Analysis
-
max time kernel
151s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
e316fc6eceb6ff152c049e7128e55314.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e316fc6eceb6ff152c049e7128e55314.exe
Resource
win10-en-20211208
General
-
Target
e316fc6eceb6ff152c049e7128e55314.exe
-
Size
333KB
-
MD5
e316fc6eceb6ff152c049e7128e55314
-
SHA1
c1752ee2d55cdb6753f306f3655a2558950f16c5
-
SHA256
24ad280cb556a710380a0c91468614d0c09824feace617825461330e96267aaa
-
SHA512
a44f4c70c9d649cacd8cb8838e8859e4d65f465be9fa64ea879c0f2b50e23a87fd7e8c906a7a69eeaaa6caf707885bac24334e8182ec07e84484f7b2d40baa0c
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3036 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e316fc6eceb6ff152c049e7128e55314.exedescription pid process target process PID 2744 set thread context of 3488 2744 e316fc6eceb6ff152c049e7128e55314.exe e316fc6eceb6ff152c049e7128e55314.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e316fc6eceb6ff152c049e7128e55314.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e316fc6eceb6ff152c049e7128e55314.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e316fc6eceb6ff152c049e7128e55314.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e316fc6eceb6ff152c049e7128e55314.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e316fc6eceb6ff152c049e7128e55314.exepid process 3488 e316fc6eceb6ff152c049e7128e55314.exe 3488 e316fc6eceb6ff152c049e7128e55314.exe 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3036 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
e316fc6eceb6ff152c049e7128e55314.exepid process 3488 e316fc6eceb6ff152c049e7128e55314.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e316fc6eceb6ff152c049e7128e55314.exedescription pid process target process PID 2744 wrote to memory of 3488 2744 e316fc6eceb6ff152c049e7128e55314.exe e316fc6eceb6ff152c049e7128e55314.exe PID 2744 wrote to memory of 3488 2744 e316fc6eceb6ff152c049e7128e55314.exe e316fc6eceb6ff152c049e7128e55314.exe PID 2744 wrote to memory of 3488 2744 e316fc6eceb6ff152c049e7128e55314.exe e316fc6eceb6ff152c049e7128e55314.exe PID 2744 wrote to memory of 3488 2744 e316fc6eceb6ff152c049e7128e55314.exe e316fc6eceb6ff152c049e7128e55314.exe PID 2744 wrote to memory of 3488 2744 e316fc6eceb6ff152c049e7128e55314.exe e316fc6eceb6ff152c049e7128e55314.exe PID 2744 wrote to memory of 3488 2744 e316fc6eceb6ff152c049e7128e55314.exe e316fc6eceb6ff152c049e7128e55314.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e316fc6eceb6ff152c049e7128e55314.exe"C:\Users\Admin\AppData\Local\Temp\e316fc6eceb6ff152c049e7128e55314.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e316fc6eceb6ff152c049e7128e55314.exe"C:\Users\Admin\AppData\Local\Temp\e316fc6eceb6ff152c049e7128e55314.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2744-115-0x00000000007C0000-0x00000000007E9000-memory.dmpFilesize
164KB
-
memory/2744-117-0x00000000005E0000-0x00000000005E9000-memory.dmpFilesize
36KB
-
memory/3036-119-0x0000000000680000-0x0000000000696000-memory.dmpFilesize
88KB
-
memory/3488-116-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3488-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB