Analysis
-
max time kernel
156s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
25-01-2022 14:55
Static task
static1
Behavioral task
behavioral1
Sample
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe
Resource
win10v2004-en-20220112
General
-
Target
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe
-
Size
317KB
-
MD5
c7a68e97288aa2d7e50b181054985aca
-
SHA1
37448296f49f7401c3ad6e245130264396a92a66
-
SHA256
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91
-
SHA512
2aa1ac3f41a75adcc163050ab737e091ea10d53096d1241047ecc5a54df82208bf5307fc7869890c9721d67ba89b45ec676a791f2655844707ba340a1dc96c18
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
cjstsbwcjstsbwpid process 3984 cjstsbw 3684 cjstsbw -
Sets service image path in registry 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.execjstsbwdescription pid process target process PID 3508 set thread context of 368 3508 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe PID 3984 set thread context of 3684 3984 cjstsbw cjstsbw -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.execjstsbwdescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjstsbw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjstsbw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cjstsbw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exepid process 368 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe 368 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 2452 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2452 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.execjstsbwpid process 368 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe 3684 cjstsbw -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 Token: SeShutdownPrivilege 2452 Token: SeCreatePagefilePrivilege 2452 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.execjstsbwdescription pid process target process PID 3508 wrote to memory of 368 3508 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe PID 3508 wrote to memory of 368 3508 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe PID 3508 wrote to memory of 368 3508 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe PID 3508 wrote to memory of 368 3508 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe PID 3508 wrote to memory of 368 3508 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe PID 3508 wrote to memory of 368 3508 b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe PID 3984 wrote to memory of 3684 3984 cjstsbw cjstsbw PID 3984 wrote to memory of 3684 3984 cjstsbw cjstsbw PID 3984 wrote to memory of 3684 3984 cjstsbw cjstsbw PID 3984 wrote to memory of 3684 3984 cjstsbw cjstsbw PID 3984 wrote to memory of 3684 3984 cjstsbw cjstsbw PID 3984 wrote to memory of 3684 3984 cjstsbw cjstsbw
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe"C:\Users\Admin\AppData\Local\Temp\b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe"C:\Users\Admin\AppData\Local\Temp\b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵PID:976
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe d7bf73a50d857ce5ea82dc70f1153474 7csonUkDqECE4mvr7GdPcg.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:1344
-
C:\Users\Admin\AppData\Roaming\cjstsbwC:\Users\Admin\AppData\Roaming\cjstsbw1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Roaming\cjstsbwC:\Users\Admin\AppData\Roaming\cjstsbw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c7a68e97288aa2d7e50b181054985aca
SHA137448296f49f7401c3ad6e245130264396a92a66
SHA256b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91
SHA5122aa1ac3f41a75adcc163050ab737e091ea10d53096d1241047ecc5a54df82208bf5307fc7869890c9721d67ba89b45ec676a791f2655844707ba340a1dc96c18
-
MD5
c7a68e97288aa2d7e50b181054985aca
SHA137448296f49f7401c3ad6e245130264396a92a66
SHA256b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91
SHA5122aa1ac3f41a75adcc163050ab737e091ea10d53096d1241047ecc5a54df82208bf5307fc7869890c9721d67ba89b45ec676a791f2655844707ba340a1dc96c18
-
MD5
c7a68e97288aa2d7e50b181054985aca
SHA137448296f49f7401c3ad6e245130264396a92a66
SHA256b60ca3e422e351ea4e042c3d8b362098e8384ae25d7527f1e247654464b26e91
SHA5122aa1ac3f41a75adcc163050ab737e091ea10d53096d1241047ecc5a54df82208bf5307fc7869890c9721d67ba89b45ec676a791f2655844707ba340a1dc96c18