              92e930f777a6d060623703892549ab414bc7a9ef83c633bb9d4f0d7091a375f98abedca74007b325403fd10cbc562708bf80486f6905491a8cb336274a4dc20f

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Imports

              Filesize

              76KB

              MD5

              b1ca45983ad3737f17571d90105c6812

              SHA1

              e12a927c8577af34931df12313498538858145e7

              SHA256

              c3e207c75f0773306412c63cedd5465ec8b2a4b75a8b852ec763ba37b6045912

              SHA512

              ef62485ce5c17824ad95b725cd088e50efdc1ebca13f540cd92f8e29286eb42d916805fc3e04f0158f920e3959818115eff81f8f6bad8b111dc1e06d5b4c1fc9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Inclusive

              Filesize

              28KB

              MD5

              d5b404d99b165ea552cb83b276df8345

              SHA1

              ae69f78cd36d0bd0c9bec3dfc4ed938fa75f8d6a

              SHA256

              c44f28df94a7f749db47b044c0269197d7a71437e7391624a94e801c73ce89e3

              SHA512

              351929f512a328d101c978079adcec5e7694b3cb6713cbca712f5be6a3a0103bdda5e84a794261653a16908d5249d255ba5c79ea2a86c8d871e7ead490634ad6

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Large

              Filesize

              35KB

              MD5

              5c0031e49707adddac84958d9fe7d87e

              SHA1

              3f2707da8132868fb17fbbfe524b49e3147649de

              SHA256

              a51d5a13da08da201cfa532dec4c75cee6e4262319181a55068d0602ab601aaa

              SHA512

              7ea4eecdcded1e7dd73a8dd743f1cfdc7eb741af9e91302d63e9e616de4adec8537f6443df26b517b97b7e0c140a6b78b387db43dfc4b3131c98a283758aa211

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Lebanon

              Filesize

              42KB

              MD5

              7d24837741341cae2ff6e128f05c68bc

              SHA1

              c00d1210fd002adab7dce03c83cce4372e1272c8

              SHA256

              df71ec9eadeb3acbb56ef804912ed4d00e2f6d6595835fc9e9ab822dd8d28610

              SHA512

              5692138553cfb4e0bab685f664c896b2ed7d71972424e8e8a55f46a0a74471aac1f545c547aca428a2b979faaf2e1df675a1b7583f988e36b32df4102e10d553

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Master

              Filesize

              20KB

              MD5

              0c55fd3803e15f8ecb82b7be5b0b60b9

              SHA1

              36d65a1df5322c44d19710ade27d3630d85bb4b5

              SHA256

              99ad54e17eb39acc10f312dec1c97f3304c9ca7a7aece9445189c0a289a1e831

              SHA512

              32e1370dd0db29cabcd35b413344fda56c5efef1791dda9c27d4ad88c90b1a19c31b20d7c5882991daba2aa03148e20ce68305490f89b42ed67092088f1be060

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Outlook

              Filesize

              145KB

              MD5

              e2ee4c92015abe2677396216a4fb86ac

              SHA1

              5acd947f6c9cc607fecf5ce07929bb9ee9c24658

              SHA256

              0a3ba8b374bab00a7a25cfbc0d362bec30a85a5c19167050a5902cc01b634c43

              SHA512

              a53b4bd82197d1d9c520950a6b0e063c2bb2e95877246781453b3ec15c7d46510580ddc42a8c4e4991e7180037d5a902e195792f58b9a62ff57fdeb61916e55e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Performs

              Filesize

              41KB

              MD5

              2d29139b7632a63d796d2f98c7edb7c9

              SHA1

              d5c8791bcbc6237e04525eb5c9ac9df34da19132

              SHA256

              25d0c37d809df03ea5b5ed99f83674928a62c0511f726d078bc6f7efb723a0b1

              SHA512

              f663f9e356ea64e3e0805973292df438742d15248b5fc5dd9137bfad108d9e38eee990a686fb5bdafd514744c9c4055d21c7fcd3a39ee455818ad72a85d755ac

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Phenomenon

              Filesize

              58KB

              MD5

              963a4f36bb66b11b13a128a5242b90b0

              SHA1

              77a139bf949b509f01e7620c5a1f83678d905f1d

              SHA256

              912ee8a0a03bc4612dc42662b2a17032d5787209520ae7e3a93a6c02f5799a79

              SHA512

              bbfe95f594726b638a01d66d754031329475a0c5b8e462f507363dbe100e933ada408b3c6a61a39ffc8f07034cb4d3e1ac0945b9dd3e0f97df462275c55160bd

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Prerequisite

              Filesize

              67KB

              MD5

              c3f2f9d2c58e5c65a456d712a04805ec

              SHA1

              467ade6888e946ecdce48ac8a9a46cf3a00fc0ef

              SHA256

              67b8c664c1144a63c24084164cad6aa809959989a6e1f9ac5f34988c49ca0e65

              SHA512

              58307b6047b97f0f31b8699e61eed671adac47104e9161deb32682f8c8df4fd8fd6872ce76c2389d29b00e13661ffa06019b291975ac0f6b1c1820e1f794c154

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Projected

              Filesize

              20KB

              MD5

              768556fee102950970cb3685a712e6c3

              SHA1

              4325ab836343d850df7f987c54c112291e5fc181

              SHA256

              5aaeed715f0fb58eff0bf70f387be141b3d14d5a909b49e9db7e2b095edd320c

              SHA512

              ee46a664080f1bcfd585417ef8a33197f159053ae856677e88dfae6cc89597dc6b31aa2f01fd6cfd7f1fe2307db5916dc95139920905c7a85307494989653480

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Purchasing

              Filesize

              53KB

              MD5

              8a18d0c184a6f1acf741cc330c405eec

              SHA1

              75686776366fc6aabeff430322ae4cdc0e413ec6

              SHA256

              fb79a23ff6f19be3905e3bd5d455a62d3adf3aa77dd65b2c6067f6f3eb8fd07a

              SHA512

              b4162d4c910d8393cb77c3183744d35c48bfd10b61048f268ffb81fc343b45c5717dd3b12844602a11a3cbfb29a5503192e407a757687c1ec2bb9269a5b63c71

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Respectively

              Filesize

              32KB

              MD5

              7190ec4f81336eee07be8652be327351

              SHA1

              c28388cfae63260c52574176185251a434853d1d

              SHA256

              494632eb8042259018f22bb23d2bab18de989fd505a92129d766219515cf3126

              SHA512

              eb7fa8654e016246df70f9470fce359e8e5d2fc7dbe06f234ee5188859d76bbd6d379b4cc98ca6e68872ce621a2d86c1b0b39448f978d85e7ef1a5878abc94b2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Seems

              Filesize

              43KB

              MD5

              1d33a1298b5467bdccf0cd7dd5ea1236

              SHA1

              715233f3a23ba355020aa01c029c47691c6c2cc0

              SHA256

              a4876320f65e332ceac09e0c83638b209ffa1cd3806057bbd368c8f5079c9875

              SHA512

              605b5d78ff761f8942433c98ed0678d9392b359e4cd99e9df2f62cbd401294371b44b3c34b3cf747a0bb4da1eb9b5e8de015c89da9fd9566d87243040424c4e7

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Std

              Filesize

              8KB

              MD5

              620009f4a149cc8f565258bdbc9ac70c

              SHA1

              e1bf184ccb41b2b5cd192329653aad5fb606ac16

              SHA256

              0980c717933ebc993368d15b3ba4bc5a71daf3fb778e84138193ad0f3a2715a1

              SHA512

              09960e0aefb2e9057426dfd5725e440f729316d586ab8dc6291aed762094905f2a929164a2ebd933bf7a3ee2af4dfd00ab927abbfeb3f108b10e81171d483ee3

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Therapist

              Filesize

              24KB

              MD5

              9d56f29524bd8ef16b2e3f8d57490206

              SHA1

              37a5a5fccb22403b6aa4430417ec3d99a4a4110a

              SHA256

              fc2399d47edb8c66469bb25060da2c1f25de01e21af40ce9a29558d3a3a3dae3

              SHA512

              a1488388505da6aee2d7fe3bc7a8239beaca4d6472ee40cffa02a657d5489b2621fcb65304fca94fb04c94ae9a069ae28994fe00191fad986d58f45ae77ef6a5

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Video

              Filesize

              143B

              MD5

              835d7d5ea4efd26937ea1894231418ca

              SHA1

              b131d21f7fc04e9b0f9d1e047307bee3581ebf1f

              SHA256

              47983be9149d6792688aa72763f2e941a768af9875aca3e1ca18f0aae75921b2

              SHA512

              ac93d8d78e5d3f55dc68029f4382693955429eb765fb442c1ad9b12e56ea7104cf452192d1c30d90d66454f2fc83769b0b82d0083de86b926b24a1487a447690

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Yearly

              Filesize

              61KB

              MD5

              156def4bf859fe09993c29354626891c

              SHA1

              c0834c05a615665a7e6cfe8df75937e15f3c62da

              SHA256

              a771fd25611b7fe3a6eea8ecd5201b6ecf202943ff55c937d1431560ddc36ffb

              SHA512

              470aa4de9ebf1372120ea1ff8a57dae250816da724eac63357e32c3122430d5c992448817028d385c5ab01a4ce6d10eb093801e96564fe97662e3d813a7ae889

            • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\1181\End.pif

              Filesize

              925KB

              MD5

              62d09f076e6e0240548c2f837536a46a

              SHA1

              26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

              SHA256

              1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

              SHA512

              32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

            • memory/1324-84-0x0000000002620000-0x0000000002636000-memory.dmp

              Filesize

              88KB

            • memory/2056-93-0x00000000049E0000-0x00000000049E2000-memory.dmp

              Filesize

              8KB