Analysis
-
max time kernel
150s -
max time network
118s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
36f662b3c9a54c0c2427602f1463eb69.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
36f662b3c9a54c0c2427602f1463eb69.exe
Resource
win10-en-20210920
General
-
Target
36f662b3c9a54c0c2427602f1463eb69.exe
-
Size
185KB
-
MD5
36f662b3c9a54c0c2427602f1463eb69
-
SHA1
7e46615097282ac51ef08d3e4ac7d65ce6684a07
-
SHA256
d836a03e0b7eeabbc971de7d3e6fcc11bf06e13e633d11118c7429b3abb3c4ed
-
SHA512
35b60c6da50b94484a77f40c3446beb1d5562128f5585731a09328140c68c7b57f1727cc0783b439dafb5660c93ca1bd4e1c3f443261545aaa9b22c0de9a1599
Malware Config
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1216 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
36f662b3c9a54c0c2427602f1463eb69.exedescription pid process target process PID 820 set thread context of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
36f662b3c9a54c0c2427602f1463eb69.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36f662b3c9a54c0c2427602f1463eb69.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36f662b3c9a54c0c2427602f1463eb69.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36f662b3c9a54c0c2427602f1463eb69.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
36f662b3c9a54c0c2427602f1463eb69.exepid process 1176 36f662b3c9a54c0c2427602f1463eb69.exe 1176 36f662b3c9a54c0c2427602f1463eb69.exe 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1216 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
36f662b3c9a54c0c2427602f1463eb69.exepid process 1176 36f662b3c9a54c0c2427602f1463eb69.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1216 1216 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1216 1216 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
36f662b3c9a54c0c2427602f1463eb69.exedescription pid process target process PID 820 wrote to memory of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe PID 820 wrote to memory of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe PID 820 wrote to memory of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe PID 820 wrote to memory of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe PID 820 wrote to memory of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe PID 820 wrote to memory of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe PID 820 wrote to memory of 1176 820 36f662b3c9a54c0c2427602f1463eb69.exe 36f662b3c9a54c0c2427602f1463eb69.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f662b3c9a54c0c2427602f1463eb69.exe"C:\Users\Admin\AppData\Local\Temp\36f662b3c9a54c0c2427602f1463eb69.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\36f662b3c9a54c0c2427602f1463eb69.exe"C:\Users\Admin\AppData\Local\Temp\36f662b3c9a54c0c2427602f1463eb69.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/820-59-0x0000000000230000-0x0000000000239000-memory.dmpFilesize
36KB
-
memory/820-58-0x0000000000220000-0x0000000000228000-memory.dmpFilesize
32KB
-
memory/1176-56-0x0000000000402EE8-mapping.dmp
-
memory/1176-55-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1176-57-0x0000000075821000-0x0000000075823000-memory.dmpFilesize
8KB
-
memory/1216-60-0x0000000002B00000-0x0000000002B16000-memory.dmpFilesize
88KB