Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-07-2021 23:04
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe
Resource
win10v20210410
General
-
Target
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe
-
Size
213KB
-
MD5
9d4d248957fee5b2a47e27c19f30ddf7
-
SHA1
1a816bdadf0acdd942cffbd80273e481f592e048
-
SHA256
d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2
-
SHA512
5bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5
Malware Config
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
cjgidwacjgidwapid process 2644 cjgidwa 3364 cjgidwa -
Deletes itself 1 IoCs
Processes:
pid process 2492 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.execjgidwadescription pid process target process PID 4064 set thread context of 2864 4064 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe PID 2644 set thread context of 3364 2644 cjgidwa cjgidwa -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.execjgidwadescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjgidwa Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjgidwa Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjgidwa -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exepid process 2864 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe 2864 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2492 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.execjgidwapid process 2864 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 2492 3364 cjgidwa -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2492 Token: SeCreatePagefilePrivilege 2492 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
pid process 2492 -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pid process 2492 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 2492 -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.execjgidwadescription pid process target process PID 4064 wrote to memory of 2864 4064 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe PID 4064 wrote to memory of 2864 4064 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe PID 4064 wrote to memory of 2864 4064 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe PID 4064 wrote to memory of 2864 4064 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe PID 4064 wrote to memory of 2864 4064 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe PID 4064 wrote to memory of 2864 4064 SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe PID 2492 wrote to memory of 1248 2492 explorer.exe PID 2492 wrote to memory of 1248 2492 explorer.exe PID 2492 wrote to memory of 1248 2492 explorer.exe PID 2492 wrote to memory of 1248 2492 explorer.exe PID 2492 wrote to memory of 1560 2492 explorer.exe PID 2492 wrote to memory of 1560 2492 explorer.exe PID 2492 wrote to memory of 1560 2492 explorer.exe PID 2492 wrote to memory of 640 2492 explorer.exe PID 2492 wrote to memory of 640 2492 explorer.exe PID 2492 wrote to memory of 640 2492 explorer.exe PID 2492 wrote to memory of 640 2492 explorer.exe PID 2492 wrote to memory of 1392 2492 explorer.exe PID 2492 wrote to memory of 1392 2492 explorer.exe PID 2492 wrote to memory of 1392 2492 explorer.exe PID 2492 wrote to memory of 1160 2492 explorer.exe PID 2492 wrote to memory of 1160 2492 explorer.exe PID 2492 wrote to memory of 1160 2492 explorer.exe PID 2492 wrote to memory of 1160 2492 explorer.exe PID 2492 wrote to memory of 2408 2492 explorer.exe PID 2492 wrote to memory of 2408 2492 explorer.exe PID 2492 wrote to memory of 2408 2492 explorer.exe PID 2492 wrote to memory of 2888 2492 explorer.exe PID 2492 wrote to memory of 2888 2492 explorer.exe PID 2492 wrote to memory of 2888 2492 explorer.exe PID 2492 wrote to memory of 2888 2492 explorer.exe PID 2492 wrote to memory of 2616 2492 explorer.exe PID 2492 wrote to memory of 2616 2492 explorer.exe PID 2492 wrote to memory of 2616 2492 explorer.exe PID 2492 wrote to memory of 2168 2492 explorer.exe PID 2492 wrote to memory of 2168 2492 explorer.exe PID 2492 wrote to memory of 2168 2492 explorer.exe PID 2492 wrote to memory of 2168 2492 explorer.exe PID 2644 wrote to memory of 3364 2644 cjgidwa cjgidwa PID 2644 wrote to memory of 3364 2644 cjgidwa cjgidwa PID 2644 wrote to memory of 3364 2644 cjgidwa cjgidwa PID 2644 wrote to memory of 3364 2644 cjgidwa cjgidwa PID 2644 wrote to memory of 3364 2644 cjgidwa cjgidwa PID 2644 wrote to memory of 3364 2644 cjgidwa cjgidwa
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware2.2724.9848.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Roaming\cjgidwaC:\Users\Admin\AppData\Roaming\cjgidwa1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\cjgidwaC:\Users\Admin\AppData\Roaming\cjgidwa2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\cjgidwaMD5
9d4d248957fee5b2a47e27c19f30ddf7
SHA11a816bdadf0acdd942cffbd80273e481f592e048
SHA256d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2
SHA5125bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5
-
C:\Users\Admin\AppData\Roaming\cjgidwaMD5
9d4d248957fee5b2a47e27c19f30ddf7
SHA11a816bdadf0acdd942cffbd80273e481f592e048
SHA256d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2
SHA5125bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5
-
C:\Users\Admin\AppData\Roaming\cjgidwaMD5
9d4d248957fee5b2a47e27c19f30ddf7
SHA11a816bdadf0acdd942cffbd80273e481f592e048
SHA256d317f4c95d2c1e6a7147538d0a3a343e8bfbfbd175dcfbb3d3b1672dc0aca8d2
SHA5125bc0e0a4d4407e79641ff0a4b817ed77e201678aab6c079ff342de569868333fbc770cc564acc68f044e658d313dd6e6b4a33b47a9c40a2f77c3d9f81f3207c5
-
memory/640-124-0x0000000000000000-mapping.dmp
-
memory/640-125-0x0000000000E90000-0x0000000000E97000-memory.dmpFilesize
28KB
-
memory/640-126-0x0000000000E80000-0x0000000000E8B000-memory.dmpFilesize
44KB
-
memory/1160-130-0x0000000000000000-mapping.dmp
-
memory/1160-133-0x0000000000E10000-0x0000000000E19000-memory.dmpFilesize
36KB
-
memory/1160-131-0x0000000000E20000-0x0000000000E25000-memory.dmpFilesize
20KB
-
memory/1248-119-0x0000000000400000-0x0000000000474000-memory.dmpFilesize
464KB
-
memory/1248-120-0x0000000000170000-0x00000000001DB000-memory.dmpFilesize
428KB
-
memory/1248-118-0x0000000000000000-mapping.dmp
-
memory/1392-128-0x0000000000DF0000-0x0000000000DF9000-memory.dmpFilesize
36KB
-
memory/1392-127-0x0000000000000000-mapping.dmp
-
memory/1392-129-0x0000000000DE0000-0x0000000000DEF000-memory.dmpFilesize
60KB
-
memory/1560-123-0x0000000000340000-0x000000000034C000-memory.dmpFilesize
48KB
-
memory/1560-122-0x0000000000350000-0x0000000000357000-memory.dmpFilesize
28KB
-
memory/1560-121-0x0000000000000000-mapping.dmp
-
memory/2168-142-0x0000000000000000-mapping.dmp
-
memory/2168-144-0x00000000012A0000-0x00000000012A9000-memory.dmpFilesize
36KB
-
memory/2168-143-0x00000000012B0000-0x00000000012B5000-memory.dmpFilesize
20KB
-
memory/2408-136-0x0000000000520000-0x000000000052C000-memory.dmpFilesize
48KB
-
memory/2408-134-0x0000000000530000-0x0000000000536000-memory.dmpFilesize
24KB
-
memory/2408-132-0x0000000000000000-mapping.dmp
-
memory/2492-117-0x0000000001470000-0x0000000001486000-memory.dmpFilesize
88KB
-
memory/2492-150-0x00000000014D0000-0x00000000014E6000-memory.dmpFilesize
88KB
-
memory/2616-137-0x0000000000000000-mapping.dmp
-
memory/2616-139-0x00000000007E0000-0x00000000007E5000-memory.dmpFilesize
20KB
-
memory/2616-141-0x00000000007D0000-0x00000000007D9000-memory.dmpFilesize
36KB
-
memory/2864-115-0x0000000000402E1A-mapping.dmp
-
memory/2864-114-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2888-135-0x0000000000000000-mapping.dmp
-
memory/2888-138-0x00000000003C0000-0x00000000003C4000-memory.dmpFilesize
16KB
-
memory/2888-140-0x00000000003B0000-0x00000000003B9000-memory.dmpFilesize
36KB
-
memory/3364-148-0x0000000000402E1A-mapping.dmp
-
memory/4064-116-0x0000000000980000-0x000000000098A000-memory.dmpFilesize
40KB