Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 23:19

General

  • Target

    HYDRA.exe

  • Size

    2.6MB

  • MD5

    c52bc39684c52886712971a92f339b23

  • SHA1

    c5cb39850affb7ed322bfb0a4900e17c54f95a11

  • SHA256

    f8c17cb375e8ccad5b0e33dae65694a1bd628f91cac6cf65dd11f50e91130c2d

  • SHA512

    2d50c1aa6ca237b9dbe97f000a082a223618f2164c8ab42ace9f4e142c318b2fc53e91a476dbe9c2dd459942b61507df5c551bd5c692a2b2a2037e4f6bd2a12b

  • SSDEEP

    49152:HnUXzRe4cjAx+L/G/3JHQZutOnmSzZniyui0EJHezdcc/DK9kTO1S:HUD8djA0LOvJdtOmSlniyuiPFePmS61S

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://92.53.105.14/

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 21 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
    "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Roaming\yaya.exe
      C:\Users\Admin\AppData\Roaming\yaya.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
        "C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i_xgvglz.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B85.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9B84.tmp"
            5⤵
              PID:812
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe"
            4⤵
              PID:1792
            • C:\Windows\System32\cmd.exe
              /K services.exe && clear
              4⤵
                PID:444
              • C:\Windows\System32\cmd.exe
                /K services.exe && clear
                4⤵
                  PID:1072
                • C:\Windows\System32\cmd.exe
                  /K services.exe && clear
                  4⤵
                    PID:1128
                  • C:\Windows\System32\cmd.exe
                    /K services.exe && clear
                    4⤵
                      PID:2200
                    • C:\Windows\System32\cmd.exe
                      /K services.exe && clear
                      4⤵
                        PID:2460
                      • C:\Windows\System32\cmd.exe
                        /K services.exe && clear
                        4⤵
                          PID:3008
                        • C:\Windows\System32\cmd.exe
                          /K services.exe && clear
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1692
                          • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\services.exe
                            services.exe
                            5⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1664
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          4⤵
                            PID:928
                          • C:\Windows\System32\cmd.exe
                            net localgroup administrators %username% /add
                            4⤵
                              PID:2432
                            • C:\Windows\System32\cmd.exe
                              net localgroup administrators %username% /add
                              4⤵
                                PID:1484
                              • C:\Windows\System32\cmd.exe
                                net localgroup administrators %username% /add
                                4⤵
                                  PID:1852
                                • C:\Windows\System32\cmd.exe
                                  net localgroup administrators %username% /add
                                  4⤵
                                    PID:2472
                                  • C:\Windows\System32\cmd.exe
                                    net localgroup administrators %username% /add
                                    4⤵
                                      PID:2212
                                    • C:\Windows\System32\cmd.exe
                                      net localgroup administrators %username% /add
                                      4⤵
                                        PID:3044
                                      • C:\Windows\System32\cmd.exe
                                        net localgroup administrators %username% /add
                                        4⤵
                                          PID:776
                                    • C:\Users\Admin\AppData\Roaming\va.exe
                                      C:\Users\Admin\AppData\Roaming\va.exe
                                      2⤵
                                      • Drops startup file
                                      • Executes dropped EXE
                                      PID:1264
                                    • C:\Users\Admin\AppData\Roaming\ufx.exe
                                      C:\Users\Admin\AppData\Roaming\ufx.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:2056
                                      • C:\ProgramData\ucp\usc.exe
                                        "C:\ProgramData\ucp\usc.exe" /ucp/usc.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:1080
                                        • C:\Windows\SysWOW64\SCHTASKS.exe
                                          SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1984
                                    • C:\Users\Admin\AppData\Roaming\sant.exe
                                      C:\Users\Admin\AppData\Roaming\sant.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Maps connected drives based on registry
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: MapViewOfSection
                                      • Suspicious use of WriteProcessMemory
                                      PID:2696
                                      • C:\Windows\SysWOW64\explorer.exe
                                        explorer.exe
                                        3⤵
                                        • Adds Run key to start application
                                        • System Location Discovery: System Language Discovery
                                        PID:1572
                                    • C:\Users\Admin\AppData\Roaming\power.exe
                                      C:\Users\Admin\AppData\Roaming\power.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:2764
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2676
                                  • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\services.exe
                                    C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\services.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:1500
                                    • C:\Windows\TEMP\foxcon.exe
                                      "C:\Windows\TEMP\foxcon.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1548

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\RES9B85.tmp

                                    Filesize

                                    1KB

                                    MD5

                                    fe420ab56c660139cc8cc01816f64e10

                                    SHA1

                                    fca099fa74a0a419e81cc8211a164c5fc2bbb8a4

                                    SHA256

                                    8d4437c3bf7b21dd30ebe3c3353f37136d33a6acaf3748a50cdd93952672c34c

                                    SHA512

                                    f670a0bf9a2c6ec417e7e748ce2be2258f8e611a7bc0046d8d94cd3633775eccd71037449e1e1f63321706ef9c3721ce88c755326d62567506faa60911893709

                                  • C:\Users\Admin\AppData\Local\Temp\i_xgvglz.dll

                                    Filesize

                                    5KB

                                    MD5

                                    a95ab2e62046c38f9b36a727f78e6893

                                    SHA1

                                    159c6e9f5cd21b72f8fcfbb9e17ea71b1b8ae7a8

                                    SHA256

                                    6a474e857c9dfa2a539946cbe9684fcc61844837248fe30c82fb528557298031

                                    SHA512

                                    433e4cfef4ec600dede8fd81084d4817547f216692712a857ecd26f729bae659829ed82b365226feda89891529904f00932518e918a20ba0266ffeca2743bae0

                                  • C:\Users\Admin\AppData\Local\Temp\i_xgvglz.pdb

                                    Filesize

                                    7KB

                                    MD5

                                    f95e1f136686047718c01dd88eb79326

                                    SHA1

                                    3167c076d5d43c6263c77a27f387c6e4bcf2c52f

                                    SHA256

                                    71bc82f113e4e5fdc16427bc1bc0e9ec9831fd31ca821af583b44e0554c64a67

                                    SHA512

                                    a1ab14251ee726610417dba732b2f35d21f77e6d8dee7ec5a0cafed280d240a8f45859ce3bc6064b7be9fe5dae7ff84e0aa2af5211d0760d2e152c737e058024

                                  • C:\Users\Admin\AppData\Roaming\power.exe

                                    Filesize

                                    507KB

                                    MD5

                                    743f47ae7d09fce22d0a7c724461f7e3

                                    SHA1

                                    8e98dd1efb70749af72c57344aab409fb927394e

                                    SHA256

                                    1bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465

                                    SHA512

                                    567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf

                                  • C:\Users\Admin\AppData\Roaming\ufx.exe

                                    Filesize

                                    960KB

                                    MD5

                                    22e088012519e1013c39a3828bda7498

                                    SHA1

                                    3a8a87cce3f6aff415ee39cf21738663c0610016

                                    SHA256

                                    9e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973

                                    SHA512

                                    5559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8

                                  • C:\Users\Admin\AppData\Roaming\va.exe

                                    Filesize

                                    88KB

                                    MD5

                                    c084e736931c9e6656362b0ba971a628

                                    SHA1

                                    ef83b95fc645ad3a161a19ccef3224c72e5472bd

                                    SHA256

                                    3139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1

                                    SHA512

                                    cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f

                                  • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\Newtonsoft.Json.dll

                                    Filesize

                                    487KB

                                    MD5

                                    0c33e2f116aaa66d0012a8376d82ce29

                                    SHA1

                                    81cd6b87a9f7b4a174138312986d682f464067f4

                                    SHA256

                                    9a19ef049430af9ac49ff719cbfb73dc6c6b0d0ef53914479dd282260771518b

                                    SHA512

                                    b19dceb47d943bcb40f185e232eb1a0f665f6b6107e6c83c0f0a1aa80013b2756c5a831f3413a4c57ca37f7ec4a95a173e1f3d67e49f1fff2071273acc538317

                                  • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\foxcon.exe

                                    Filesize

                                    15KB

                                    MD5

                                    7b07728b813d26228f10f6cdb7ac8471

                                    SHA1

                                    48418d83ac372c1398753f7a766076750a03a725

                                    SHA256

                                    7e5a9baf4d9ead35e1d9a3b3dda6ee05e670bd721500d82fbf08e1e8091fa911

                                    SHA512

                                    f8a1070d4a0297151c6d55e60bc953a985b82159920e5a6a3a40270f0ad7e06edb1815b6fed1313076f7f6bbf32155d22a5a0e605378525aa3a9055a2c7128aa

                                  • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\services.exe

                                    Filesize

                                    27KB

                                    MD5

                                    63602f11993c01a4b36f42187a797128

                                    SHA1

                                    d6c761942dcb32190f924ea7490acc38865f7300

                                    SHA256

                                    2c926cd6c980ff89ced8de49a8d0e7fb7247f58b1face21a1e9883a58b822b84

                                    SHA512

                                    1a13649d6d5917d132f85cae9af206b1959578134db392afd6fec0c68ff1828c87daa2a537678ad1a83c0e273fed7f154f6f6f6f72102733fa6626bcd57ded0e

                                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC9B84.tmp

                                    Filesize

                                    652B

                                    MD5

                                    b5b472e411f205bbab8253a06e6cecd1

                                    SHA1

                                    82983bfb7d7a4bab86da1e287b338b323bb04444

                                    SHA256

                                    a069a784278f73b242363c9deecf56c49c3e32e43d09a2e5645ec7a39ef9ba13

                                    SHA512

                                    0bc08afca38c1a47d514a9fde551633d495ea6c762330162f25d4eca91f617f103b4c46cb8d5c4b4c9a3c1025ab001654fe5b7038be61f5295b0e450db3cce4c

                                  • \??\c:\Users\Admin\AppData\Local\Temp\i_xgvglz.0.cs

                                    Filesize

                                    4KB

                                    MD5

                                    a0d1b6f34f315b4d81d384b8ebcdeaa5

                                    SHA1

                                    794c1ff4f2a28e0c631a783846ecfffdd4c7ae09

                                    SHA256

                                    0b3a3f8f11eb6f50fe67943f2b73c5824614f31c2e0352cc234927d7cb1a52e0

                                    SHA512

                                    0a89293d731c5bca05e73148f85a740b324fc877f2fb05cde1f68e2098329fbca552d78249a46f4a1da15a450c8e754c73be20c652f7089d5cfec445ce950a0e

                                  • \??\c:\Users\Admin\AppData\Local\Temp\i_xgvglz.cmdline

                                    Filesize

                                    309B

                                    MD5

                                    699e765b69dbe060336eee72061d05c0

                                    SHA1

                                    4ef13b3c3df3c9c205a6654f01c2558404a81c8e

                                    SHA256

                                    12ed4538b4d41667c91f0c7df1017c8566619186a77a8c68eba841d24341c786

                                    SHA512

                                    1f6906dbd4213e1f4361ccf5efbcd0294be34a25b37c94c31a0a875268aee8b95e3d92876dc1609e6a4ccefd3c7d4fdf9f021c60196d2d78414f4de837527cf9

                                  • \ProgramData\ucp\usc.exe

                                    Filesize

                                    4.0MB

                                    MD5

                                    b100b373d645bf59b0487dbbda6c426d

                                    SHA1

                                    44a4ad2913f5f35408b8c16459dcce3f101bdcc7

                                    SHA256

                                    84d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7

                                    SHA512

                                    69483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b

                                  • \Users\Admin\AppData\Roaming\sant.exe

                                    Filesize

                                    12KB

                                    MD5

                                    5effca91c3f1e9c87d364460097f8048

                                    SHA1

                                    28387c043ab6857aaa51865346046cf5dc4c7b49

                                    SHA256

                                    3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907

                                    SHA512

                                    b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0

                                  • \Users\Admin\AppData\Roaming\yaya.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    7d05ab95cfe93d84bc5db006c789a47f

                                    SHA1

                                    aa4aa0189140670c618348f1baad877b8eca04a4

                                    SHA256

                                    5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f

                                    SHA512

                                    40d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84

                                  • \Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe

                                    Filesize

                                    80KB

                                    MD5

                                    51bf85f3bf56e628b52d61614192359d

                                    SHA1

                                    c1bc90be6a4beb67fb7b195707798106114ec332

                                    SHA256

                                    990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446

                                    SHA512

                                    131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474

                                  • memory/1264-27-0x0000000000400000-0x000000000041C000-memory.dmp

                                    Filesize

                                    112KB

                                  • memory/1272-88-0x0000000000550000-0x0000000000558000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/1500-102-0x0000000000DA0000-0x0000000000E20000-memory.dmp

                                    Filesize

                                    512KB

                                  • memory/1572-105-0x00000000000C0000-0x00000000000CA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1572-115-0x00000000000C0000-0x00000000000CA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1572-117-0x00000000000C0000-0x00000000000CA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1572-104-0x0000000000470000-0x00000000006F1000-memory.dmp

                                    Filesize

                                    2.5MB

                                  • memory/2096-33-0x00000000003C0000-0x00000000003C4000-memory.dmp

                                    Filesize

                                    16KB

                                  • memory/2096-34-0x00000000003C0000-0x00000000003C4000-memory.dmp

                                    Filesize

                                    16KB

                                  • memory/2104-62-0x0000000000400000-0x000000000047B000-memory.dmp

                                    Filesize

                                    492KB

                                  • memory/2696-109-0x00000000001E0000-0x00000000001EA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2696-30-0x00000000001E0000-0x00000000001EA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2696-36-0x00000000001E0000-0x00000000001EA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2696-35-0x0000000000400000-0x0000000000404000-memory.dmp

                                    Filesize

                                    16KB

                                  • memory/2764-103-0x0000000000400000-0x0000000000485000-memory.dmp

                                    Filesize

                                    532KB

                                  • memory/2764-122-0x0000000000400000-0x0000000000485000-memory.dmp

                                    Filesize

                                    532KB