Analysis
-
max time kernel
4265101s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
16-01-2022 17:36
Static task
static1
Behavioral task
behavioral1
Sample
f2a217f6b08b045ca263f1970f06d0b3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f2a217f6b08b045ca263f1970f06d0b3.exe
Resource
win10v2004-en-20220112
General
-
Target
f2a217f6b08b045ca263f1970f06d0b3.exe
-
Size
306KB
-
MD5
f2a217f6b08b045ca263f1970f06d0b3
-
SHA1
3138ce15450f80288f7441124b4f149a1d2b9d15
-
SHA256
7ae73e912165d0689d85ebe5db26d44f2e4301bd89d3ae60f5dacb0f38bd2be8
-
SHA512
8e3d8bbb6c701e082426377ee713825d1e77a8f579a049e91e10e0dc80de41ff9f5dfc71442cc33417fb91dfcdd198b1aff8e0051a794b07b68fd659094a8ed4
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f2a217f6b08b045ca263f1970f06d0b3.exedescription pid process target process PID 3896 set thread context of 4068 3896 f2a217f6b08b045ca263f1970f06d0b3.exe f2a217f6b08b045ca263f1970f06d0b3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f2a217f6b08b045ca263f1970f06d0b3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2a217f6b08b045ca263f1970f06d0b3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2a217f6b08b045ca263f1970f06d0b3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2a217f6b08b045ca263f1970f06d0b3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotification.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f2a217f6b08b045ca263f1970f06d0b3.exepid process 4068 f2a217f6b08b045ca263f1970f06d0b3.exe 4068 f2a217f6b08b045ca263f1970f06d0b3.exe 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 2412 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2412 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f2a217f6b08b045ca263f1970f06d0b3.exepid process 4068 f2a217f6b08b045ca263f1970f06d0b3.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
MusNotification.exedescription pid process Token: SeShutdownPrivilege 452 MusNotification.exe Token: SeCreatePagefilePrivilege 452 MusNotification.exe Token: SeShutdownPrivilege 2412 Token: SeCreatePagefilePrivilege 2412 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f2a217f6b08b045ca263f1970f06d0b3.exedescription pid process target process PID 3896 wrote to memory of 4068 3896 f2a217f6b08b045ca263f1970f06d0b3.exe f2a217f6b08b045ca263f1970f06d0b3.exe PID 3896 wrote to memory of 4068 3896 f2a217f6b08b045ca263f1970f06d0b3.exe f2a217f6b08b045ca263f1970f06d0b3.exe PID 3896 wrote to memory of 4068 3896 f2a217f6b08b045ca263f1970f06d0b3.exe f2a217f6b08b045ca263f1970f06d0b3.exe PID 3896 wrote to memory of 4068 3896 f2a217f6b08b045ca263f1970f06d0b3.exe f2a217f6b08b045ca263f1970f06d0b3.exe PID 3896 wrote to memory of 4068 3896 f2a217f6b08b045ca263f1970f06d0b3.exe f2a217f6b08b045ca263f1970f06d0b3.exe PID 3896 wrote to memory of 4068 3896 f2a217f6b08b045ca263f1970f06d0b3.exe f2a217f6b08b045ca263f1970f06d0b3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2a217f6b08b045ca263f1970f06d0b3.exe"C:\Users\Admin\AppData\Local\Temp\f2a217f6b08b045ca263f1970f06d0b3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\f2a217f6b08b045ca263f1970f06d0b3.exe"C:\Users\Admin\AppData\Local\Temp\f2a217f6b08b045ca263f1970f06d0b3.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4068
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:452