Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 23:33
Static task
static1
Behavioral task
behavioral1
Sample
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe
Resource
win10-en-20211208
General
-
Target
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe
-
Size
357KB
-
MD5
dd7f02d46d26f8bece55a29fd7dcb904
-
SHA1
23939e56d13583235dcf9fbc079bbebd9ecaab41
-
SHA256
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90
-
SHA512
7ecbb86f41fbdf91e50f30a9d0bce50b229f093949d920835df6d9e8b0ac449de2390b7802800e71da3b7525fa1154fadc746ed8ebb5f96d90423379af72f48d
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3032 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exedescription pid process target process PID 2728 set thread context of 3752 2728 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exepid process 3752 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe 3752 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exepid process 3752 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exedescription pid process target process PID 2728 wrote to memory of 3752 2728 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe PID 2728 wrote to memory of 3752 2728 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe PID 2728 wrote to memory of 3752 2728 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe PID 2728 wrote to memory of 3752 2728 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe PID 2728 wrote to memory of 3752 2728 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe PID 2728 wrote to memory of 3752 2728 d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe"C:\Users\Admin\AppData\Local\Temp\d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe"C:\Users\Admin\AppData\Local\Temp\d75677ca0c61ea5889b1d06d63c7622b2fc3393d51f78f0dfb9e41b7a470cd90.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2728-116-0x0000000000520000-0x0000000000529000-memory.dmpFilesize
36KB
-
memory/3032-119-0x0000000001050000-0x0000000001066000-memory.dmpFilesize
88KB
-
memory/3752-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3752-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB