Analysis
-
max time kernel
159s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 08:55
Static task
static1
Behavioral task
behavioral1
Sample
9080ab9859bb892a940cf84b2e36d7ed.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9080ab9859bb892a940cf84b2e36d7ed.exe
Resource
win10v20210408
General
-
Target
9080ab9859bb892a940cf84b2e36d7ed.exe
-
Size
143KB
-
MD5
9080ab9859bb892a940cf84b2e36d7ed
-
SHA1
873bd3f48cb086ec5c64de1616f9323d23f110d7
-
SHA256
bf520bbd4e544a6129d12c481b7347b6007a10dfdb744d2c79a1a245dc76e3c8
-
SHA512
9a32eeb1f4f9c1ff4ac2a74a8af63cafd3c6a44ea74d682183f840ea6d54c9cb0fc16e6957343b6aa37d901d0507f035af2c8cbb08fef8709b228b2073cb9429
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
rwtdiubrwtdiubpid Process 4072 rwtdiub 2608 rwtdiub -
Deletes itself 1 IoCs
Processes:
pid Process 2536 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9080ab9859bb892a940cf84b2e36d7ed.exerwtdiubdescription pid Process procid_target PID 740 set thread context of 2820 740 9080ab9859bb892a940cf84b2e36d7ed.exe 77 PID 4072 set thread context of 2608 4072 rwtdiub 89 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
rwtdiub9080ab9859bb892a940cf84b2e36d7ed.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rwtdiub Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rwtdiub Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9080ab9859bb892a940cf84b2e36d7ed.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9080ab9859bb892a940cf84b2e36d7ed.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9080ab9859bb892a940cf84b2e36d7ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rwtdiub -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9080ab9859bb892a940cf84b2e36d7ed.exepid Process 2820 9080ab9859bb892a940cf84b2e36d7ed.exe 2820 9080ab9859bb892a940cf84b2e36d7ed.exe 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 2536 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
9080ab9859bb892a940cf84b2e36d7ed.exerwtdiubpid Process 2820 9080ab9859bb892a940cf84b2e36d7ed.exe 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2536 2608 rwtdiub -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 2536 Token: SeCreatePagefilePrivilege 2536 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 2536 -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
9080ab9859bb892a940cf84b2e36d7ed.exerwtdiubdescription pid Process procid_target PID 740 wrote to memory of 2820 740 9080ab9859bb892a940cf84b2e36d7ed.exe 77 PID 740 wrote to memory of 2820 740 9080ab9859bb892a940cf84b2e36d7ed.exe 77 PID 740 wrote to memory of 2820 740 9080ab9859bb892a940cf84b2e36d7ed.exe 77 PID 740 wrote to memory of 2820 740 9080ab9859bb892a940cf84b2e36d7ed.exe 77 PID 740 wrote to memory of 2820 740 9080ab9859bb892a940cf84b2e36d7ed.exe 77 PID 740 wrote to memory of 2820 740 9080ab9859bb892a940cf84b2e36d7ed.exe 77 PID 2536 wrote to memory of 492 2536 79 PID 2536 wrote to memory of 492 2536 79 PID 2536 wrote to memory of 492 2536 79 PID 2536 wrote to memory of 492 2536 79 PID 2536 wrote to memory of 208 2536 80 PID 2536 wrote to memory of 208 2536 80 PID 2536 wrote to memory of 208 2536 80 PID 2536 wrote to memory of 2272 2536 81 PID 2536 wrote to memory of 2272 2536 81 PID 2536 wrote to memory of 2272 2536 81 PID 2536 wrote to memory of 2272 2536 81 PID 2536 wrote to memory of 2256 2536 82 PID 2536 wrote to memory of 2256 2536 82 PID 2536 wrote to memory of 2256 2536 82 PID 2536 wrote to memory of 3536 2536 83 PID 2536 wrote to memory of 3536 2536 83 PID 2536 wrote to memory of 3536 2536 83 PID 2536 wrote to memory of 3536 2536 83 PID 2536 wrote to memory of 3560 2536 84 PID 2536 wrote to memory of 3560 2536 84 PID 2536 wrote to memory of 3560 2536 84 PID 2536 wrote to memory of 3652 2536 85 PID 2536 wrote to memory of 3652 2536 85 PID 2536 wrote to memory of 3652 2536 85 PID 2536 wrote to memory of 3652 2536 85 PID 2536 wrote to memory of 2212 2536 86 PID 2536 wrote to memory of 2212 2536 86 PID 2536 wrote to memory of 2212 2536 86 PID 2536 wrote to memory of 3692 2536 87 PID 2536 wrote to memory of 3692 2536 87 PID 2536 wrote to memory of 3692 2536 87 PID 2536 wrote to memory of 3692 2536 87 PID 4072 wrote to memory of 2608 4072 rwtdiub 89 PID 4072 wrote to memory of 2608 4072 rwtdiub 89 PID 4072 wrote to memory of 2608 4072 rwtdiub 89 PID 4072 wrote to memory of 2608 4072 rwtdiub 89 PID 4072 wrote to memory of 2608 4072 rwtdiub 89 PID 4072 wrote to memory of 2608 4072 rwtdiub 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9080ab9859bb892a940cf84b2e36d7ed.exe"C:\Users\Admin\AppData\Local\Temp\9080ab9859bb892a940cf84b2e36d7ed.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\9080ab9859bb892a940cf84b2e36d7ed.exe"C:\Users\Admin\AppData\Local\Temp\9080ab9859bb892a940cf84b2e36d7ed.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2820
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:492
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:208
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2272
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2256
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3536
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3560
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3652
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2212
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3692
-
C:\Users\Admin\AppData\Roaming\rwtdiubC:\Users\Admin\AppData\Roaming\rwtdiub1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Roaming\rwtdiubC:\Users\Admin\AppData\Roaming\rwtdiub2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9080ab9859bb892a940cf84b2e36d7ed
SHA1873bd3f48cb086ec5c64de1616f9323d23f110d7
SHA256bf520bbd4e544a6129d12c481b7347b6007a10dfdb744d2c79a1a245dc76e3c8
SHA5129a32eeb1f4f9c1ff4ac2a74a8af63cafd3c6a44ea74d682183f840ea6d54c9cb0fc16e6957343b6aa37d901d0507f035af2c8cbb08fef8709b228b2073cb9429
-
MD5
9080ab9859bb892a940cf84b2e36d7ed
SHA1873bd3f48cb086ec5c64de1616f9323d23f110d7
SHA256bf520bbd4e544a6129d12c481b7347b6007a10dfdb744d2c79a1a245dc76e3c8
SHA5129a32eeb1f4f9c1ff4ac2a74a8af63cafd3c6a44ea74d682183f840ea6d54c9cb0fc16e6957343b6aa37d901d0507f035af2c8cbb08fef8709b228b2073cb9429
-
MD5
9080ab9859bb892a940cf84b2e36d7ed
SHA1873bd3f48cb086ec5c64de1616f9323d23f110d7
SHA256bf520bbd4e544a6129d12c481b7347b6007a10dfdb744d2c79a1a245dc76e3c8
SHA5129a32eeb1f4f9c1ff4ac2a74a8af63cafd3c6a44ea74d682183f840ea6d54c9cb0fc16e6957343b6aa37d901d0507f035af2c8cbb08fef8709b228b2073cb9429