Resubmissions

20/04/2025, 00:10

250420-agcc8axyax 10

16/04/2025, 11:04

250416-m58gsaz1ay 10

15/04/2025, 17:34

250415-v5ylksypw9 10

15/04/2025, 06:16

250415-g1p7ras1dw 10

14/04/2025, 08:06

250414-jzpwpstxhx 10

14/04/2025, 07:59

250414-jvg1assky4 10

14/04/2025, 07:22

250414-h7g1dss1h1 10

14/04/2025, 07:16

250414-h3xv2s1nv6 10

Analysis

  • max time kernel
    300s
  • max time network
    304s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2025, 00:10

General

  • Target

    HYDRA.exe

  • Size

    2.6MB

  • MD5

    c52bc39684c52886712971a92f339b23

  • SHA1

    c5cb39850affb7ed322bfb0a4900e17c54f95a11

  • SHA256

    f8c17cb375e8ccad5b0e33dae65694a1bd628f91cac6cf65dd11f50e91130c2d

  • SHA512

    2d50c1aa6ca237b9dbe97f000a082a223618f2164c8ab42ace9f4e142c318b2fc53e91a476dbe9c2dd459942b61507df5c551bd5c692a2b2a2037e4f6bd2a12b

  • SSDEEP

    49152:HnUXzRe4cjAx+L/G/3JHQZutOnmSzZniyui0EJHezdcc/DK9kTO1S:HUD8djA0LOvJdtOmSlniyuiPFePmS61S

Malware Config

Extracted

Family

smokeloader

Version

2017

C2

http://92.53.105.14/

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
    "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Roaming\yaya.exe
      C:\Users\Admin\AppData\Roaming\yaya.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5616
      • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe
        "C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4788
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uw_iblev.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5044
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES65A0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC659F.tmp"
            5⤵
              PID:3940
      • C:\Users\Admin\AppData\Roaming\va.exe
        C:\Users\Admin\AppData\Roaming\va.exe
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2732
      • C:\Users\Admin\AppData\Roaming\ufx.exe
        C:\Users\Admin\AppData\Roaming\ufx.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:540
        • C:\ProgramData\ucp\usc.exe
          "C:\ProgramData\ucp\usc.exe" /ucp/usc.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4260
          • C:\Windows\SysWOW64\SCHTASKS.exe
            SCHTASKS /Create /SC MINUTE /MO 10 /F /TN SystemOptimize /TR C:\ProgramData\ucp\usc.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3992
      • C:\Users\Admin\AppData\Roaming\sant.exe
        C:\Users\Admin\AppData\Roaming\sant.exe
        2⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:5916
      • C:\Users\Admin\AppData\Roaming\power.exe
        C:\Users\Admin\AppData\Roaming\power.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3140
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3724
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\svbtaeit\ewdgsccv.exe
      1⤵
        PID:2860

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\ucp\usc.exe

        Filesize

        4.0MB

        MD5

        b100b373d645bf59b0487dbbda6c426d

        SHA1

        44a4ad2913f5f35408b8c16459dcce3f101bdcc7

        SHA256

        84d7fd0a93d963e9808212917f79fe2d485bb7fbc94ee374a141bbd15da725b7

        SHA512

        69483fed79f33da065b1cc65a2576ba268c78990545070f6f76fca8f48aaec8274faecdc9bcf92bf84a87809a318b159d1a3c835f848a6eea6c163f41612bf9b

      • C:\Users\Admin\AppData\Local\Temp\RES65A0.tmp

        Filesize

        1KB

        MD5

        67bf6c836bee4be0099fb07809eff067

        SHA1

        56f1a3c06932d3eafb118e142c8593740bcc2427

        SHA256

        f9dc3fc12b7980c851daec75239417193fcccd1ced4feceb03e9b1bf9176f381

        SHA512

        a40f0e084c34f7bc746a7dd9ca9479bc9571511b733069eea3cb918ce6634f57b68484ce306c3fd11c6c725c54172e9cd5453e0841e5a9837735f96b988fa3c2

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tn2mn42h.duo.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\uw_iblev.dll

        Filesize

        5KB

        MD5

        3e98a48eb8c77eb8b50fb47fe04e7f38

        SHA1

        5b45a1bc107401f04574ea5e30e8ad9b1b86fdb9

        SHA256

        9b3f064577d03e0712ca28d2c4172c6537d03882ab79d9c70b771f7a0e0e01ab

        SHA512

        764bb3b668e48158622961fd4c988ab71e67bb39f2392dba78006956d727ad0412eca25c28f350c16aff8eab09dd0cc568ca98078f5a769a80c64d6101594956

      • C:\Users\Admin\AppData\Local\Temp\uw_iblev.pdb

        Filesize

        7KB

        MD5

        7e8dcaba32db39012483bf562d47e7af

        SHA1

        e0dd29adbec04af828e8f6d2d18ce1980a9d18f8

        SHA256

        46b65f7e398b92c1fdac873101d10938cc2a1158a43b8ed046a04e7936561048

        SHA512

        476d61db88316c7343206eea5e9b627652ffe0f32175269d0d5c9317677677d1c98c3b7b0043c416df6e88276e60e4f59fd2ce7462a7d6d94cfd119f4e9e2183

      • C:\Users\Admin\AppData\Roaming\power.exe

        Filesize

        507KB

        MD5

        743f47ae7d09fce22d0a7c724461f7e3

        SHA1

        8e98dd1efb70749af72c57344aab409fb927394e

        SHA256

        1bee45423044b5a6bf0ad0dd2870117824b000784ce81c5f8a1b930bb8bc0465

        SHA512

        567993c3b798365efa07b7a46fda98494bfe540647f27654764e78b7f60f093d403b77b9abb889cfb09b44f13515ce3c041fc5db05882418313c3b3409dd77bf

      • C:\Users\Admin\AppData\Roaming\sant.exe

        Filesize

        12KB

        MD5

        5effca91c3f1e9c87d364460097f8048

        SHA1

        28387c043ab6857aaa51865346046cf5dc4c7b49

        SHA256

        3fd826fc0c032721466b94ab3ec7dcfe006cc284e16132af6b91dfbc064b0907

        SHA512

        b0dba30fde295d3f7858db9d1463239b30cd84921971032b2afb96f811a53ac12c1e6f72013d2eff397b0b89c371e7c023c951cd2102f94157cba9918cd2c3e0

      • C:\Users\Admin\AppData\Roaming\ufx.exe

        Filesize

        960KB

        MD5

        22e088012519e1013c39a3828bda7498

        SHA1

        3a8a87cce3f6aff415ee39cf21738663c0610016

        SHA256

        9e3826138bacac89845c26278f52854117db1652174c1c76dbb2bd24f00f4973

        SHA512

        5559e279dd3d72b2c9062d88e99212bbc67639fe5a42076efd24ae890cfce72cfe2235adb20bf5ed1f547b6da9e69effa4ccb80c0407b7524f134a24603ea5a8

      • C:\Users\Admin\AppData\Roaming\va.exe

        Filesize

        88KB

        MD5

        c084e736931c9e6656362b0ba971a628

        SHA1

        ef83b95fc645ad3a161a19ccef3224c72e5472bd

        SHA256

        3139bf3c4b958c3a019af512aecdb8161b9d6d7432d2c404abda3f42b63f34f1

        SHA512

        cbd6485840a117b52e24586da536cefa94ca087b41eb460d27bc2bd320217957c9e0e96b0daf74343efde2e23a5242e7a99075aabf5f9e18e03b52eb7151ae1f

      • C:\Users\Admin\AppData\Roaming\yaya.exe

        Filesize

        1.7MB

        MD5

        7d05ab95cfe93d84bc5db006c789a47f

        SHA1

        aa4aa0189140670c618348f1baad877b8eca04a4

        SHA256

        5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f

        SHA512

        40d1461e68994df56f19d9f7b2d96ffdc5300ca933e10dc53f7953471df8dea3aabeb178c3432c6819175475cadcbdb698384e3df57b3606c6fce3173a31fe84

      • C:\Windows\Temp\{1945BBS40-8571-3DA1-BB29-HYDRA7A13A1E}\starter.exe

        Filesize

        80KB

        MD5

        51bf85f3bf56e628b52d61614192359d

        SHA1

        c1bc90be6a4beb67fb7b195707798106114ec332

        SHA256

        990dffdc0694858514d6d7ff7fff5dc9f48fab3aa35a4d9301d94fc57e346446

        SHA512

        131173f3aabcfba484e972424c54201ec4b1facfb2df1efe08df0d43a816d4df03908b006884564c56a6245badd4f9ed442a295f1db2c0c970a8f80985d35474

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC659F.tmp

        Filesize

        652B

        MD5

        5de548af41c36fcbc392cfc61d24e1de

        SHA1

        88f438af81b992ee68956bda8c9463adaf4fa04a

        SHA256

        143655f79a74fa95985ae1bf45309f71d0bec1a0d52e5c1c4bf164c3954e6941

        SHA512

        f91c1121a41c1477cd0ccedb3ff4bd2a4873dd1726e8ebaa1cc5ce3d3275a141f925887adc431c0fb22202edfe3910cad156cf96594a47adfab12f08bc1a191a

      • \??\c:\Users\Admin\AppData\Local\Temp\uw_iblev.0.cs

        Filesize

        4KB

        MD5

        a0d1b6f34f315b4d81d384b8ebcdeaa5

        SHA1

        794c1ff4f2a28e0c631a783846ecfffdd4c7ae09

        SHA256

        0b3a3f8f11eb6f50fe67943f2b73c5824614f31c2e0352cc234927d7cb1a52e0

        SHA512

        0a89293d731c5bca05e73148f85a740b324fc877f2fb05cde1f68e2098329fbca552d78249a46f4a1da15a450c8e754c73be20c652f7089d5cfec445ce950a0e

      • \??\c:\Users\Admin\AppData\Local\Temp\uw_iblev.cmdline

        Filesize

        309B

        MD5

        0b84998248e5a20a2b82cb1fc7af1923

        SHA1

        92170096e4f2725a28c8bd1a5377860bd2a5d601

        SHA256

        d6cff106b0e93f05f025f5b050bc81bfe9ca6fd8db366d1977e65fdca4b5f6a6

        SHA512

        30a95feb90bfe329115719cbc963bf1b107320b85de8acba41c52921d6fd6efcdb02cf19eda1eaa5d42207cc2cf1d09c8f329398b7fa5e5566d48c4a8935f1e5

      • memory/2732-18-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/3140-78-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3140-97-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3644-86-0x00000000001F0000-0x00000000001FA000-memory.dmp

        Filesize

        40KB

      • memory/3644-17-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/3644-88-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/3644-24-0x00000000001F0000-0x00000000001FA000-memory.dmp

        Filesize

        40KB

      • memory/3644-22-0x00000000001F0000-0x00000000001FA000-memory.dmp

        Filesize

        40KB

      • memory/3644-79-0x00000000001F0000-0x00000000001FA000-memory.dmp

        Filesize

        40KB

      • memory/3724-99-0x0000000004EE0000-0x0000000005508000-memory.dmp

        Filesize

        6.2MB

      • memory/3724-113-0x0000000005D00000-0x0000000005D1E000-memory.dmp

        Filesize

        120KB

      • memory/3724-118-0x0000000007710000-0x0000000007D8A000-memory.dmp

        Filesize

        6.5MB

      • memory/3724-119-0x00000000070B0000-0x00000000070CA000-memory.dmp

        Filesize

        104KB

      • memory/3724-116-0x0000000006E10000-0x0000000006E86000-memory.dmp

        Filesize

        472KB

      • memory/3724-115-0x0000000006270000-0x00000000062B4000-memory.dmp

        Filesize

        272KB

      • memory/3724-114-0x0000000005D40000-0x0000000005D8C000-memory.dmp

        Filesize

        304KB

      • memory/3724-100-0x0000000004D40000-0x0000000004D62000-memory.dmp

        Filesize

        136KB

      • memory/3724-112-0x0000000005720000-0x0000000005A74000-memory.dmp

        Filesize

        3.3MB

      • memory/3724-98-0x00000000023D0000-0x0000000002406000-memory.dmp

        Filesize

        216KB

      • memory/3724-102-0x00000000056B0000-0x0000000005716000-memory.dmp

        Filesize

        408KB

      • memory/3724-101-0x00000000055C0000-0x0000000005626000-memory.dmp

        Filesize

        408KB

      • memory/4788-59-0x000000001B4F0000-0x000000001B58C000-memory.dmp

        Filesize

        624KB

      • memory/4788-58-0x000000001BAE0000-0x000000001BFAE000-memory.dmp

        Filesize

        4.8MB

      • memory/4788-60-0x0000000000E10000-0x0000000000E18000-memory.dmp

        Filesize

        32KB

      • memory/4788-74-0x0000000000E30000-0x0000000000E38000-memory.dmp

        Filesize

        32KB

      • memory/5616-54-0x0000000000400000-0x000000000047B000-memory.dmp

        Filesize

        492KB

      • memory/5916-92-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

        Filesize

        40KB

      • memory/5916-82-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

        Filesize

        40KB

      • memory/5916-94-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

        Filesize

        40KB

      • memory/5916-80-0x0000000000FB0000-0x00000000013E3000-memory.dmp

        Filesize

        4.2MB

      • memory/5916-81-0x0000000000FB0000-0x00000000013E3000-memory.dmp

        Filesize

        4.2MB