Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 08:19
Static task
static1
Behavioral task
behavioral1
Sample
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe
Resource
win10-en-20211208
General
-
Target
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe
-
Size
241KB
-
MD5
63e53cb9c5fce8cb51c409a8d2e7def4
-
SHA1
69aa4c4da55e3d33b60e6198250c47480b9548c9
-
SHA256
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964
-
SHA512
c4d0f1a0d9ac9c7e8e711b6426d706fdd8ea359ac4ac60af99a158ab2a75bfcc2d74e5611766d25a0d083cdba490497b250c6c3c2d0d38811572c0abead8a203
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
gujghtvgujghtvpid process 3468 gujghtv 1952 gujghtv -
Deletes itself 1 IoCs
Processes:
pid process 3036 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exegujghtvdescription pid process target process PID 3800 set thread context of 3192 3800 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe PID 3468 set thread context of 1952 3468 gujghtv gujghtv -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exegujghtvdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gujghtv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gujghtv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gujghtv -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exepid process 3192 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 3192 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3036 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exegujghtvpid process 3192 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 1952 gujghtv -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exegujghtvdescription pid process target process PID 3800 wrote to memory of 3192 3800 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe PID 3800 wrote to memory of 3192 3800 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe PID 3800 wrote to memory of 3192 3800 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe PID 3800 wrote to memory of 3192 3800 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe PID 3800 wrote to memory of 3192 3800 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe PID 3800 wrote to memory of 3192 3800 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe 36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe PID 3468 wrote to memory of 1952 3468 gujghtv gujghtv PID 3468 wrote to memory of 1952 3468 gujghtv gujghtv PID 3468 wrote to memory of 1952 3468 gujghtv gujghtv PID 3468 wrote to memory of 1952 3468 gujghtv gujghtv PID 3468 wrote to memory of 1952 3468 gujghtv gujghtv PID 3468 wrote to memory of 1952 3468 gujghtv gujghtv
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe"C:\Users\Admin\AppData\Local\Temp\36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe"C:\Users\Admin\AppData\Local\Temp\36d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3192
-
-
C:\Users\Admin\AppData\Roaming\gujghtvC:\Users\Admin\AppData\Roaming\gujghtv1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Roaming\gujghtvC:\Users\Admin\AppData\Roaming\gujghtv2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
63e53cb9c5fce8cb51c409a8d2e7def4
SHA169aa4c4da55e3d33b60e6198250c47480b9548c9
SHA25636d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964
SHA512c4d0f1a0d9ac9c7e8e711b6426d706fdd8ea359ac4ac60af99a158ab2a75bfcc2d74e5611766d25a0d083cdba490497b250c6c3c2d0d38811572c0abead8a203
-
MD5
63e53cb9c5fce8cb51c409a8d2e7def4
SHA169aa4c4da55e3d33b60e6198250c47480b9548c9
SHA25636d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964
SHA512c4d0f1a0d9ac9c7e8e711b6426d706fdd8ea359ac4ac60af99a158ab2a75bfcc2d74e5611766d25a0d083cdba490497b250c6c3c2d0d38811572c0abead8a203
-
MD5
63e53cb9c5fce8cb51c409a8d2e7def4
SHA169aa4c4da55e3d33b60e6198250c47480b9548c9
SHA25636d5257db370921850cf447f4cbda680121d96604b12a0958434c31d71fa9964
SHA512c4d0f1a0d9ac9c7e8e711b6426d706fdd8ea359ac4ac60af99a158ab2a75bfcc2d74e5611766d25a0d083cdba490497b250c6c3c2d0d38811572c0abead8a203