Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
26-01-2022 07:06
Static task
static1
Behavioral task
behavioral1
Sample
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe
Resource
win10v2004-en-20220112
General
-
Target
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe
-
Size
334KB
-
MD5
cb87fd15d0d0b46696341d974ebe62d6
-
SHA1
d68fa4f43246c137b565366f6e8b7f08e768f06f
-
SHA256
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54
-
SHA512
852d1174ea56c65be54ff938c867cc2f37977f59a85b2bc6e00096e0e8043b9f32f64245c847a297da78529625f2b5d6d0857f857e6a3ca57605a3c98a7a7af4
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Sets service image path in registry 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exedescription pid process target process PID 3836 set thread context of 3420 3836 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exepid process 3420 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 3420 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2384 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exepid process 3420 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exedescription pid process target process PID 3836 wrote to memory of 3420 3836 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe PID 3836 wrote to memory of 3420 3836 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe PID 3836 wrote to memory of 3420 3836 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe PID 3836 wrote to memory of 3420 3836 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe PID 3836 wrote to memory of 3420 3836 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe PID 3836 wrote to memory of 3420 3836 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe 40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe"C:\Users\Admin\AppData\Local\Temp\40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe"C:\Users\Admin\AppData\Local\Temp\40bd2aafaaf6619b5711338e6c88fe161ca690a0bc6421c48ec38f6ed11aef54.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3420
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 86e4f5a7b16a3a7cef68484c71fbc806 pENXZnoQfkS8lHBIlpwrEQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:3096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵PID:1836