Analysis
-
max time kernel
151s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 07:49
Static task
static1
Behavioral task
behavioral1
Sample
741fd84569147ff263cdef90566b789c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
741fd84569147ff263cdef90566b789c.exe
Resource
win10-en-20211208
General
-
Target
741fd84569147ff263cdef90566b789c.exe
-
Size
333KB
-
MD5
741fd84569147ff263cdef90566b789c
-
SHA1
e4df3ec61a7a7b71414bbaa9de095df83d6b7c65
-
SHA256
5935be98b3f029dc6ece644cd1f6b844124f667d96da6ac9c8a1109ba67fb5fc
-
SHA512
5bc605464707e0bb6276478cbca41a18b015d54f6ec47fca439e2940b7341cb5743df8a372ac6cc9820667a5e9597902df9037a8670d4cd63fa56422f87e3299
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
iebhhuciebhhucpid process 1096 iebhhuc 688 iebhhuc -
Deletes itself 1 IoCs
Processes:
pid process 1216 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exeiebhhucdescription pid process target process PID 756 set thread context of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 1096 set thread context of 688 1096 iebhhuc iebhhuc -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
iebhhuc741fd84569147ff263cdef90566b789c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iebhhuc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iebhhuc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iebhhuc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741fd84569147ff263cdef90566b789c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741fd84569147ff263cdef90566b789c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741fd84569147ff263cdef90566b789c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exepid process 752 741fd84569147ff263cdef90566b789c.exe 752 741fd84569147ff263cdef90566b789c.exe 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1216 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exeiebhhucpid process 752 741fd84569147ff263cdef90566b789c.exe 688 iebhhuc -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1216 1216 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1216 1216 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exetaskeng.exeiebhhucdescription pid process target process PID 756 wrote to memory of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 756 wrote to memory of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 756 wrote to memory of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 756 wrote to memory of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 756 wrote to memory of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 756 wrote to memory of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 756 wrote to memory of 752 756 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 1624 wrote to memory of 1096 1624 taskeng.exe iebhhuc PID 1624 wrote to memory of 1096 1624 taskeng.exe iebhhuc PID 1624 wrote to memory of 1096 1624 taskeng.exe iebhhuc PID 1624 wrote to memory of 1096 1624 taskeng.exe iebhhuc PID 1096 wrote to memory of 688 1096 iebhhuc iebhhuc PID 1096 wrote to memory of 688 1096 iebhhuc iebhhuc PID 1096 wrote to memory of 688 1096 iebhhuc iebhhuc PID 1096 wrote to memory of 688 1096 iebhhuc iebhhuc PID 1096 wrote to memory of 688 1096 iebhhuc iebhhuc PID 1096 wrote to memory of 688 1096 iebhhuc iebhhuc PID 1096 wrote to memory of 688 1096 iebhhuc iebhhuc
Processes
-
C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\taskeng.exetaskeng.exe {100B09A8-2C70-4376-B2F6-96FC9BD9BAF4} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\iebhhucC:\Users\Admin\AppData\Roaming\iebhhuc2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\iebhhucC:\Users\Admin\AppData\Roaming\iebhhuc3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\iebhhucMD5
741fd84569147ff263cdef90566b789c
SHA1e4df3ec61a7a7b71414bbaa9de095df83d6b7c65
SHA2565935be98b3f029dc6ece644cd1f6b844124f667d96da6ac9c8a1109ba67fb5fc
SHA5125bc605464707e0bb6276478cbca41a18b015d54f6ec47fca439e2940b7341cb5743df8a372ac6cc9820667a5e9597902df9037a8670d4cd63fa56422f87e3299
-
C:\Users\Admin\AppData\Roaming\iebhhucMD5
741fd84569147ff263cdef90566b789c
SHA1e4df3ec61a7a7b71414bbaa9de095df83d6b7c65
SHA2565935be98b3f029dc6ece644cd1f6b844124f667d96da6ac9c8a1109ba67fb5fc
SHA5125bc605464707e0bb6276478cbca41a18b015d54f6ec47fca439e2940b7341cb5743df8a372ac6cc9820667a5e9597902df9037a8670d4cd63fa56422f87e3299
-
C:\Users\Admin\AppData\Roaming\iebhhucMD5
741fd84569147ff263cdef90566b789c
SHA1e4df3ec61a7a7b71414bbaa9de095df83d6b7c65
SHA2565935be98b3f029dc6ece644cd1f6b844124f667d96da6ac9c8a1109ba67fb5fc
SHA5125bc605464707e0bb6276478cbca41a18b015d54f6ec47fca439e2940b7341cb5743df8a372ac6cc9820667a5e9597902df9037a8670d4cd63fa56422f87e3299
-
memory/688-66-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/752-55-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/752-57-0x0000000075531000-0x0000000075533000-memory.dmpFilesize
8KB
-
memory/752-58-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/756-54-0x0000000000590000-0x00000000005BD000-memory.dmpFilesize
180KB
-
memory/756-56-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1096-62-0x00000000005A0000-0x00000000005CD000-memory.dmpFilesize
180KB
-
memory/1216-59-0x00000000029E0000-0x00000000029F6000-memory.dmpFilesize
88KB
-
memory/1216-67-0x0000000002A10000-0x0000000002A26000-memory.dmpFilesize
88KB