Analysis
-
max time kernel
1802s -
max time network
1438s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 09:08
Static task
static1
Behavioral task
behavioral1
Sample
bdf56d1d215d546e5add6dd065232224.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
bdf56d1d215d546e5add6dd065232224.exe
Resource
win11
Behavioral task
behavioral3
Sample
bdf56d1d215d546e5add6dd065232224.exe
Resource
win10v20210408
General
-
Target
bdf56d1d215d546e5add6dd065232224.exe
-
Size
143KB
-
MD5
bdf56d1d215d546e5add6dd065232224
-
SHA1
07b2cc6992490266a7cce234e7a4e2efafc72bec
-
SHA256
2bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
-
SHA512
2a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
catusvwcatusvwcatusvwcatusvwcatusvwcatusvwpid Process 2972 catusvw 1200 catusvw 1456 catusvw 1132 catusvw 1144 catusvw 1576 catusvw -
Deletes itself 1 IoCs
Processes:
pid Process 2740 -
Suspicious use of SetThreadContext 4 IoCs
Processes:
bdf56d1d215d546e5add6dd065232224.execatusvwcatusvwcatusvwdescription pid Process procid_target PID 912 set thread context of 2840 912 bdf56d1d215d546e5add6dd065232224.exe 77 PID 2972 set thread context of 1200 2972 catusvw 89 PID 1456 set thread context of 1132 1456 catusvw 91 PID 1144 set thread context of 1576 1144 catusvw 93 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
catusvwcatusvwcatusvwbdf56d1d215d546e5add6dd065232224.exedescription ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bdf56d1d215d546e5add6dd065232224.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bdf56d1d215d546e5add6dd065232224.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bdf56d1d215d546e5add6dd065232224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI catusvw -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bdf56d1d215d546e5add6dd065232224.exepid Process 2840 bdf56d1d215d546e5add6dd065232224.exe 2840 bdf56d1d215d546e5add6dd065232224.exe 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 2740 -
Suspicious behavior: MapViewOfSection 22 IoCs
Processes:
bdf56d1d215d546e5add6dd065232224.execatusvwcatusvwcatusvwpid Process 2840 bdf56d1d215d546e5add6dd065232224.exe 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 2740 1200 catusvw 1132 catusvw 1576 catusvw -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 Token: SeShutdownPrivilege 2740 Token: SeCreatePagefilePrivilege 2740 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 2740 -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
bdf56d1d215d546e5add6dd065232224.execatusvwcatusvwcatusvwdescription pid Process procid_target PID 912 wrote to memory of 2840 912 bdf56d1d215d546e5add6dd065232224.exe 77 PID 912 wrote to memory of 2840 912 bdf56d1d215d546e5add6dd065232224.exe 77 PID 912 wrote to memory of 2840 912 bdf56d1d215d546e5add6dd065232224.exe 77 PID 912 wrote to memory of 2840 912 bdf56d1d215d546e5add6dd065232224.exe 77 PID 912 wrote to memory of 2840 912 bdf56d1d215d546e5add6dd065232224.exe 77 PID 912 wrote to memory of 2840 912 bdf56d1d215d546e5add6dd065232224.exe 77 PID 2740 wrote to memory of 2876 2740 79 PID 2740 wrote to memory of 2876 2740 79 PID 2740 wrote to memory of 2876 2740 79 PID 2740 wrote to memory of 2876 2740 79 PID 2740 wrote to memory of 528 2740 80 PID 2740 wrote to memory of 528 2740 80 PID 2740 wrote to memory of 528 2740 80 PID 2740 wrote to memory of 2116 2740 81 PID 2740 wrote to memory of 2116 2740 81 PID 2740 wrote to memory of 2116 2740 81 PID 2740 wrote to memory of 2116 2740 81 PID 2740 wrote to memory of 1128 2740 82 PID 2740 wrote to memory of 1128 2740 82 PID 2740 wrote to memory of 1128 2740 82 PID 2740 wrote to memory of 656 2740 83 PID 2740 wrote to memory of 656 2740 83 PID 2740 wrote to memory of 656 2740 83 PID 2740 wrote to memory of 656 2740 83 PID 2740 wrote to memory of 3844 2740 84 PID 2740 wrote to memory of 3844 2740 84 PID 2740 wrote to memory of 3844 2740 84 PID 2740 wrote to memory of 4088 2740 85 PID 2740 wrote to memory of 4088 2740 85 PID 2740 wrote to memory of 4088 2740 85 PID 2740 wrote to memory of 4088 2740 85 PID 2740 wrote to memory of 4004 2740 86 PID 2740 wrote to memory of 4004 2740 86 PID 2740 wrote to memory of 4004 2740 86 PID 2740 wrote to memory of 2272 2740 87 PID 2740 wrote to memory of 2272 2740 87 PID 2740 wrote to memory of 2272 2740 87 PID 2740 wrote to memory of 2272 2740 87 PID 2972 wrote to memory of 1200 2972 catusvw 89 PID 2972 wrote to memory of 1200 2972 catusvw 89 PID 2972 wrote to memory of 1200 2972 catusvw 89 PID 2972 wrote to memory of 1200 2972 catusvw 89 PID 2972 wrote to memory of 1200 2972 catusvw 89 PID 2972 wrote to memory of 1200 2972 catusvw 89 PID 1456 wrote to memory of 1132 1456 catusvw 91 PID 1456 wrote to memory of 1132 1456 catusvw 91 PID 1456 wrote to memory of 1132 1456 catusvw 91 PID 1456 wrote to memory of 1132 1456 catusvw 91 PID 1456 wrote to memory of 1132 1456 catusvw 91 PID 1456 wrote to memory of 1132 1456 catusvw 91 PID 1144 wrote to memory of 1576 1144 catusvw 93 PID 1144 wrote to memory of 1576 1144 catusvw 93 PID 1144 wrote to memory of 1576 1144 catusvw 93 PID 1144 wrote to memory of 1576 1144 catusvw 93 PID 1144 wrote to memory of 1576 1144 catusvw 93 PID 1144 wrote to memory of 1576 1144 catusvw 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdf56d1d215d546e5add6dd065232224.exe"C:\Users\Admin\AppData\Local\Temp\bdf56d1d215d546e5add6dd065232224.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\bdf56d1d215d546e5add6dd065232224.exe"C:\Users\Admin\AppData\Local\Temp\bdf56d1d215d546e5add6dd065232224.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2840
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2876
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:528
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2116
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1128
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:656
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3844
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4088
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4004
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2272
-
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1200
-
-
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1132
-
-
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\catusvwC:\Users\Admin\AppData\Roaming\catusvw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bdf56d1d215d546e5add6dd065232224
SHA107b2cc6992490266a7cce234e7a4e2efafc72bec
SHA2562bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
SHA5122a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8
-
MD5
bdf56d1d215d546e5add6dd065232224
SHA107b2cc6992490266a7cce234e7a4e2efafc72bec
SHA2562bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
SHA5122a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8
-
MD5
bdf56d1d215d546e5add6dd065232224
SHA107b2cc6992490266a7cce234e7a4e2efafc72bec
SHA2562bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
SHA5122a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8
-
MD5
bdf56d1d215d546e5add6dd065232224
SHA107b2cc6992490266a7cce234e7a4e2efafc72bec
SHA2562bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
SHA5122a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8
-
MD5
bdf56d1d215d546e5add6dd065232224
SHA107b2cc6992490266a7cce234e7a4e2efafc72bec
SHA2562bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
SHA5122a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8
-
MD5
bdf56d1d215d546e5add6dd065232224
SHA107b2cc6992490266a7cce234e7a4e2efafc72bec
SHA2562bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
SHA5122a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8
-
MD5
bdf56d1d215d546e5add6dd065232224
SHA107b2cc6992490266a7cce234e7a4e2efafc72bec
SHA2562bb5cb490caca6d8a0dc1bab96ce898765f1f88948a86cd777508319025e8950
SHA5122a7518c50d5884c8406d58e789457213c5e707279a7b6e2d7a42a9e7c8fbc3ed71ebcf796458efebacaea8d5bb56a3e4bef1c0379fb9a3dd85ea09bd27b95bf8