Analysis
-
max time kernel
156s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-08-2021 11:49
Static task
static1
Behavioral task
behavioral1
Sample
b9c0e8858d1d0d249923e3a56b01e419.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b9c0e8858d1d0d249923e3a56b01e419.exe
Resource
win10v20210410
General
-
Target
b9c0e8858d1d0d249923e3a56b01e419.exe
-
Size
181KB
-
MD5
b9c0e8858d1d0d249923e3a56b01e419
-
SHA1
9ac2c660abb36379f406ce556944a11ee6fdfd41
-
SHA256
28b577b09ddd23494aaa0a19ae4e9219562a80a9176b9cfcdd3bb76a59bf4a28
-
SHA512
54f8ecd65abbcaead999b9f9128dcd3abbbef562ce660eb4e1a264afd3c3af06f72f3dd8fb7d15dae64d413344063a47365ae4b4f7e90e88d1d933e2ed9e9fb5
Malware Config
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1252 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b9c0e8858d1d0d249923e3a56b01e419.exedescription pid process target process PID 1920 set thread context of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b9c0e8858d1d0d249923e3a56b01e419.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9c0e8858d1d0d249923e3a56b01e419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9c0e8858d1d0d249923e3a56b01e419.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9c0e8858d1d0d249923e3a56b01e419.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b9c0e8858d1d0d249923e3a56b01e419.exepid process 1140 b9c0e8858d1d0d249923e3a56b01e419.exe 1140 b9c0e8858d1d0d249923e3a56b01e419.exe 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1252 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b9c0e8858d1d0d249923e3a56b01e419.exepid process 1140 b9c0e8858d1d0d249923e3a56b01e419.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1252 1252 1252 1252 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1252 1252 1252 1252 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
b9c0e8858d1d0d249923e3a56b01e419.exedescription pid process target process PID 1920 wrote to memory of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe PID 1920 wrote to memory of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe PID 1920 wrote to memory of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe PID 1920 wrote to memory of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe PID 1920 wrote to memory of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe PID 1920 wrote to memory of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe PID 1920 wrote to memory of 1140 1920 b9c0e8858d1d0d249923e3a56b01e419.exe b9c0e8858d1d0d249923e3a56b01e419.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c0e8858d1d0d249923e3a56b01e419.exe"C:\Users\Admin\AppData\Local\Temp\b9c0e8858d1d0d249923e3a56b01e419.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\b9c0e8858d1d0d249923e3a56b01e419.exe"C:\Users\Admin\AppData\Local\Temp\b9c0e8858d1d0d249923e3a56b01e419.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1140
-