Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09/01/2022, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
939d6de5af9277daa1b551c1977aa12f.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
939d6de5af9277daa1b551c1977aa12f.exe
-
Size
290KB
-
MD5
939d6de5af9277daa1b551c1977aa12f
-
SHA1
de4cf2ca495cccb28cd73de247e683e3d97ae369
-
SHA256
0d018bef7dc5e274d5589cd9af8e49419cbf52bdfb9cd7d19e480c63263f9dd6
-
SHA512
d845cfc3dff8d825cb5387d33a672753d788c41d4234649367b8e64c87fae39d79af260f0dd37337c14407467c56f4389e210bee29e96e3315e41edcc5090c75
Score
10/10
Malware Config
Extracted
Family
smokeloader
Version
2020
C2
http://host-data-coin-11.com/
http://file-coin-host-12.com/
rc4.i32
rc4.i32
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1384 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 939d6de5af9277daa1b551c1977aa12f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 939d6de5af9277daa1b551c1977aa12f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 939d6de5af9277daa1b551c1977aa12f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 939d6de5af9277daa1b551c1977aa12f.exe 1504 939d6de5af9277daa1b551c1977aa12f.exe 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found 1384 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1504 939d6de5af9277daa1b551c1977aa12f.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1384 Process not Found 1384 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1384 Process not Found 1384 Process not Found -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27 PID 1720 wrote to memory of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27 PID 1720 wrote to memory of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27 PID 1720 wrote to memory of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27 PID 1720 wrote to memory of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27 PID 1720 wrote to memory of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27 PID 1720 wrote to memory of 1504 1720 939d6de5af9277daa1b551c1977aa12f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\939d6de5af9277daa1b551c1977aa12f.exe"C:\Users\Admin\AppData\Local\Temp\939d6de5af9277daa1b551c1977aa12f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\939d6de5af9277daa1b551c1977aa12f.exe"C:\Users\Admin\AppData\Local\Temp\939d6de5af9277daa1b551c1977aa12f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1504
-