Resubmissions

16/04/2025, 11:04

250416-m58gsaz1ay 10

15/04/2025, 17:34

250415-v5ylksypw9 10

15/04/2025, 06:16

250415-g1p7ras1dw 10

14/04/2025, 08:06

250414-jzpwpstxhx 10

14/04/2025, 07:59

250414-jvg1assky4 10

14/04/2025, 07:22

250414-h7g1dss1h1 10

14/04/2025, 07:16

250414-h3xv2s1nv6 10

11/04/2025, 21:39

250411-1h113szzaz 10

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250411-en
  • resource tags

    arch:x64arch:x86image:win11-20250411-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/04/2025, 07:22

General

  • Target

    HYDRA.exe

  • Size

    2.6MB

  • MD5

    c52bc39684c52886712971a92f339b23

  • SHA1

    c5cb39850affb7ed322bfb0a4900e17c54f95a11

  • SHA256

    f8c17cb375e8ccad5b0e33dae65694a1bd628f91cac6cf65dd11f50e91130c2d

  • SHA512

    2d50c1aa6ca237b9dbe97f000a082a223618f2164c8ab42ace9f4e142c318b2fc53e91a476dbe9c2dd459942b61507df5c551bd5c692a2b2a2037e4f6bd2a12b

  • SSDEEP

    49152:HnUXzRe4cjAx+L/G/3JHQZutOnmSzZniyui0EJHezdcc/DK9kTO1S:HUD8djA0LOvJdtOmSlniyuiPFePmS61S

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://92.53.105.14/

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
    "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Roaming\yaya.exe
      C:\Users\Admin\AppData\Roaming\yaya.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
        "C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lka6cn_1.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5272
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAFAA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCAFA9.tmp"
            5⤵
              PID:3612
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe"
            4⤵
              PID:5304
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:5876
          • C:\Users\Admin\AppData\Roaming\va.exe
            C:\Users\Admin\AppData\Roaming\va.exe
            2⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:412
          • C:\Users\Admin\AppData\Roaming\ufx.exe
            C:\Users\Admin\AppData\Roaming\ufx.exe
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5476
            • C:\ProgramData\ucp\usc.exe
              "C:\ProgramData\ucp\usc.exe" /ucp/usc.exe
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4320
              • C:\Windows\SysWOW64\SCHTASKS.exe
                SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
                4⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:5796
          • C:\Users\Admin\AppData\Roaming\sant.exe
            C:\Users\Admin\AppData\Roaming\sant.exe
            2⤵
            • Executes dropped EXE
            • Maps connected drives based on registry
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4864
            • C:\Windows\SysWOW64\explorer.exe
              explorer.exe
              3⤵
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              PID:4596
          • C:\Users\Admin\AppData\Roaming\power.exe
            C:\Users\Admin\AppData\Roaming\power.exe
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4936
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:6132
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\cwehvhhs\iaubeicg.exe
          1⤵
            PID:3628

          Network

          MITRE ATT&CK Enterprise v16

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\ucp\usc.exe

            Filesize

            4.0MB

            MD5

            b100b373d645bf59b0487dbbda6c426d

            SHA1

            44a4ad2913f5f35408b8c16459dcce3f101bdcc7

            SHA256

            84d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7

            SHA512

            69483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b

          • C:\Users\Admin\AppData\Local\Temp\RESAFAA.tmp

            Filesize

            1KB

            MD5

            a2fde6152918eb20f162bcf2a59cdce5

            SHA1

            6aaab22b7ec3111c500874945c75623622b7676a

            SHA256

            8284c3ba86c8959ca0506a78b47e9619eb8d53fc628d78ddb89b45d1065b76a4

            SHA512

            d70dbf93b51f089ea562172b7e6625e2f25461349e95d78f6dba18403d4d3c84149fe77c1e9d0f32f39c67d9ddfe7b655c126d15d250f2d999a0c714ff15abf0

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_32xxtwil.atu.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\lka6cn_1.dll

            Filesize

            5KB

            MD5

            665501a0bdb9d7a9720ad2ac1bdad729

            SHA1

            974cb516a6296d14443507cda6e19285ea46694b

            SHA256

            645c0abd1c5ae89195ad3bd3bb228075c54480231b3e8b5076dddc8387f16b75

            SHA512

            30b35afe240a2fd75ef9234f4639c14f46a04bb1728d18d52c98eca2390331ff72503c7c39642bedbc8e2c5ff226610d8ce049a9223ca280942d4e195ea40b88

          • C:\Users\Admin\AppData\Local\Temp\lka6cn_1.pdb

            Filesize

            7KB

            MD5

            da91f3194913d0e8552a3b95a0f9af88

            SHA1

            02424883308dabe18eb661e577f2b774945614a0

            SHA256

            2b68c512aa4429aa264ecc4c5c7e39fe55a181da220486c8e4cd261a81fd93fa

            SHA512

            d993abdb59097cd0b3d64cdb8c0d197caa4fc757dff116b027ed3d75857c48f7556165fcf0a674b63e48ee9b3a23d47211017d6928c1b74c5bd506f2e5d84554

          • C:\Users\Admin\AppData\Roaming\power.exe

            Filesize

            507KB

            MD5

            743f47ae7d09fce22d0a7c724461f7e3

            SHA1

            8e98dd1efb70749af72c57344aab409fb927394e

            SHA256

            1bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465

            SHA512

            567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf

          • C:\Users\Admin\AppData\Roaming\sant.exe

            Filesize

            12KB

            MD5

            5effca91c3f1e9c87d364460097f8048

            SHA1

            28387c043ab6857aaa51865346046cf5dc4c7b49

            SHA256

            3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907

            SHA512

            b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0

          • C:\Users\Admin\AppData\Roaming\ufx.exe

            Filesize

            960KB

            MD5

            22e088012519e1013c39a3828bda7498

            SHA1

            3a8a87cce3f6aff415ee39cf21738663c0610016

            SHA256

            9e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973

            SHA512

            5559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8

          • C:\Users\Admin\AppData\Roaming\va.exe

            Filesize

            88KB

            MD5

            c084e736931c9e6656362b0ba971a628

            SHA1

            ef83b95fc645ad3a161a19ccef3224c72e5472bd

            SHA256

            3139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1

            SHA512

            cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f

          • C:\Users\Admin\AppData\Roaming\yaya.exe

            Filesize

            1.7MB

            MD5

            7d05ab95cfe93d84bc5db006c789a47f

            SHA1

            aa4aa0189140670c618348f1baad877b8eca04a4

            SHA256

            5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f

            SHA512

            40d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84

          • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe

            Filesize

            80KB

            MD5

            51bf85f3bf56e628b52d61614192359d

            SHA1

            c1bc90be6a4beb67fb7b195707798106114ec332

            SHA256

            990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446

            SHA512

            131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCAFA9.tmp

            Filesize

            652B

            MD5

            fe53e9368e9e19cf0f5aaefa36991496

            SHA1

            f98db38fb7ad73552f9cbd7bd4ec20f326d85187

            SHA256

            71279829b5bfdc56f1962c2e9161aa8addbd475eb5f81cf2e8c0d88c5bd52dc8

            SHA512

            19d6d207cd317a97a4bd4ec11a8f9100ebb23c128c47f3e8b33d84890c018f0d9362b3e94c239895e2715339ea64aa8e9db19f5b76dc9414b274a768fde4e624

          • \??\c:\Users\Admin\AppData\Local\Temp\lka6cn_1.0.cs

            Filesize

            4KB

            MD5

            a0d1b6f34f315b4d81d384b8ebcdeaa5

            SHA1

            794c1ff4f2a28e0c631a783846ecfffdd4c7ae09

            SHA256

            0b3a3f8f11eb6f50fe67943f2b73c5824614f31c2e0352cc234927d7cb1a52e0

            SHA512

            0a89293d731c5bca05e73148f85a740b324fc877f2fb05cde1f68e2098329fbca552d78249a46f4a1da15a450c8e754c73be20c652f7089d5cfec445ce950a0e

          • \??\c:\Users\Admin\AppData\Local\Temp\lka6cn_1.cmdline

            Filesize

            309B

            MD5

            30b09e18bcaa54faaba6a3d86d52d15e

            SHA1

            34b6cdcd55d668d5832837093ad697e87854bdb6

            SHA256

            14bf19bcdf97d7305ffcf09d45db774a62798a1e3b346d475b38b7561a201e07

            SHA512

            7c59d1199558e05872641ebd108d8103c03f8cff3aeba18f2d28267e9d092e42eddeb80f16345c6c7a0b1e8f46e83cec598aa16b40285ca4d95863e7dfa87328

          • memory/412-22-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/4068-55-0x0000000000400000-0x000000000047B000-memory.dmp

            Filesize

            492KB

          • memory/4596-92-0x0000000000340000-0x000000000034A000-memory.dmp

            Filesize

            40KB

          • memory/4596-80-0x00000000004B0000-0x00000000008DC000-memory.dmp

            Filesize

            4.2MB

          • memory/4596-94-0x0000000000340000-0x000000000034A000-memory.dmp

            Filesize

            40KB

          • memory/4596-81-0x00000000004B0000-0x00000000008DC000-memory.dmp

            Filesize

            4.2MB

          • memory/4596-82-0x0000000000340000-0x000000000034A000-memory.dmp

            Filesize

            40KB

          • memory/4864-21-0x0000000000530000-0x000000000053A000-memory.dmp

            Filesize

            40KB

          • memory/4864-23-0x0000000000530000-0x000000000053A000-memory.dmp

            Filesize

            40KB

          • memory/4864-79-0x0000000000530000-0x000000000053A000-memory.dmp

            Filesize

            40KB

          • memory/4864-17-0x0000000000400000-0x0000000000404000-memory.dmp

            Filesize

            16KB

          • memory/4864-86-0x0000000000530000-0x000000000053A000-memory.dmp

            Filesize

            40KB

          • memory/4864-88-0x0000000000400000-0x0000000000404000-memory.dmp

            Filesize

            16KB

          • memory/4936-100-0x0000000000400000-0x0000000000485000-memory.dmp

            Filesize

            532KB

          • memory/4936-78-0x0000000000400000-0x0000000000485000-memory.dmp

            Filesize

            532KB

          • memory/5076-60-0x000000001BAF0000-0x000000001BAF8000-memory.dmp

            Filesize

            32KB

          • memory/5076-59-0x000000001BA50000-0x000000001BAEC000-memory.dmp

            Filesize

            624KB

          • memory/5076-74-0x000000001BB10000-0x000000001BB18000-memory.dmp

            Filesize

            32KB

          • memory/5076-58-0x000000001B580000-0x000000001BA4E000-memory.dmp

            Filesize

            4.8MB

          • memory/6132-101-0x0000000005370000-0x00000000053A6000-memory.dmp

            Filesize

            216KB

          • memory/6132-102-0x0000000005AF0000-0x000000000611A000-memory.dmp

            Filesize

            6.2MB

          • memory/6132-103-0x0000000005AA0000-0x0000000005AC2000-memory.dmp

            Filesize

            136KB

          • memory/6132-104-0x0000000006190000-0x00000000061F6000-memory.dmp

            Filesize

            408KB

          • memory/6132-105-0x0000000006330000-0x0000000006396000-memory.dmp

            Filesize

            408KB

          • memory/6132-114-0x0000000006460000-0x00000000067B7000-memory.dmp

            Filesize

            3.3MB

          • memory/6132-115-0x0000000006820000-0x000000000683E000-memory.dmp

            Filesize

            120KB

          • memory/6132-116-0x0000000006850000-0x000000000689C000-memory.dmp

            Filesize

            304KB

          • memory/6132-117-0x0000000007A00000-0x0000000007A46000-memory.dmp

            Filesize

            280KB