Analysis
-
max time kernel
166s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 09:41
Static task
static1
Behavioral task
behavioral1
Sample
2e91c1e098c8f5d4d9709d07885a8369.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2e91c1e098c8f5d4d9709d07885a8369.exe
Resource
win10-en-20211208
General
-
Target
2e91c1e098c8f5d4d9709d07885a8369.exe
-
Size
333KB
-
MD5
2e91c1e098c8f5d4d9709d07885a8369
-
SHA1
be20caa1dc570e071dacb67396c7ddb5eb288a4d
-
SHA256
d2575826949eabb6051a8ad22c804494f0351688b444ae9e0c95905942a3c0e3
-
SHA512
5e24550d5fc80aa0f4188f04823fc08ec68a441beec09f4c194872b5fb6f9e0001a3365504bf6d32705847ad5f6f8f15cda72490742810dcb8c89b53e49c848f
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1876 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2e91c1e098c8f5d4d9709d07885a8369.exedescription pid process target process PID 3724 set thread context of 4204 3724 2e91c1e098c8f5d4d9709d07885a8369.exe 2e91c1e098c8f5d4d9709d07885a8369.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2e91c1e098c8f5d4d9709d07885a8369.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e91c1e098c8f5d4d9709d07885a8369.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e91c1e098c8f5d4d9709d07885a8369.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e91c1e098c8f5d4d9709d07885a8369.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2e91c1e098c8f5d4d9709d07885a8369.exepid process 4204 2e91c1e098c8f5d4d9709d07885a8369.exe 4204 2e91c1e098c8f5d4d9709d07885a8369.exe 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 1876 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1876 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
2e91c1e098c8f5d4d9709d07885a8369.exepid process 4204 2e91c1e098c8f5d4d9709d07885a8369.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2e91c1e098c8f5d4d9709d07885a8369.exedescription pid process target process PID 3724 wrote to memory of 4204 3724 2e91c1e098c8f5d4d9709d07885a8369.exe 2e91c1e098c8f5d4d9709d07885a8369.exe PID 3724 wrote to memory of 4204 3724 2e91c1e098c8f5d4d9709d07885a8369.exe 2e91c1e098c8f5d4d9709d07885a8369.exe PID 3724 wrote to memory of 4204 3724 2e91c1e098c8f5d4d9709d07885a8369.exe 2e91c1e098c8f5d4d9709d07885a8369.exe PID 3724 wrote to memory of 4204 3724 2e91c1e098c8f5d4d9709d07885a8369.exe 2e91c1e098c8f5d4d9709d07885a8369.exe PID 3724 wrote to memory of 4204 3724 2e91c1e098c8f5d4d9709d07885a8369.exe 2e91c1e098c8f5d4d9709d07885a8369.exe PID 3724 wrote to memory of 4204 3724 2e91c1e098c8f5d4d9709d07885a8369.exe 2e91c1e098c8f5d4d9709d07885a8369.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e91c1e098c8f5d4d9709d07885a8369.exe"C:\Users\Admin\AppData\Local\Temp\2e91c1e098c8f5d4d9709d07885a8369.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\2e91c1e098c8f5d4d9709d07885a8369.exe"C:\Users\Admin\AppData\Local\Temp\2e91c1e098c8f5d4d9709d07885a8369.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4204