Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-08-2021 03:32
Static task
static1
Behavioral task
behavioral1
Sample
b19ea68941ac6a60f6a2d98fa80c022c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b19ea68941ac6a60f6a2d98fa80c022c.exe
Resource
win10v20210410
General
-
Target
b19ea68941ac6a60f6a2d98fa80c022c.exe
-
Size
181KB
-
MD5
b19ea68941ac6a60f6a2d98fa80c022c
-
SHA1
e1e3166abb974f8f1194005e46f73c2eb4218ead
-
SHA256
cfc34e5f72f2f5960b55cdf15d303a4a3b1922779743587d81c7de00af23f2c0
-
SHA512
a52cbf0539df5706b286f878d328dc02e1a2111c112b77be027e6d8a6d8fadea47373484c8e7c33b64ee9a2280dd225a4c91de620f63a904a064d89e6d08d644
Malware Config
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 2824 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b19ea68941ac6a60f6a2d98fa80c022c.exedescription pid process target process PID 3916 set thread context of 1496 3916 b19ea68941ac6a60f6a2d98fa80c022c.exe b19ea68941ac6a60f6a2d98fa80c022c.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b19ea68941ac6a60f6a2d98fa80c022c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b19ea68941ac6a60f6a2d98fa80c022c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b19ea68941ac6a60f6a2d98fa80c022c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b19ea68941ac6a60f6a2d98fa80c022c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b19ea68941ac6a60f6a2d98fa80c022c.exepid process 1496 b19ea68941ac6a60f6a2d98fa80c022c.exe 1496 b19ea68941ac6a60f6a2d98fa80c022c.exe 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2824 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
b19ea68941ac6a60f6a2d98fa80c022c.exepid process 1496 b19ea68941ac6a60f6a2d98fa80c022c.exe 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 2824 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 2824 -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
b19ea68941ac6a60f6a2d98fa80c022c.exedescription pid process target process PID 3916 wrote to memory of 1496 3916 b19ea68941ac6a60f6a2d98fa80c022c.exe b19ea68941ac6a60f6a2d98fa80c022c.exe PID 3916 wrote to memory of 1496 3916 b19ea68941ac6a60f6a2d98fa80c022c.exe b19ea68941ac6a60f6a2d98fa80c022c.exe PID 3916 wrote to memory of 1496 3916 b19ea68941ac6a60f6a2d98fa80c022c.exe b19ea68941ac6a60f6a2d98fa80c022c.exe PID 3916 wrote to memory of 1496 3916 b19ea68941ac6a60f6a2d98fa80c022c.exe b19ea68941ac6a60f6a2d98fa80c022c.exe PID 3916 wrote to memory of 1496 3916 b19ea68941ac6a60f6a2d98fa80c022c.exe b19ea68941ac6a60f6a2d98fa80c022c.exe PID 3916 wrote to memory of 1496 3916 b19ea68941ac6a60f6a2d98fa80c022c.exe b19ea68941ac6a60f6a2d98fa80c022c.exe PID 2824 wrote to memory of 2176 2824 explorer.exe PID 2824 wrote to memory of 2176 2824 explorer.exe PID 2824 wrote to memory of 2176 2824 explorer.exe PID 2824 wrote to memory of 2176 2824 explorer.exe PID 2824 wrote to memory of 1512 2824 explorer.exe PID 2824 wrote to memory of 1512 2824 explorer.exe PID 2824 wrote to memory of 1512 2824 explorer.exe PID 2824 wrote to memory of 2256 2824 explorer.exe PID 2824 wrote to memory of 2256 2824 explorer.exe PID 2824 wrote to memory of 2256 2824 explorer.exe PID 2824 wrote to memory of 2256 2824 explorer.exe PID 2824 wrote to memory of 2668 2824 explorer.exe PID 2824 wrote to memory of 2668 2824 explorer.exe PID 2824 wrote to memory of 2668 2824 explorer.exe PID 2824 wrote to memory of 1120 2824 explorer.exe PID 2824 wrote to memory of 1120 2824 explorer.exe PID 2824 wrote to memory of 1120 2824 explorer.exe PID 2824 wrote to memory of 1120 2824 explorer.exe PID 2824 wrote to memory of 3924 2824 explorer.exe PID 2824 wrote to memory of 3924 2824 explorer.exe PID 2824 wrote to memory of 3924 2824 explorer.exe PID 2824 wrote to memory of 2424 2824 explorer.exe PID 2824 wrote to memory of 2424 2824 explorer.exe PID 2824 wrote to memory of 2424 2824 explorer.exe PID 2824 wrote to memory of 2424 2824 explorer.exe PID 2824 wrote to memory of 3876 2824 explorer.exe PID 2824 wrote to memory of 3876 2824 explorer.exe PID 2824 wrote to memory of 3876 2824 explorer.exe PID 2824 wrote to memory of 3928 2824 explorer.exe PID 2824 wrote to memory of 3928 2824 explorer.exe PID 2824 wrote to memory of 3928 2824 explorer.exe PID 2824 wrote to memory of 3928 2824 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe"C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe"C:\Users\Admin\AppData\Local\Temp\b19ea68941ac6a60f6a2d98fa80c022c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1120-130-0x0000000000000000-mapping.dmp
-
memory/1120-131-0x0000000000F80000-0x0000000000F85000-memory.dmpFilesize
20KB
-
memory/1120-132-0x0000000000F70000-0x0000000000F79000-memory.dmpFilesize
36KB
-
memory/1496-115-0x0000000000402E1A-mapping.dmp
-
memory/1496-114-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1512-122-0x0000000000420000-0x0000000000427000-memory.dmpFilesize
28KB
-
memory/1512-123-0x0000000000410000-0x000000000041C000-memory.dmpFilesize
48KB
-
memory/1512-121-0x0000000000000000-mapping.dmp
-
memory/2176-118-0x0000000000000000-mapping.dmp
-
memory/2176-119-0x00000000037D0000-0x0000000003844000-memory.dmpFilesize
464KB
-
memory/2176-120-0x00000000012F0000-0x000000000135B000-memory.dmpFilesize
428KB
-
memory/2256-124-0x0000000000000000-mapping.dmp
-
memory/2256-125-0x00000000009F0000-0x00000000009F7000-memory.dmpFilesize
28KB
-
memory/2256-126-0x00000000009E0000-0x00000000009EB000-memory.dmpFilesize
44KB
-
memory/2424-136-0x0000000000000000-mapping.dmp
-
memory/2424-137-0x0000000001000000-0x0000000001004000-memory.dmpFilesize
16KB
-
memory/2424-138-0x0000000000DF0000-0x0000000000DF9000-memory.dmpFilesize
36KB
-
memory/2668-129-0x00000000008F0000-0x00000000008FF000-memory.dmpFilesize
60KB
-
memory/2668-128-0x0000000000900000-0x0000000000909000-memory.dmpFilesize
36KB
-
memory/2668-127-0x0000000000000000-mapping.dmp
-
memory/2824-117-0x0000000000F40000-0x0000000000F56000-memory.dmpFilesize
88KB
-
memory/3876-140-0x0000000000840000-0x0000000000845000-memory.dmpFilesize
20KB
-
memory/3876-141-0x0000000000830000-0x0000000000839000-memory.dmpFilesize
36KB
-
memory/3876-139-0x0000000000000000-mapping.dmp
-
memory/3916-116-0x0000000002CD0000-0x0000000002CDA000-memory.dmpFilesize
40KB
-
memory/3924-135-0x0000000000900000-0x000000000090C000-memory.dmpFilesize
48KB
-
memory/3924-134-0x0000000000910000-0x0000000000916000-memory.dmpFilesize
24KB
-
memory/3924-133-0x0000000000000000-mapping.dmp
-
memory/3928-142-0x0000000000000000-mapping.dmp
-
memory/3928-143-0x0000000000990000-0x0000000000995000-memory.dmpFilesize
20KB
-
memory/3928-144-0x0000000000980000-0x0000000000989000-memory.dmpFilesize
36KB