Analysis
-
max time kernel
153s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 17:27
Static task
static1
Behavioral task
behavioral1
Sample
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe
Resource
win10-en-20211208
General
-
Target
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe
-
Size
333KB
-
MD5
20039ac6d81a0d0a6fc5343db2a7ba10
-
SHA1
166a4fd4c83056a876aa25a6dd9b3cf87f5760a3
-
SHA256
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab
-
SHA512
db8944a58f8630880ff65ce81404048e3bd40331c30a02478608ee9b6b09172824d2944bb69c298b09306fad8736726070732919ed62543212704af47af0fd24
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
fjhvciufjhvciupid process 3644 fjhvciu 1288 fjhvciu -
Deletes itself 1 IoCs
Processes:
pid process 3028 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exefjhvciudescription pid process target process PID 2464 set thread context of 2728 2464 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe PID 3644 set thread context of 1288 3644 fjhvciu fjhvciu -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exefjhvciudescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fjhvciu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fjhvciu Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fjhvciu -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exepid process 2728 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe 2728 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3028 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exefjhvciupid process 2728 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe 1288 fjhvciu -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exefjhvciudescription pid process target process PID 2464 wrote to memory of 2728 2464 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe PID 2464 wrote to memory of 2728 2464 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe PID 2464 wrote to memory of 2728 2464 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe PID 2464 wrote to memory of 2728 2464 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe PID 2464 wrote to memory of 2728 2464 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe PID 2464 wrote to memory of 2728 2464 db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe PID 3644 wrote to memory of 1288 3644 fjhvciu fjhvciu PID 3644 wrote to memory of 1288 3644 fjhvciu fjhvciu PID 3644 wrote to memory of 1288 3644 fjhvciu fjhvciu PID 3644 wrote to memory of 1288 3644 fjhvciu fjhvciu PID 3644 wrote to memory of 1288 3644 fjhvciu fjhvciu PID 3644 wrote to memory of 1288 3644 fjhvciu fjhvciu
Processes
-
C:\Users\Admin\AppData\Local\Temp\db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe"C:\Users\Admin\AppData\Local\Temp\db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe"C:\Users\Admin\AppData\Local\Temp\db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2728
-
C:\Users\Admin\AppData\Roaming\fjhvciuC:\Users\Admin\AppData\Roaming\fjhvciu1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Roaming\fjhvciuC:\Users\Admin\AppData\Roaming\fjhvciu2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
20039ac6d81a0d0a6fc5343db2a7ba10
SHA1166a4fd4c83056a876aa25a6dd9b3cf87f5760a3
SHA256db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab
SHA512db8944a58f8630880ff65ce81404048e3bd40331c30a02478608ee9b6b09172824d2944bb69c298b09306fad8736726070732919ed62543212704af47af0fd24
-
MD5
20039ac6d81a0d0a6fc5343db2a7ba10
SHA1166a4fd4c83056a876aa25a6dd9b3cf87f5760a3
SHA256db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab
SHA512db8944a58f8630880ff65ce81404048e3bd40331c30a02478608ee9b6b09172824d2944bb69c298b09306fad8736726070732919ed62543212704af47af0fd24
-
MD5
20039ac6d81a0d0a6fc5343db2a7ba10
SHA1166a4fd4c83056a876aa25a6dd9b3cf87f5760a3
SHA256db12df1b8da6d3a11637bfdd99568a8cc16a099ab03f0c154709186fcb55ccab
SHA512db8944a58f8630880ff65ce81404048e3bd40331c30a02478608ee9b6b09172824d2944bb69c298b09306fad8736726070732919ed62543212704af47af0fd24