Analysis
-
max time kernel
165s -
max time network
165s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-01-2022 17:26
Static task
static1
Behavioral task
behavioral1
Sample
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe
Resource
win10-en-20211208
General
-
Target
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe
-
Size
317KB
-
MD5
f4bee27d69a366085fd0b18f899c5329
-
SHA1
e057d348efe428e71681c60df844286a412637da
-
SHA256
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e
-
SHA512
fdad3423a3cebca862d9d0cc1b302d122133d6a734cae564ddb02ebe911c7aab75e858d8529d5be9f468aa4056d8fadeef3b96ea1a5d48cf04ed6889a6574f88
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
fchsubhfchsubhpid process 1404 fchsubh 1268 fchsubh -
Deletes itself 1 IoCs
Processes:
pid process 3040 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exefchsubhdescription pid process target process PID 2772 set thread context of 1524 2772 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe PID 1404 set thread context of 1268 1404 fchsubh fchsubh -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exefchsubhdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fchsubh Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fchsubh Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fchsubh -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exepid process 1524 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe 1524 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exefchsubhpid process 1524 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe 1268 fchsubh -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exefchsubhdescription pid process target process PID 2772 wrote to memory of 1524 2772 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe PID 2772 wrote to memory of 1524 2772 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe PID 2772 wrote to memory of 1524 2772 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe PID 2772 wrote to memory of 1524 2772 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe PID 2772 wrote to memory of 1524 2772 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe PID 2772 wrote to memory of 1524 2772 f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe PID 1404 wrote to memory of 1268 1404 fchsubh fchsubh PID 1404 wrote to memory of 1268 1404 fchsubh fchsubh PID 1404 wrote to memory of 1268 1404 fchsubh fchsubh PID 1404 wrote to memory of 1268 1404 fchsubh fchsubh PID 1404 wrote to memory of 1268 1404 fchsubh fchsubh PID 1404 wrote to memory of 1268 1404 fchsubh fchsubh
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe"C:\Users\Admin\AppData\Local\Temp\f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe"C:\Users\Admin\AppData\Local\Temp\f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1524
-
C:\Users\Admin\AppData\Roaming\fchsubhC:\Users\Admin\AppData\Roaming\fchsubh1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\fchsubhC:\Users\Admin\AppData\Roaming\fchsubh2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\fchsubhMD5
f4bee27d69a366085fd0b18f899c5329
SHA1e057d348efe428e71681c60df844286a412637da
SHA256f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e
SHA512fdad3423a3cebca862d9d0cc1b302d122133d6a734cae564ddb02ebe911c7aab75e858d8529d5be9f468aa4056d8fadeef3b96ea1a5d48cf04ed6889a6574f88
-
C:\Users\Admin\AppData\Roaming\fchsubhMD5
f4bee27d69a366085fd0b18f899c5329
SHA1e057d348efe428e71681c60df844286a412637da
SHA256f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e
SHA512fdad3423a3cebca862d9d0cc1b302d122133d6a734cae564ddb02ebe911c7aab75e858d8529d5be9f468aa4056d8fadeef3b96ea1a5d48cf04ed6889a6574f88
-
C:\Users\Admin\AppData\Roaming\fchsubhMD5
f4bee27d69a366085fd0b18f899c5329
SHA1e057d348efe428e71681c60df844286a412637da
SHA256f8e28e363d9875bcdfbf169c4c924a69e3cc5c7b0f508106b42082a967ed221e
SHA512fdad3423a3cebca862d9d0cc1b302d122133d6a734cae564ddb02ebe911c7aab75e858d8529d5be9f468aa4056d8fadeef3b96ea1a5d48cf04ed6889a6574f88
-
memory/1268-128-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1404-127-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/1524-120-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1524-121-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2772-118-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/2772-119-0x00000000001D0000-0x00000000001D9000-memory.dmpFilesize
36KB
-
memory/3040-122-0x00000000005C0000-0x00000000005D6000-memory.dmpFilesize
88KB
-
memory/3040-129-0x0000000000720000-0x0000000000736000-memory.dmpFilesize
88KB