Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe
Resource
win10-en-20211208
General
-
Target
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe
-
Size
333KB
-
MD5
96caf95b5f2d96dfa8c8c3f398592963
-
SHA1
29abcb53fb5eff62f6004ed00a9e364b835d3aa4
-
SHA256
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702
-
SHA512
0ac82dfbd2892c532e44792c50d1f12d2ab715506bad267efcd957d58653a0b3c415e235ed1486e0af34bc9a64ba3e2fbc901f9a860a282be8bd8936704c8fec
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exedescription pid process target process PID 4016 set thread context of 2504 4016 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exepid process 2504 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 2504 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3056 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exepid process 2504 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exedescription pid process target process PID 4016 wrote to memory of 2504 4016 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe PID 4016 wrote to memory of 2504 4016 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe PID 4016 wrote to memory of 2504 4016 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe PID 4016 wrote to memory of 2504 4016 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe PID 4016 wrote to memory of 2504 4016 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe PID 4016 wrote to memory of 2504 4016 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe 4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe"C:\Users\Admin\AppData\Local\Temp\4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe"C:\Users\Admin\AppData\Local\Temp\4d3453493792c05db9b9f018e1f404dd5804c6d54928f0312b667272e8feb702.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2504-116-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2504-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3056-119-0x00000000005A0000-0x00000000005B6000-memory.dmpFilesize
88KB
-
memory/4016-117-0x00000000005A0000-0x00000000005A9000-memory.dmpFilesize
36KB