Analysis
-
max time kernel
153s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe
Resource
win10-en-20211208
General
-
Target
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe
-
Size
312KB
-
MD5
6ae0d6efc218e9c89545872d79264bad
-
SHA1
26cc0c343d8f46bb4f526952cfd954d89fc41021
-
SHA256
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09
-
SHA512
e6a9b8bafa000ef3b8f58b6684a4381de03f066206835bee0857c575800d39794e6af0b77c945eba17d1c3096c05f836d69f6357bd8664728408f21f6af125da
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
gagbjshgagbjshpid process 824 gagbjsh 1076 gagbjsh -
Deletes itself 1 IoCs
Processes:
pid process 1404 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exegagbjshdescription pid process target process PID 1260 set thread context of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 824 set thread context of 1076 824 gagbjsh gagbjsh -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exegagbjshdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gagbjsh Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gagbjsh Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gagbjsh -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exepid process 964 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 964 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1404 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exegagbjshpid process 964 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 1076 gagbjsh -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1404 1404 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1404 1404 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exetaskeng.exegagbjshdescription pid process target process PID 1260 wrote to memory of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 1260 wrote to memory of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 1260 wrote to memory of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 1260 wrote to memory of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 1260 wrote to memory of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 1260 wrote to memory of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 1260 wrote to memory of 964 1260 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe 001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe PID 1224 wrote to memory of 824 1224 taskeng.exe gagbjsh PID 1224 wrote to memory of 824 1224 taskeng.exe gagbjsh PID 1224 wrote to memory of 824 1224 taskeng.exe gagbjsh PID 1224 wrote to memory of 824 1224 taskeng.exe gagbjsh PID 824 wrote to memory of 1076 824 gagbjsh gagbjsh PID 824 wrote to memory of 1076 824 gagbjsh gagbjsh PID 824 wrote to memory of 1076 824 gagbjsh gagbjsh PID 824 wrote to memory of 1076 824 gagbjsh gagbjsh PID 824 wrote to memory of 1076 824 gagbjsh gagbjsh PID 824 wrote to memory of 1076 824 gagbjsh gagbjsh PID 824 wrote to memory of 1076 824 gagbjsh gagbjsh
Processes
-
C:\Users\Admin\AppData\Local\Temp\001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe"C:\Users\Admin\AppData\Local\Temp\001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe"C:\Users\Admin\AppData\Local\Temp\001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:964
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3FD797DA-00E7-45A6-A89D-C6B6689F3284} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\gagbjshC:\Users\Admin\AppData\Roaming\gagbjsh2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\gagbjshC:\Users\Admin\AppData\Roaming\gagbjsh3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1076
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6ae0d6efc218e9c89545872d79264bad
SHA126cc0c343d8f46bb4f526952cfd954d89fc41021
SHA256001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09
SHA512e6a9b8bafa000ef3b8f58b6684a4381de03f066206835bee0857c575800d39794e6af0b77c945eba17d1c3096c05f836d69f6357bd8664728408f21f6af125da
-
MD5
6ae0d6efc218e9c89545872d79264bad
SHA126cc0c343d8f46bb4f526952cfd954d89fc41021
SHA256001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09
SHA512e6a9b8bafa000ef3b8f58b6684a4381de03f066206835bee0857c575800d39794e6af0b77c945eba17d1c3096c05f836d69f6357bd8664728408f21f6af125da
-
MD5
6ae0d6efc218e9c89545872d79264bad
SHA126cc0c343d8f46bb4f526952cfd954d89fc41021
SHA256001ed2083408002a0bc62382caab167977daad2753cd89cb63886bc786a03e09
SHA512e6a9b8bafa000ef3b8f58b6684a4381de03f066206835bee0857c575800d39794e6af0b77c945eba17d1c3096c05f836d69f6357bd8664728408f21f6af125da