Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 09:47
Static task
static1
Behavioral task
behavioral1
Sample
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe
Resource
win10-en-20211208
General
-
Target
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe
-
Size
334KB
-
MD5
c7c6a866e1ccdfcd08198a8bcfd1fe55
-
SHA1
79522ad01773083d282ad98ea8d6b80b9f23e750
-
SHA256
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760
-
SHA512
64dfffbaa1e2df625d6eb36a2ba67b4580839b10951dbd16d1ef1ff1ea49221ac92eb97ca8ca64ca8d1d8e6c3bcba856d5aa843936a27de3cca3c7f6cec23492
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3032 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exedescription pid process target process PID 3824 set thread context of 3292 3824 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exepid process 3292 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 3292 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exepid process 3292 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exedescription pid process target process PID 3824 wrote to memory of 3292 3824 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe PID 3824 wrote to memory of 3292 3824 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe PID 3824 wrote to memory of 3292 3824 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe PID 3824 wrote to memory of 3292 3824 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe PID 3824 wrote to memory of 3292 3824 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe PID 3824 wrote to memory of 3292 3824 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe 17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe"C:\Users\Admin\AppData\Local\Temp\17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe"C:\Users\Admin\AppData\Local\Temp\17b6334ecd165f2949bdc62521908785593f4d92634673bfa0d26c0ae1eeb760.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3292