Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
27-01-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe
Resource
win10v2004-en-20220112
General
-
Target
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe
-
Size
191KB
-
MD5
d5e355b2f8756fb50215046d9cc8865c
-
SHA1
edb5b9c917262e62c46ab47570263a87d0fa3ab8
-
SHA256
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e
-
SHA512
c2a3d7889fdd9becc57a294b6904edbbda8d75ca93bd3265b32a893e14e9097dfa12dbcceecf92fc3c4e26408726b9433da10aad43fec740297c429bbd577e5b
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Sets service image path in registry 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exedescription pid process target process PID 2080 set thread context of 3508 2080 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exepid process 3508 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe 3508 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2384 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exepid process 3508 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exedescription pid process target process PID 2080 wrote to memory of 3508 2080 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe PID 2080 wrote to memory of 3508 2080 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe PID 2080 wrote to memory of 3508 2080 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe PID 2080 wrote to memory of 3508 2080 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe PID 2080 wrote to memory of 3508 2080 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe PID 2080 wrote to memory of 3508 2080 e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe"C:\Users\Admin\AppData\Local\Temp\e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe"C:\Users\Admin\AppData\Local\Temp\e2c230cd0a480df345cf129af0f3fdd985f7a1bbe50bc90b53926e67aebfa15e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe ce757b4e1bb99c312791ec98e6ef6b7b lQrIatP0sESqbu2kA5qkfA.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2080-132-0x0000000002170000-0x0000000002179000-memory.dmpFilesize
36KB
-
memory/2384-134-0x00000000007E0000-0x00000000007F6000-memory.dmpFilesize
88KB
-
memory/3508-131-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3508-133-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB