Analysis
-
max time kernel
153s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 07:49
Static task
static1
Behavioral task
behavioral1
Sample
741fd84569147ff263cdef90566b789c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
741fd84569147ff263cdef90566b789c.exe
Resource
win10-en-20211208
General
-
Target
741fd84569147ff263cdef90566b789c.exe
-
Size
333KB
-
MD5
741fd84569147ff263cdef90566b789c
-
SHA1
e4df3ec61a7a7b71414bbaa9de095df83d6b7c65
-
SHA256
5935be98b3f029dc6ece644cd1f6b844124f667d96da6ac9c8a1109ba67fb5fc
-
SHA512
5bc605464707e0bb6276478cbca41a18b015d54f6ec47fca439e2940b7341cb5743df8a372ac6cc9820667a5e9597902df9037a8670d4cd63fa56422f87e3299
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 2968 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exedescription pid process target process PID 1552 set thread context of 2680 1552 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
741fd84569147ff263cdef90566b789c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741fd84569147ff263cdef90566b789c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741fd84569147ff263cdef90566b789c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 741fd84569147ff263cdef90566b789c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exepid process 2680 741fd84569147ff263cdef90566b789c.exe 2680 741fd84569147ff263cdef90566b789c.exe 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 2968 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2968 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exepid process 2680 741fd84569147ff263cdef90566b789c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
741fd84569147ff263cdef90566b789c.exedescription pid process target process PID 1552 wrote to memory of 2680 1552 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 1552 wrote to memory of 2680 1552 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 1552 wrote to memory of 2680 1552 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 1552 wrote to memory of 2680 1552 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 1552 wrote to memory of 2680 1552 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe PID 1552 wrote to memory of 2680 1552 741fd84569147ff263cdef90566b789c.exe 741fd84569147ff263cdef90566b789c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"C:\Users\Admin\AppData\Local\Temp\741fd84569147ff263cdef90566b789c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1552-115-0x0000000000740000-0x0000000000769000-memory.dmpFilesize
164KB
-
memory/1552-116-0x00000000006F0000-0x00000000006F9000-memory.dmpFilesize
36KB
-
memory/2680-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2680-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2968-119-0x0000000001450000-0x0000000001466000-memory.dmpFilesize
88KB