MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 623685e4db75581f2e9257c43aa93cadea10011443751d97ed3902471be98c6f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Smoke Loader


Vendor detections: 10


Intelligence 10 IOCs YARA 7 File information Comments

SHA256 hash: 623685e4db75581f2e9257c43aa93cadea10011443751d97ed3902471be98c6f
SHA3-384 hash: ed6f2f0244624c31aeab5e21b0da13812018d92bac81f2b7d5887003d0ebdf250ecb57856bacfb527fd18b1c0189e8f8
SHA1 hash: 6d63e8636a4dd2a2d121075881b835684fbd0854
MD5 hash: 70af33657f104a316f9cc1bdd11fe7f9
humanhash: tennis-crazy-georgia-magnesium
File name:2021BLL0201.doc__.rtf
Download: download sample
Signature Smoke Loader
File size:1'911'006 bytes
First seen:2021-02-01 07:26:44 UTC
Last seen:Never
File type:Rich Text Format (RTF) rtf
MIME type:text/rtf
ssdeep 24576:wH7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7H7Hvncc:AjjjjjjjjjjjjjjjjjjjjjjjjvR
TLSH A695E1F82304B5D6D76731E2AA26AD8D2537F1375CCA3148705DF7FA2B6B240EB24846
Reporter abuse_ch
Tags:Dofoil rtf Smoke Loader

Intelligence


File Origin
# of uploads :
1
# of downloads :
454
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2021BLL0201.doc__.rtf
Verdict:
Malicious activity
Analysis date:
2021-02-01 07:31:40 UTC
Tags:
ole-embedded trojan exploit CVE-2017-11882 loader smoke stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/rtf
Has a screenshot:
False
Contains macros:
False
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
DNS request
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Connection attempt
Sending an HTTP POST request
Possible injection to a system process
Sending an HTTP GET request
Launching a file downloaded from the Internet
Creating a process from a recently created file
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
Benign windows process drops PE files
Bypasses PowerShell execution policy
Changes memory attributes in foreign processes to executable or writable
Connects to a pastebin service (likely for C&C)
Connects to a URL shortener service
Contains functionality to register a low level keyboard hook
Creates a thread in another existing process (thread injection)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the user root directory
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PowerShell case anomaly found
Sample or dropped binary is a compiled AutoHotkey binary
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Suspicious Program Location Process Starts
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Very long command line found
Writes to foreign memory regions
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 346530 Sample: 2021BLL0201.doc__.rtf Startdate: 01/02/2021 Architecture: WINDOWS Score: 100 82 Malicious sample detected (through community Yara rule) 2->82 84 Multi AV Scanner detection for dropped file 2->84 86 Multi AV Scanner detection for submitted file 2->86 88 16 other signatures 2->88 11 EQNEDT32.EXE 14 2->11         started        16 taskeng.exe 1 2->16         started        18 WINWORD.EXE 292 23 2->18         started        process3 dnsIp4 76 hookedupboatclub.com 107.154.146.108, 49166, 80 INCAPSULAUS United States 11->76 78 67.199.248.11, 49165, 80 GOOGLE-PRIVATE-CLOUDUS United States 11->78 80 bit.ly 11->80 66 C:\Users\user\AppData\Local\...\ball[1].jpg, PE32 11->66 dropped 68 C:\Users\Public\7654333.exe, PE32 11->68 dropped 126 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 11->126 20 7654333.exe 11->20         started        23 sdawswsa.exe 2 16->23         started        file5 signatures6 process7 signatures8 98 Multi AV Scanner detection for dropped file 20->98 100 Very long command line found 20->100 102 Contains functionality to register a low level keyboard hook 20->102 104 2 other signatures 20->104 25 powershell.exe 12 6 20->25         started        process9 dnsIp10 74 paste.ee 172.67.219.133, 443, 49167 CLOUDFLARENETUS United States 25->74 122 Writes to foreign memory regions 25->122 124 Injects a PE file into a foreign processes 25->124 29 MSBuild.exe 25->29         started        signatures11 process12 signatures13 128 Maps a DLL or memory area into another process 29->128 32 explorer.exe 4 29->32 injected process14 dnsIp15 70 ball00ns.com 76.74.235.220, 49169, 80 COGECO-PEER1CA Canada 32->70 72 www.msftncsi.com 32->72 64 C:\Users\user\AppData\...\sdawswsa.exe, PE32 32->64 dropped 90 Benign windows process drops PE files 32->90 92 Injects code into the Windows Explorer (explorer.exe) 32->92 94 Writes to foreign memory regions 32->94 96 Hides that the sample has been downloaded from the Internet (zone.identifier) 32->96 37 explorer.exe 32->37         started        40 explorer.exe 32->40         started        42 explorer.exe 32->42         started        44 13 other processes 32->44 file16 signatures17 process18 signatures19 106 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 37->106 108 Hijacks the control flow in another process 37->108 110 Changes memory attributes in foreign processes to executable or writable 37->110 46 fAETfImyKqGwdcnmKGosMxvgPWiA.exe 37->46 injected 48 fAETfImyKqGwdcnmKGosMxvgPWiA.exe 37->48 injected 50 fAETfImyKqGwdcnmKGosMxvgPWiA.exe 37->50 injected 60 2 other processes 37->60 112 Writes to foreign memory regions 40->112 114 Maps a DLL or memory area into another process 40->114 116 Creates a thread in another existing process (thread injection) 40->116 52 fAETfImyKqGwdcnmKGosMxvgPWiA.exe 40->52 injected 62 2 other processes 40->62 54 dwm.exe 42->54 injected 56 taskhost.exe 42->56 injected 118 Tries to steal Mail credentials (via file access) 44->118 120 Tries to harvest and steal browser information (history, passwords, etc) 44->120 58 conhost.exe 44->58 injected process20
Threat name:
Document-Office.Exploit.Heuristic
Status:
Malicious
First seen:
2021-02-01 01:37:51 UTC
AV detection:
8 of 46 (17.39%)
Threat level:
  2/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Launches Equation Editor
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Maps connected drives based on registry
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
SmokeLoader
Malware Config
C2 Extraction:
http://ball00ns.com/x/
Dropper Extraction:
httPs://paste.ee/r/oZENh
httPs://paste.ee/r/vHJVS
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_RTF_EXPLOIT_CVE_2017_8759_2
Author:ditekSHen
Description:detects CVE-2017-8759 weaponized RTF documents.
Rule name:INDICATOR_RTF_MalVer_Objects
Author:ditekSHen
Description:Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments