Resubmissions

26/02/2025, 05:50

250226-gjv2nssrx3 10

26/02/2025, 02:02

250226-cggzta1lx4 10

25/02/2025, 23:31

250225-3hvkeatpx2 10

25/02/2025, 23:21

250225-3b6dbstk17 10

25/02/2025, 23:08

250225-24rvzasqv3 10

25/02/2025, 22:22

250225-199sas1j14 10

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/02/2025, 22:22

General

  • Target

    HYDRA.exe

  • Size

    2.6MB

  • MD5

    c52bc39684c52886712971a92f339b23

  • SHA1

    c5cb39850affb7ed322bfb0a4900e17c54f95a11

  • SHA256

    f8c17cb375e8ccad5b0e33dae65694a1bd628f91cac6cf65dd11f50e91130c2d

  • SHA512

    2d50c1aa6ca237b9dbe97f000a082a223618f2164c8ab42ace9f4e142c318b2fc53e91a476dbe9c2dd459942b61507df5c551bd5c692a2b2a2037e4f6bd2a12b

  • SSDEEP

    49152:HnUXzRe4cjAx+L/G/3JHQZutOnmSzZniyui0EJHezdcc/DK9kTO1S:HUD8djA0LOvJdtOmSlniyuiPFePmS61S

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://92.53.105.14/

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
    "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Roaming\yaya.exe
      C:\Users\Admin\AppData\Roaming\yaya.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
        "C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xmj4cenc.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCCD6.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCCD5.tmp"
            5⤵
              PID:3792
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe"
            4⤵
              PID:2228
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:3608
          • C:\Users\Admin\AppData\Roaming\va.exe
            C:\Users\Admin\AppData\Roaming\va.exe
            2⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3648
          • C:\Users\Admin\AppData\Roaming\ufx.exe
            C:\Users\Admin\AppData\Roaming\ufx.exe
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:884
            • C:\ProgramData\ucp\usc.exe
              "C:\ProgramData\ucp\usc.exe" /ucp/usc.exe
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:392
              • C:\Windows\SysWOW64\SCHTASKS.exe
                SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
                4⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:4616
          • C:\Users\Admin\AppData\Roaming\sant.exe
            C:\Users\Admin\AppData\Roaming\sant.exe
            2⤵
            • Executes dropped EXE
            • Maps connected drives based on registry
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2092
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              3⤵
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              PID:3268
          • C:\Users\Admin\AppData\Roaming\power.exe
            C:\Users\Admin\AppData\Roaming\power.exe
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1952
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:3840

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\ucp\usc.exe

          Filesize

          4.0MB

          MD5

          b100b373d645bf59b0487dbbda6c426d

          SHA1

          44a4ad2913f5f35408b8c16459dcce3f101bdcc7

          SHA256

          84d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7

          SHA512

          69483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b

        • C:\Users\Admin\AppData\Local\Temp\RESCCD6.tmp

          Filesize

          1KB

          MD5

          563d75fc60c6448c8ddd88d50bd38f34

          SHA1

          c63ea84870b52cbf2a81678e0d3745f33a798b3d

          SHA256

          59d84a3eb51676278832074b0d198b82b8903c35aeb1b796b358a810f9122f50

          SHA512

          84a43e517658aefa79290c2f2b410ad4099b40fc24dde04f4aacc5244ddcfd59e250923f7e8f0dce8f04e89d3dd2fee245b231aa8eca5849e003687941993bdb

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u5pflobb.et2.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\xmj4cenc.dll

          Filesize

          5KB

          MD5

          c7cff14263414c697cab9265f98dccc8

          SHA1

          0ab10efc30a2cf017dc10b0748fb9e75556d269d

          SHA256

          325b8c89f04bd07349541de53864201996ac1c1457afd2c84708312307afc6e7

          SHA512

          be8b7454d721f4550d6436de0d3cd75dc061f548af56752419f901ec8115d52c9700e5fd3b6763ddd90b467879d01f4d16e2d87be4edfb5a5e1964f95582e0e4

        • C:\Users\Admin\AppData\Local\Temp\xmj4cenc.pdb

          Filesize

          7KB

          MD5

          371b0a6aa024b32f36447efa092462ee

          SHA1

          8a34ae78e6f09b5e384086859524ad80484eddd4

          SHA256

          6b2ead1837c87d0846362226129b7f8ebf27ca900a86a91b94f00e33f621e9f8

          SHA512

          de51a15468fc8af60b3d1e1e6859dd8bd03effcf8459f878c47b3d9c49e88adf29c2192394535cc6c2c8cbeda7decb8227d0ef3897802f5dd75fb154fb5616ef

        • C:\Users\Admin\AppData\Roaming\power.exe

          Filesize

          507KB

          MD5

          743f47ae7d09fce22d0a7c724461f7e3

          SHA1

          8e98dd1efb70749af72c57344aab409fb927394e

          SHA256

          1bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465

          SHA512

          567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf

        • C:\Users\Admin\AppData\Roaming\sant.exe

          Filesize

          12KB

          MD5

          5effca91c3f1e9c87d364460097f8048

          SHA1

          28387c043ab6857aaa51865346046cf5dc4c7b49

          SHA256

          3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907

          SHA512

          b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0

        • C:\Users\Admin\AppData\Roaming\ufx.exe

          Filesize

          960KB

          MD5

          22e088012519e1013c39a3828bda7498

          SHA1

          3a8a87cce3f6aff415ee39cf21738663c0610016

          SHA256

          9e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973

          SHA512

          5559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8

        • C:\Users\Admin\AppData\Roaming\va.exe

          Filesize

          88KB

          MD5

          c084e736931c9e6656362b0ba971a628

          SHA1

          ef83b95fc645ad3a161a19ccef3224c72e5472bd

          SHA256

          3139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1

          SHA512

          cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f

        • C:\Users\Admin\AppData\Roaming\yaya.exe

          Filesize

          1.7MB

          MD5

          7d05ab95cfe93d84bc5db006c789a47f

          SHA1

          aa4aa0189140670c618348f1baad877b8eca04a4

          SHA256

          5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f

          SHA512

          40d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84

        • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe

          Filesize

          80KB

          MD5

          51bf85f3bf56e628b52d61614192359d

          SHA1

          c1bc90be6a4beb67fb7b195707798106114ec332

          SHA256

          990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446

          SHA512

          131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCCCD5.tmp

          Filesize

          652B

          MD5

          2821ca1025e1272063a925a4db05cd0f

          SHA1

          a1716fe1a554b6ffb8b2abd6edbcf952fcf94a3a

          SHA256

          bb508b8ae7372bedefbc710250af625711c2dfd4d6df220b33389fe9331b04d6

          SHA512

          f606e97c74ac122e923cd004eafd1b89b4a98ccbde0f9c688b3de16351671a94494bb82447f153e193a2ac39931ace8f9742b9984dd5b8207689a54f0476eff8

        • \??\c:\Users\Admin\AppData\Local\Temp\xmj4cenc.0.cs

          Filesize

          4KB

          MD5

          a0d1b6f34f315b4d81d384b8ebcdeaa5

          SHA1

          794c1ff4f2a28e0c631a783846ecfffdd4c7ae09

          SHA256

          0b3a3f8f11eb6f50fe67943f2b73c5824614f31c2e0352cc234927d7cb1a52e0

          SHA512

          0a89293d731c5bca05e73148f85a740b324fc877f2fb05cde1f68e2098329fbca552d78249a46f4a1da15a450c8e754c73be20c652f7089d5cfec445ce950a0e

        • \??\c:\Users\Admin\AppData\Local\Temp\xmj4cenc.cmdline

          Filesize

          309B

          MD5

          36153ed0b07d4d1244f284a33ae0e4cd

          SHA1

          5f63fc7b82faee690104749ee0917ed3e56e0261

          SHA256

          1e0154627a990b2a11991022c6e86e3284abe2eb41a10cc76dc86b1e854fa010

          SHA512

          7c72e2e243f027b9bc85ea7e63fc517d9f79f595fdc3e9fa41d3447d7d128283dad6cc34a2c9c52bd1437b57a3130de55a8d66d0edafa3b2657c46df6f1e4e31

        • memory/584-54-0x0000000000400000-0x000000000047B000-memory.dmp

          Filesize

          492KB

        • memory/1952-97-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1952-77-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/2004-73-0x0000000000AD0000-0x0000000000AD8000-memory.dmp

          Filesize

          32KB

        • memory/2004-58-0x000000001B060000-0x000000001B0FC000-memory.dmp

          Filesize

          624KB

        • memory/2004-57-0x000000001B650000-0x000000001BB1E000-memory.dmp

          Filesize

          4.8MB

        • memory/2004-59-0x0000000000AB0000-0x0000000000AB8000-memory.dmp

          Filesize

          32KB

        • memory/2092-90-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/2092-23-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/2092-18-0x0000000000400000-0x0000000000404000-memory.dmp

          Filesize

          16KB

        • memory/2092-92-0x0000000000400000-0x0000000000404000-memory.dmp

          Filesize

          16KB

        • memory/3268-78-0x0000000000D40000-0x000000000116C000-memory.dmp

          Filesize

          4.2MB

        • memory/3268-87-0x0000000000760000-0x000000000076A000-memory.dmp

          Filesize

          40KB

        • memory/3268-89-0x0000000000760000-0x000000000076A000-memory.dmp

          Filesize

          40KB

        • memory/3268-80-0x0000000000760000-0x000000000076A000-memory.dmp

          Filesize

          40KB

        • memory/3268-79-0x0000000000D40000-0x000000000116C000-memory.dmp

          Filesize

          4.2MB

        • memory/3648-22-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/3840-99-0x0000000004E90000-0x00000000054BA000-memory.dmp

          Filesize

          6.2MB

        • memory/3840-100-0x0000000004BB0000-0x0000000004BD2000-memory.dmp

          Filesize

          136KB

        • memory/3840-101-0x0000000004CD0000-0x0000000004D36000-memory.dmp

          Filesize

          408KB

        • memory/3840-102-0x0000000004DF0000-0x0000000004E56000-memory.dmp

          Filesize

          408KB

        • memory/3840-98-0x0000000002220000-0x0000000002256000-memory.dmp

          Filesize

          216KB

        • memory/3840-111-0x00000000055C0000-0x0000000005917000-memory.dmp

          Filesize

          3.3MB

        • memory/3840-112-0x0000000005970000-0x000000000598E000-memory.dmp

          Filesize

          120KB

        • memory/3840-113-0x0000000005AF0000-0x0000000005B3C000-memory.dmp

          Filesize

          304KB

        • memory/3840-114-0x0000000005FE0000-0x0000000006026000-memory.dmp

          Filesize

          280KB