Analysis
-
max time kernel
150s -
max time network
189s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-08-2021 09:12
Static task
static1
Behavioral task
behavioral1
Sample
2d62eb793b2649d519f14e3a9447089d.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2d62eb793b2649d519f14e3a9447089d.exe
Resource
win10v20210408
General
-
Target
2d62eb793b2649d519f14e3a9447089d.exe
-
Size
163KB
-
MD5
2d62eb793b2649d519f14e3a9447089d
-
SHA1
3015db20b32a0bd68af5b08af8badc0dffc454a2
-
SHA256
f0bc49d224a52c749f5f68149765b6a1420598013d1bf7456a6ea46faa476aab
-
SHA512
321a57b63ca8ee150a9f6e56cffc907fb145b7591b0638b9cecff5b5960b67a58126e236fa1eaa506b8eca5c0c9435d87594fd47b36f14eff3e209de02e9bf0a
Malware Config
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Deletes itself 1 IoCs
Processes:
pid process 1200 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2d62eb793b2649d519f14e3a9447089d.exedescription pid process target process PID 468 set thread context of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2d62eb793b2649d519f14e3a9447089d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2d62eb793b2649d519f14e3a9447089d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2d62eb793b2649d519f14e3a9447089d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2d62eb793b2649d519f14e3a9447089d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2d62eb793b2649d519f14e3a9447089d.exepid process 1848 2d62eb793b2649d519f14e3a9447089d.exe 1848 2d62eb793b2649d519f14e3a9447089d.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1200 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
2d62eb793b2649d519f14e3a9447089d.exepid process 1848 2d62eb793b2649d519f14e3a9447089d.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1200 1200 1200 1200 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
2d62eb793b2649d519f14e3a9447089d.exedescription pid process target process PID 468 wrote to memory of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe PID 468 wrote to memory of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe PID 468 wrote to memory of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe PID 468 wrote to memory of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe PID 468 wrote to memory of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe PID 468 wrote to memory of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe PID 468 wrote to memory of 1848 468 2d62eb793b2649d519f14e3a9447089d.exe 2d62eb793b2649d519f14e3a9447089d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d62eb793b2649d519f14e3a9447089d.exe"C:\Users\Admin\AppData\Local\Temp\2d62eb793b2649d519f14e3a9447089d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\2d62eb793b2649d519f14e3a9447089d.exe"C:\Users\Admin\AppData\Local\Temp\2d62eb793b2649d519f14e3a9447089d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1848
-