Resubmissions

13-11-2024 23:34

241113-3kmbta1eqc 10

13-11-2024 22:28

241113-2dpb6azme1 10

11-11-2024 05:34

241111-f9w6zstjbz 10

11-11-2024 03:05

241111-dlmlja1jbx 10

11-11-2024 03:00

241111-dhk9aszrdz 10

08-11-2024 08:59

241108-kx2cdssjdk 10

08-11-2024 08:55

241108-kvvf3aymdw 10

Analysis

  • max time kernel
    1800s
  • max time network
    1803s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 05:34

General

  • Target

    HYDRA.exe

  • Size

    2.6MB

  • MD5

    c52bc39684c52886712971a92f339b23

  • SHA1

    c5cb39850affb7ed322bfb0a4900e17c54f95a11

  • SHA256

    f8c17cb375e8ccad5b0e33dae65694a1bd628f91cac6cf65dd11f50e91130c2d

  • SHA512

    2d50c1aa6ca237b9dbe97f000a082a223618f2164c8ab42ace9f4e142c318b2fc53e91a476dbe9c2dd459942b61507df5c551bd5c692a2b2a2037e4f6bd2a12b

  • SSDEEP

    49152:HnUXzRe4cjAx+L/G/3JHQZutOnmSzZniyui0EJHezdcc/DK9kTO1S:HUD8djA0LOvJdtOmSlniyuiPFePmS61S

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://92.53.105.14/

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
    "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Roaming\yaya.exe
      C:\Users\Admin\AppData\Roaming\yaya.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
        "C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\9qhjycrp.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESACEA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCACE9.tmp"
            5⤵
              PID:2872
      • C:\Users\Admin\AppData\Roaming\va.exe
        C:\Users\Admin\AppData\Roaming\va.exe
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2052
      • C:\Users\Admin\AppData\Roaming\ufx.exe
        C:\Users\Admin\AppData\Roaming\ufx.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\ProgramData\ucp\usc.exe
          "C:\ProgramData\ucp\usc.exe" /ucp/usc.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4584
          • C:\Windows\SysWOW64\SCHTASKS.exe
            SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3736
      • C:\Users\Admin\AppData\Roaming\sant.exe
        C:\Users\Admin\AppData\Roaming\sant.exe
        2⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3624
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:4920
      • C:\Users\Admin\AppData\Roaming\power.exe
        C:\Users\Admin\AppData\Roaming\power.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4956
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4776
    • C:\ProgramData\ucp\usc.exe
      C:\ProgramData\ucp\usc.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\SCHTASKS.exe
        SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1556
    • C:\ProgramData\ucp\usc.exe
      C:\ProgramData\ucp\usc.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\SysWOW64\SCHTASKS.exe
        SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2496
    • C:\ProgramData\ucp\usc.exe
      C:\ProgramData\ucp\usc.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Windows\SysWOW64\SCHTASKS.exe
        SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\ucp\usc.exe

      Filesize

      4.0MB

      MD5

      b100b373d645bf59b0487dbbda6c426d

      SHA1

      44a4ad2913f5f35408b8c16459dcce3f101bdcc7

      SHA256

      84d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7

      SHA512

      69483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b

    • C:\Users\Admin\AppData\Local\Temp\9qhjycrp.dll

      Filesize

      5KB

      MD5

      16044ffbf2e152748c46c6ad170009c0

      SHA1

      a1a7b8f71ed4a54ad888272e8b716352d5642a48

      SHA256

      764aefc5a59e43ea9ce46c01c7d1869f7fa49c2de384c2aaa4c5c265ada65c66

      SHA512

      4517261ca30e1340a39d9fc382fd74e226243998d6c57eab92cf06b04e24a9f0e768d49841c0ba0996575f055bd2b8b5410d4d71dd836787a332bff7c4dbb9fe

    • C:\Users\Admin\AppData\Local\Temp\9qhjycrp.pdb

      Filesize

      7KB

      MD5

      c5e926a5ad653e06f98c0b6010c7d3d0

      SHA1

      0a04cf6b91209786e9e603be327ecabfd7cd43f6

      SHA256

      3e1217af3f1c9a6dcfcf7699265b8a4506d9083518fefc286dbd38a10f3b63fc

      SHA512

      a8a6974ce242b70d3d9be13896b0742ed122c9bc8c4be3fcbbb125737f483cfa6be7fb2768e124ad624942971b1623d0c546815552e919614cb75f4c7aa15747

    • C:\Users\Admin\AppData\Local\Temp\RESACEA.tmp

      Filesize

      1KB

      MD5

      09d7b8e0734b60f0ce343a803516a3cc

      SHA1

      718b65259553a6c84ad96428a96a97183f7b9080

      SHA256

      0641e97e9b5c5bf5f8235c12e3ca08cb40b718ff2b40288dbba9e2cc523cac4c

      SHA512

      e6fdfeb728ed263f4a38c0784a4c3084d5b860ca9e4dc525bc606a23438b1ad3251b8759104ae180b617f8b9fcb8e193fcb753c242d3022a113ad11a43bbd43b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ih3xzaoh.urx.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\power.exe

      Filesize

      507KB

      MD5

      743f47ae7d09fce22d0a7c724461f7e3

      SHA1

      8e98dd1efb70749af72c57344aab409fb927394e

      SHA256

      1bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465

      SHA512

      567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf

    • C:\Users\Admin\AppData\Roaming\sant.exe

      Filesize

      12KB

      MD5

      5effca91c3f1e9c87d364460097f8048

      SHA1

      28387c043ab6857aaa51865346046cf5dc4c7b49

      SHA256

      3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907

      SHA512

      b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0

    • C:\Users\Admin\AppData\Roaming\ufx.exe

      Filesize

      960KB

      MD5

      22e088012519e1013c39a3828bda7498

      SHA1

      3a8a87cce3f6aff415ee39cf21738663c0610016

      SHA256

      9e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973

      SHA512

      5559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8

    • C:\Users\Admin\AppData\Roaming\va.exe

      Filesize

      88KB

      MD5

      c084e736931c9e6656362b0ba971a628

      SHA1

      ef83b95fc645ad3a161a19ccef3224c72e5472bd

      SHA256

      3139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1

      SHA512

      cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f

    • C:\Users\Admin\AppData\Roaming\yaya.exe

      Filesize

      1.7MB

      MD5

      7d05ab95cfe93d84bc5db006c789a47f

      SHA1

      aa4aa0189140670c618348f1baad877b8eca04a4

      SHA256

      5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f

      SHA512

      40d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84

    • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe

      Filesize

      80KB

      MD5

      51bf85f3bf56e628b52d61614192359d

      SHA1

      c1bc90be6a4beb67fb7b195707798106114ec332

      SHA256

      990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446

      SHA512

      131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474

    • \??\c:\Users\Admin\AppData\Local\Temp\9qhjycrp.0.cs

      Filesize

      4KB

      MD5

      a0d1b6f34f315b4d81d384b8ebcdeaa5

      SHA1

      794c1ff4f2a28e0c631a783846ecfffdd4c7ae09

      SHA256

      0b3a3f8f11eb6f50fe67943f2b73c5824614f31c2e0352cc234927d7cb1a52e0

      SHA512

      0a89293d731c5bca05e73148f85a740b324fc877f2fb05cde1f68e2098329fbca552d78249a46f4a1da15a450c8e754c73be20c652f7089d5cfec445ce950a0e

    • \??\c:\Users\Admin\AppData\Local\Temp\9qhjycrp.cmdline

      Filesize

      309B

      MD5

      9793aed5df1a0d7a9f0b23b2ac0388bf

      SHA1

      b6c698343398e82d28951864951baad120518f28

      SHA256

      f0923dac430e74249c85f741db642aee411ff7de72a0a6ba296341e2030e174a

      SHA512

      ceaca0c667d5f7a5414d7f36a9a6284f77d00ace7f7efbd31c9321deed1b2a3e13d6afa10cd3044b55892e6920d8ae20fdd4937ee0d24bbf878e82faf68d3149

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCACE9.tmp

      Filesize

      652B

      MD5

      eb42d1c7a0484c4ddcf36c30f741fc3a

      SHA1

      426d2ebb8d44a2f629223d7afabf11c9a7dacdb5

      SHA256

      09f11db37e583a9d2d8578f4b3b1548ec7412104b05713a66a194215d40e88ce

      SHA512

      4c0cecbddf5553fec097d01dfc8ee8134df5a577c67afe76b169b5f8d60b49bc5c79a7b05c7e1adb1be021ac320375220ba9f712ae44ab2d5899150221fe30c6

    • memory/1912-74-0x000000001AF20000-0x000000001AF28000-memory.dmp

      Filesize

      32KB

    • memory/1912-60-0x000000001AF00000-0x000000001AF08000-memory.dmp

      Filesize

      32KB

    • memory/1912-59-0x000000001B8E0000-0x000000001B97C000-memory.dmp

      Filesize

      624KB

    • memory/1912-58-0x000000001B410000-0x000000001B8DE000-memory.dmp

      Filesize

      4.8MB

    • memory/2052-18-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/3624-79-0x00000000001E0000-0x00000000001EA000-memory.dmp

      Filesize

      40KB

    • memory/3624-94-0x0000000000400000-0x0000000000404000-memory.dmp

      Filesize

      16KB

    • memory/3624-24-0x00000000001E0000-0x00000000001EA000-memory.dmp

      Filesize

      40KB

    • memory/3624-20-0x00000000001E0000-0x00000000001EA000-memory.dmp

      Filesize

      40KB

    • memory/3624-17-0x0000000000400000-0x0000000000404000-memory.dmp

      Filesize

      16KB

    • memory/3624-92-0x00000000001E0000-0x00000000001EA000-memory.dmp

      Filesize

      40KB

    • memory/3984-52-0x0000000000400000-0x000000000047B000-memory.dmp

      Filesize

      492KB

    • memory/4776-109-0x0000000005A70000-0x0000000005DC4000-memory.dmp

      Filesize

      3.3MB

    • memory/4776-115-0x0000000006030000-0x000000000604E000-memory.dmp

      Filesize

      120KB

    • memory/4776-120-0x00000000073E0000-0x00000000073FA000-memory.dmp

      Filesize

      104KB

    • memory/4776-119-0x0000000007A40000-0x00000000080BA000-memory.dmp

      Filesize

      6.5MB

    • memory/4776-118-0x0000000007140000-0x00000000071B6000-memory.dmp

      Filesize

      472KB

    • memory/4776-117-0x00000000065A0000-0x00000000065E4000-memory.dmp

      Filesize

      272KB

    • memory/4776-99-0x0000000004A70000-0x0000000004AA6000-memory.dmp

      Filesize

      216KB

    • memory/4776-100-0x0000000005200000-0x0000000005828000-memory.dmp

      Filesize

      6.2MB

    • memory/4776-101-0x0000000005090000-0x00000000050B2000-memory.dmp

      Filesize

      136KB

    • memory/4776-102-0x00000000058E0000-0x0000000005946000-memory.dmp

      Filesize

      408KB

    • memory/4776-103-0x0000000005A00000-0x0000000005A66000-memory.dmp

      Filesize

      408KB

    • memory/4776-116-0x00000000060D0000-0x000000000611C000-memory.dmp

      Filesize

      304KB

    • memory/4920-91-0x0000000000630000-0x000000000063A000-memory.dmp

      Filesize

      40KB

    • memory/4920-81-0x0000000000990000-0x0000000000DC3000-memory.dmp

      Filesize

      4.2MB

    • memory/4920-80-0x0000000000990000-0x0000000000DC3000-memory.dmp

      Filesize

      4.2MB

    • memory/4920-82-0x0000000000630000-0x000000000063A000-memory.dmp

      Filesize

      40KB

    • memory/4920-89-0x0000000000630000-0x000000000063A000-memory.dmp

      Filesize

      40KB

    • memory/4956-78-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/4956-98-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB