Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 06:45
Static task
static1
Behavioral task
behavioral1
Sample
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe
Resource
win10-en-20211208
General
-
Target
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe
-
Size
241KB
-
MD5
ca8028962891d802eb9a0800ef4542e1
-
SHA1
2ef8a4bb0c45ae49d4e1718bf3335df79dde4fc1
-
SHA256
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53
-
SHA512
a538acf7e1ecf0588587564cb83e2ada8232f3ec8b038efe2bb9e7f51659dfeb05a448aa7740e60e06341eaafd89c9eda59d1ff736d2f8fb85cd9144ddfc7ad6
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3032 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exedescription pid process target process PID 2512 set thread context of 3156 2512 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exepid process 3156 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 3156 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exepid process 3156 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exedescription pid process target process PID 2512 wrote to memory of 3156 2512 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe PID 2512 wrote to memory of 3156 2512 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe PID 2512 wrote to memory of 3156 2512 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe PID 2512 wrote to memory of 3156 2512 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe PID 2512 wrote to memory of 3156 2512 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe PID 2512 wrote to memory of 3156 2512 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe 209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe"C:\Users\Admin\AppData\Local\Temp\209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe"C:\Users\Admin\AppData\Local\Temp\209e3e1de0c35f0c62e45bd04213597d7da3e28618b53ca7077b13f6731ccb53.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3156
-