Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
27-01-2022 12:00
Static task
static1
Behavioral task
behavioral1
Sample
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe
Resource
win10v2004-en-20220112
General
-
Target
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe
-
Size
191KB
-
MD5
a05b981f73e296c8edf29ea9f68b8355
-
SHA1
f959ea0a5569320682e194bd87ae3fbf0b382647
-
SHA256
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100
-
SHA512
d71c1655c13a4ea043caaa5533fe8b2b25f4146f5c750a801b4b19b3df514fedda7413dd9448be1b09eb6b532384d9439b1bb0628129413706224a051ea34ace
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Sets service image path in registry 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exedescription pid process target process PID 1712 set thread context of 1580 1712 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exepid process 1580 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 1580 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2432 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exepid process 1580 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2432 Token: SeCreatePagefilePrivilege 2432 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exedescription pid process target process PID 1712 wrote to memory of 1580 1712 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe PID 1712 wrote to memory of 1580 1712 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe PID 1712 wrote to memory of 1580 1712 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe PID 1712 wrote to memory of 1580 1712 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe PID 1712 wrote to memory of 1580 1712 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe PID 1712 wrote to memory of 1580 1712 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe 3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe"C:\Users\Admin\AppData\Local\Temp\3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe"C:\Users\Admin\AppData\Local\Temp\3b5add40bb6bb0b4cbc7b8de53c265a7310da094767f7c53fd425f3b22248100.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1580
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 54d9bed1ef861f6c23881ec811e95d93 BGQEXfaXXUSNy+AvXw5Ntg.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:4024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵PID:3724