Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 11:23
Static task
static1
Behavioral task
behavioral1
Sample
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe
Resource
win10-en-20211208
General
-
Target
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe
-
Size
334KB
-
MD5
8040bd5a14b694d8765bc1b759c27f73
-
SHA1
4fc299fd62806c82cc7350dc086f92a83c4d0e4e
-
SHA256
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c
-
SHA512
ad62742a4380fc19bdd4818451d00bfb66e65fc8eac020d5e5cda995943fc6ac08fb6096e3f8b281e92a7c1ab23e31678748f5235c5ab4979740da35eb0eb251
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 2648 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exedescription pid process target process PID 3436 set thread context of 1364 3436 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exepid process 1364 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 1364 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2648 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exepid process 1364 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exedescription pid process target process PID 3436 wrote to memory of 1364 3436 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe PID 3436 wrote to memory of 1364 3436 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe PID 3436 wrote to memory of 1364 3436 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe PID 3436 wrote to memory of 1364 3436 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe PID 3436 wrote to memory of 1364 3436 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe PID 3436 wrote to memory of 1364 3436 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe 70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe"C:\Users\Admin\AppData\Local\Temp\70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe"C:\Users\Admin\AppData\Local\Temp\70247804d35356f7cefcf01ba780e79fb8d64e293265c0974ece87bfd3fecb9c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1364