Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 03:27

General

  • Target

    90d841da88320cac9daa43c1af2de6e5e1156cb44727c2fc1121e33ce6c7543b.exe

  • Size

    2.3MB

  • MD5

    2d1fc8d83178bbbe12c246412224dc12

  • SHA1

    c573fab55dab8527b94e2679cdd4d97192c12601

  • SHA256

    90d841da88320cac9daa43c1af2de6e5e1156cb44727c2fc1121e33ce6c7543b

  • SHA512

    2ea5faf7fb6feab88694ee67b75e1b7b5544e995820d87c2453a9010c890a64165e51581c3dd6fc1029551ac6aa35cf5004c658ccf037f3cb94476b6dd4656e7

  • SSDEEP

    49152:oDrqDD6k5mlz7mjIbO7SXxRJd+2mY09ZlAONpv1A5H:tt5k3mF7SXxRz+2lavWH

Malware Config

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90d841da88320cac9daa43c1af2de6e5e1156cb44727c2fc1121e33ce6c7543b.exe
    "C:\Users\Admin\AppData\Local\Temp\90d841da88320cac9daa43c1af2de6e5e1156cb44727c2fc1121e33ce6c7543b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\km111.exe
      "C:\Users\Admin\AppData\Local\Temp\km111.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Users\Admin\AppData\Local\Temp\km111.exe
        "C:\Users\Admin\AppData\Local\Temp\km111.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'km111';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'km111' -Value '"C:\Users\Admin\AppData\Roaming\km111.exe"' -PropertyType 'String'
          4⤵
          • Adds Run key to start application
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2312
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\737Om2dQpADE.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4308
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4564
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 5 localhost
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1044
    • C:\Users\Admin\AppData\Local\Temp\90d841da88320cac9daa43c1af2de6e5e1156cb44727c2fc1121e33ce6c7543b.exe
      "C:\Users\Admin\AppData\Local\Temp\90d841da88320cac9daa43c1af2de6e5e1156cb44727c2fc1121e33ce6c7543b.exe"
      2⤵
      • Checks SCSI registry key(s)
      PID:5596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\737Om2dQpADE.bat

    Filesize

    171B

    MD5

    6a388996c60b3fc30af0a730643feed1

    SHA1

    3e894b13e82bb735b0f5f17e20b2995d33055db7

    SHA256

    a9e91010f04be6361fb1a17683ded56b8c356cb1a3536d849e6cad485745bb3f

    SHA512

    2fdaad55c8b8585fd82af902db8c5b4878d308c088737dce308d0b427e42fe8c6e890ba751bda66ac3ad8bd36195aeea8ab043273e0ba975c55cad6c1c4ec8c8

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fbnszl1u.ozn.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\km111.exe

    Filesize

    1.4MB

    MD5

    5d047c85071d16b5884a694cd1b9e339

    SHA1

    004ceeff566381efde2cab50ccb003a2d127b18c

    SHA256

    76e4e1e740d7e7317b9b66258b00723d0ef766301ccb164d09826178418c80ac

    SHA512

    1ad94386559b29d858f8712532ce270262ef353fc577f429bce1fd69411a6867da5323b55a77322478367a3b4907cab0299556842ca3f35cf9c547eb564630e2

  • memory/2228-1080-0x0000000005310000-0x00000000054AC000-memory.dmp

    Filesize

    1.6MB

  • memory/2228-2-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/2228-6-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-8-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-44-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-40-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-38-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-36-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-42-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-34-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-32-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-3-0x0000000005050000-0x0000000005270000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-28-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-26-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-22-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-20-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-18-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-16-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-14-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-12-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-24-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-5-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-10-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-62-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-68-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-66-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-64-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-60-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-59-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-56-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-54-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-52-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-50-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-1-0x0000000000130000-0x0000000000388000-memory.dmp

    Filesize

    2.3MB

  • memory/2228-46-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-1079-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/2228-0-0x00000000746DE000-0x00000000746DF000-memory.dmp

    Filesize

    4KB

  • memory/2228-1081-0x0000000004D90000-0x0000000004DDC000-memory.dmp

    Filesize

    304KB

  • memory/2228-30-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-4-0x00000000063A0000-0x00000000065C0000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-48-0x00000000063A0000-0x00000000065BA000-memory.dmp

    Filesize

    2.1MB

  • memory/2228-1093-0x0000000007D90000-0x0000000008334000-memory.dmp

    Filesize

    5.6MB

  • memory/2228-1416-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/2228-1096-0x00000000054E0000-0x0000000005534000-memory.dmp

    Filesize

    336KB

  • memory/2228-1231-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/2228-1104-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/2228-1102-0x00000000746DE000-0x00000000746DF000-memory.dmp

    Filesize

    4KB

  • memory/2228-1101-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/2312-2201-0x0000000005780000-0x0000000005DA8000-memory.dmp

    Filesize

    6.2MB

  • memory/2312-2217-0x0000000006AC0000-0x0000000006ADA000-memory.dmp

    Filesize

    104KB

  • memory/2312-2218-0x0000000006B10000-0x0000000006B32000-memory.dmp

    Filesize

    136KB

  • memory/2312-2216-0x0000000007790000-0x0000000007826000-memory.dmp

    Filesize

    600KB

  • memory/2312-2215-0x0000000006600000-0x000000000664C000-memory.dmp

    Filesize

    304KB

  • memory/2312-2200-0x0000000002CB0000-0x0000000002CE6000-memory.dmp

    Filesize

    216KB

  • memory/2312-2214-0x00000000065E0000-0x00000000065FE000-memory.dmp

    Filesize

    120KB

  • memory/2312-2213-0x0000000006280000-0x00000000065D4000-memory.dmp

    Filesize

    3.3MB

  • memory/2312-2207-0x0000000005E60000-0x0000000005E82000-memory.dmp

    Filesize

    136KB

  • memory/2312-2212-0x0000000006010000-0x0000000006076000-memory.dmp

    Filesize

    408KB

  • memory/4688-2226-0x0000000006B10000-0x0000000006BA2000-memory.dmp

    Filesize

    584KB

  • memory/4688-2221-0x00000000746DE000-0x00000000746DF000-memory.dmp

    Filesize

    4KB

  • memory/4688-2195-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/4688-2227-0x00000000070E0000-0x00000000071CC000-memory.dmp

    Filesize

    944KB

  • memory/4688-2225-0x0000000006880000-0x0000000006968000-memory.dmp

    Filesize

    928KB

  • memory/4688-2196-0x00000000746DE000-0x00000000746DF000-memory.dmp

    Filesize

    4KB

  • memory/4688-2198-0x0000000005100000-0x00000000051BC000-memory.dmp

    Filesize

    752KB

  • memory/4688-2199-0x00000000052B0000-0x0000000005316000-memory.dmp

    Filesize

    408KB

  • memory/4976-1099-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/4976-1097-0x00000000052C0000-0x00000000053EA000-memory.dmp

    Filesize

    1.2MB

  • memory/4976-2191-0x0000000002E58000-0x0000000002E59000-memory.dmp

    Filesize

    4KB

  • memory/4976-2192-0x0000000002D71000-0x0000000002D72000-memory.dmp

    Filesize

    4KB

  • memory/4976-2184-0x0000000005670000-0x0000000005671000-memory.dmp

    Filesize

    4KB

  • memory/4976-2197-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/4976-1103-0x00000000054F0000-0x000000000561A000-memory.dmp

    Filesize

    1.2MB

  • memory/4976-2185-0x0000000005700000-0x00000000057A6000-memory.dmp

    Filesize

    664KB

  • memory/4976-1094-0x0000000000780000-0x00000000008E2000-memory.dmp

    Filesize

    1.4MB

  • memory/4976-2189-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/4976-1095-0x00000000746D0000-0x0000000074E80000-memory.dmp

    Filesize

    7.7MB

  • memory/4976-2190-0x0000000003074000-0x0000000003075000-memory.dmp

    Filesize

    4KB

  • memory/5596-1415-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB