Analysis
-
max time kernel
4265102s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
16-01-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
75bdebf790bb5fbc5834fdfe7ab9f576.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
75bdebf790bb5fbc5834fdfe7ab9f576.exe
Resource
win10v2004-en-20220112
General
-
Target
75bdebf790bb5fbc5834fdfe7ab9f576.exe
-
Size
313KB
-
MD5
75bdebf790bb5fbc5834fdfe7ab9f576
-
SHA1
309e31bf7c842d0988234e4d3117ab0502851b20
-
SHA256
ad221a0e4b9b7a0a2da6f3c3fb059deda23076d897d7783835d9c39a354a2232
-
SHA512
53335d72bb6446f82fec6a6bf6adb1afc2908e591d4fed0695541a231b3111d2523bff60afc6de1900c7aa6d1f27bf2c07b0f9058d572023a54c942b306dd7ec
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
75bdebf790bb5fbc5834fdfe7ab9f576.exedescription pid process target process PID 2532 set thread context of 732 2532 75bdebf790bb5fbc5834fdfe7ab9f576.exe 75bdebf790bb5fbc5834fdfe7ab9f576.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
75bdebf790bb5fbc5834fdfe7ab9f576.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75bdebf790bb5fbc5834fdfe7ab9f576.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75bdebf790bb5fbc5834fdfe7ab9f576.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75bdebf790bb5fbc5834fdfe7ab9f576.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotification.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
75bdebf790bb5fbc5834fdfe7ab9f576.exepid process 732 75bdebf790bb5fbc5834fdfe7ab9f576.exe 732 75bdebf790bb5fbc5834fdfe7ab9f576.exe 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2520 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
75bdebf790bb5fbc5834fdfe7ab9f576.exepid process 732 75bdebf790bb5fbc5834fdfe7ab9f576.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
MusNotification.exedescription pid process Token: SeShutdownPrivilege 1812 MusNotification.exe Token: SeCreatePagefilePrivilege 1812 MusNotification.exe Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
75bdebf790bb5fbc5834fdfe7ab9f576.exedescription pid process target process PID 2532 wrote to memory of 732 2532 75bdebf790bb5fbc5834fdfe7ab9f576.exe 75bdebf790bb5fbc5834fdfe7ab9f576.exe PID 2532 wrote to memory of 732 2532 75bdebf790bb5fbc5834fdfe7ab9f576.exe 75bdebf790bb5fbc5834fdfe7ab9f576.exe PID 2532 wrote to memory of 732 2532 75bdebf790bb5fbc5834fdfe7ab9f576.exe 75bdebf790bb5fbc5834fdfe7ab9f576.exe PID 2532 wrote to memory of 732 2532 75bdebf790bb5fbc5834fdfe7ab9f576.exe 75bdebf790bb5fbc5834fdfe7ab9f576.exe PID 2532 wrote to memory of 732 2532 75bdebf790bb5fbc5834fdfe7ab9f576.exe 75bdebf790bb5fbc5834fdfe7ab9f576.exe PID 2532 wrote to memory of 732 2532 75bdebf790bb5fbc5834fdfe7ab9f576.exe 75bdebf790bb5fbc5834fdfe7ab9f576.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75bdebf790bb5fbc5834fdfe7ab9f576.exe"C:\Users\Admin\AppData\Local\Temp\75bdebf790bb5fbc5834fdfe7ab9f576.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\75bdebf790bb5fbc5834fdfe7ab9f576.exe"C:\Users\Admin\AppData\Local\Temp\75bdebf790bb5fbc5834fdfe7ab9f576.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:732
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1812