Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
25-10-2021 06:21
Static task
static1
Behavioral task
behavioral1
Sample
87ce91791c80059342b755c53c2e09d3.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
87ce91791c80059342b755c53c2e09d3.exe
Resource
win10-en-20211014
General
-
Target
87ce91791c80059342b755c53c2e09d3.exe
-
Size
337KB
-
MD5
87ce91791c80059342b755c53c2e09d3
-
SHA1
6600ddbe3cc7b25cc3aae7e48c12e20061bbcc23
-
SHA256
7f7b289e8bfd8e547f28478238c98b7ad31c7601e6033b5c1c79afc924b40a6c
-
SHA512
598978692165a6539082ae93cc6a9aabcabb982ffdcc8702cd8934afdbe43ba3091be056184420b70ede158176bd2c82c0f75b11596efe771a51629edf4b5dba
Malware Config
Extracted
smokeloader
2020
http://xacokuo8.top/
http://hajezey1.top/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
jjbjstjjjbjstjpid process 1260 jjbjstj 1472 jjbjstj -
Deletes itself 1 IoCs
Processes:
pid process 1356 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
87ce91791c80059342b755c53c2e09d3.exejjbjstjdescription pid process target process PID 1876 set thread context of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1260 set thread context of 1472 1260 jjbjstj jjbjstj -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
87ce91791c80059342b755c53c2e09d3.exejjbjstjdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 87ce91791c80059342b755c53c2e09d3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 87ce91791c80059342b755c53c2e09d3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 87ce91791c80059342b755c53c2e09d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jjbjstj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jjbjstj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jjbjstj -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
87ce91791c80059342b755c53c2e09d3.exepid process 304 87ce91791c80059342b755c53c2e09d3.exe 304 87ce91791c80059342b755c53c2e09d3.exe 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 1356 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1356 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
87ce91791c80059342b755c53c2e09d3.exejjbjstjpid process 304 87ce91791c80059342b755c53c2e09d3.exe 1472 jjbjstj -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1356 1356 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1356 1356 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
87ce91791c80059342b755c53c2e09d3.exetaskeng.exejjbjstjdescription pid process target process PID 1876 wrote to memory of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1876 wrote to memory of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1876 wrote to memory of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1876 wrote to memory of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1876 wrote to memory of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1876 wrote to memory of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1876 wrote to memory of 304 1876 87ce91791c80059342b755c53c2e09d3.exe 87ce91791c80059342b755c53c2e09d3.exe PID 1104 wrote to memory of 1260 1104 taskeng.exe jjbjstj PID 1104 wrote to memory of 1260 1104 taskeng.exe jjbjstj PID 1104 wrote to memory of 1260 1104 taskeng.exe jjbjstj PID 1104 wrote to memory of 1260 1104 taskeng.exe jjbjstj PID 1260 wrote to memory of 1472 1260 jjbjstj jjbjstj PID 1260 wrote to memory of 1472 1260 jjbjstj jjbjstj PID 1260 wrote to memory of 1472 1260 jjbjstj jjbjstj PID 1260 wrote to memory of 1472 1260 jjbjstj jjbjstj PID 1260 wrote to memory of 1472 1260 jjbjstj jjbjstj PID 1260 wrote to memory of 1472 1260 jjbjstj jjbjstj PID 1260 wrote to memory of 1472 1260 jjbjstj jjbjstj
Processes
-
C:\Users\Admin\AppData\Local\Temp\87ce91791c80059342b755c53c2e09d3.exe"C:\Users\Admin\AppData\Local\Temp\87ce91791c80059342b755c53c2e09d3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\87ce91791c80059342b755c53c2e09d3.exe"C:\Users\Admin\AppData\Local\Temp\87ce91791c80059342b755c53c2e09d3.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:304
-
C:\Windows\system32\taskeng.exetaskeng.exe {05CDD77B-CE7A-4ED6-8A3B-BAB136FBDF50} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Roaming\jjbjstjC:\Users\Admin\AppData\Roaming\jjbjstj2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Roaming\jjbjstjC:\Users\Admin\AppData\Roaming\jjbjstj3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
87ce91791c80059342b755c53c2e09d3
SHA16600ddbe3cc7b25cc3aae7e48c12e20061bbcc23
SHA2567f7b289e8bfd8e547f28478238c98b7ad31c7601e6033b5c1c79afc924b40a6c
SHA512598978692165a6539082ae93cc6a9aabcabb982ffdcc8702cd8934afdbe43ba3091be056184420b70ede158176bd2c82c0f75b11596efe771a51629edf4b5dba
-
MD5
87ce91791c80059342b755c53c2e09d3
SHA16600ddbe3cc7b25cc3aae7e48c12e20061bbcc23
SHA2567f7b289e8bfd8e547f28478238c98b7ad31c7601e6033b5c1c79afc924b40a6c
SHA512598978692165a6539082ae93cc6a9aabcabb982ffdcc8702cd8934afdbe43ba3091be056184420b70ede158176bd2c82c0f75b11596efe771a51629edf4b5dba
-
MD5
87ce91791c80059342b755c53c2e09d3
SHA16600ddbe3cc7b25cc3aae7e48c12e20061bbcc23
SHA2567f7b289e8bfd8e547f28478238c98b7ad31c7601e6033b5c1c79afc924b40a6c
SHA512598978692165a6539082ae93cc6a9aabcabb982ffdcc8702cd8934afdbe43ba3091be056184420b70ede158176bd2c82c0f75b11596efe771a51629edf4b5dba