Analysis
-
max time kernel
154s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe
Resource
win10-en-20211208
General
-
Target
5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe
-
Size
241KB
-
MD5
95fd5db1e1529ff4369fe2619d99832f
-
SHA1
82caa7406ac895b7da1c9d2461df77506e42cb47
-
SHA256
5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840
-
SHA512
29fed18b500f7c9d3b1fdb372d8d523f8a6f4e3527f4e021ab44319d9b523720206d8c148590378fe955488c3e8cb14c5e73c07aabca9e5415295a36f655a172
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
cfsgdsicfsgdsipid process 584 cfsgdsi 1516 cfsgdsi -
Deletes itself 1 IoCs
Processes:
pid process 1880 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.execfsgdsidescription pid process target process PID 2224 set thread context of 2736 2224 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe PID 584 set thread context of 1516 584 cfsgdsi cfsgdsi -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
cfsgdsi5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cfsgdsi Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cfsgdsi Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cfsgdsi -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exepid process 2736 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 2736 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 1880 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1880 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.execfsgdsipid process 2736 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 1516 cfsgdsi -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1880 Token: SeCreatePagefilePrivilege 1880 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.execfsgdsidescription pid process target process PID 2224 wrote to memory of 2736 2224 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe PID 2224 wrote to memory of 2736 2224 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe PID 2224 wrote to memory of 2736 2224 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe PID 2224 wrote to memory of 2736 2224 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe PID 2224 wrote to memory of 2736 2224 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe PID 2224 wrote to memory of 2736 2224 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe 5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe PID 584 wrote to memory of 1516 584 cfsgdsi cfsgdsi PID 584 wrote to memory of 1516 584 cfsgdsi cfsgdsi PID 584 wrote to memory of 1516 584 cfsgdsi cfsgdsi PID 584 wrote to memory of 1516 584 cfsgdsi cfsgdsi PID 584 wrote to memory of 1516 584 cfsgdsi cfsgdsi PID 584 wrote to memory of 1516 584 cfsgdsi cfsgdsi
Processes
-
C:\Users\Admin\AppData\Local\Temp\5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe"C:\Users\Admin\AppData\Local\Temp\5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe"C:\Users\Admin\AppData\Local\Temp\5753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\cfsgdsiC:\Users\Admin\AppData\Roaming\cfsgdsi1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\cfsgdsiC:\Users\Admin\AppData\Roaming\cfsgdsi2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\cfsgdsiMD5
95fd5db1e1529ff4369fe2619d99832f
SHA182caa7406ac895b7da1c9d2461df77506e42cb47
SHA2565753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840
SHA51229fed18b500f7c9d3b1fdb372d8d523f8a6f4e3527f4e021ab44319d9b523720206d8c148590378fe955488c3e8cb14c5e73c07aabca9e5415295a36f655a172
-
C:\Users\Admin\AppData\Roaming\cfsgdsiMD5
95fd5db1e1529ff4369fe2619d99832f
SHA182caa7406ac895b7da1c9d2461df77506e42cb47
SHA2565753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840
SHA51229fed18b500f7c9d3b1fdb372d8d523f8a6f4e3527f4e021ab44319d9b523720206d8c148590378fe955488c3e8cb14c5e73c07aabca9e5415295a36f655a172
-
C:\Users\Admin\AppData\Roaming\cfsgdsiMD5
95fd5db1e1529ff4369fe2619d99832f
SHA182caa7406ac895b7da1c9d2461df77506e42cb47
SHA2565753b2cfe4fc0704fced8154c3d7e566c6e0f58c2d1e55fcf6364421a5ee6840
SHA51229fed18b500f7c9d3b1fdb372d8d523f8a6f4e3527f4e021ab44319d9b523720206d8c148590378fe955488c3e8cb14c5e73c07aabca9e5415295a36f655a172
-
memory/584-125-0x00000000004A0000-0x00000000004A9000-memory.dmpFilesize
36KB
-
memory/1516-126-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1880-119-0x0000000000660000-0x0000000000676000-memory.dmpFilesize
88KB
-
memory/1880-127-0x00000000006B0000-0x00000000006C6000-memory.dmpFilesize
88KB
-
memory/2224-116-0x0000000000450000-0x00000000004FE000-memory.dmpFilesize
696KB
-
memory/2736-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2736-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB