Analysis
-
max time kernel
154s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 16:31
Static task
static1
Behavioral task
behavioral1
Sample
b87d122c545b8dcdab899620aead7068.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b87d122c545b8dcdab899620aead7068.exe
Resource
win10-en-20211208
General
-
Target
b87d122c545b8dcdab899620aead7068.exe
-
Size
189KB
-
MD5
b87d122c545b8dcdab899620aead7068
-
SHA1
b039d8a382e4323d08d444b3190ea936185e9404
-
SHA256
3d6425cf292c5a78f2014754d8a3368a934110587077584bc54b54642609b1f0
-
SHA512
08d6cf272536f7a7770b89c9b29d387303584781a5752c542335a8d63ce9cd1fa3ba850e615abd920e349b353edf6b0bc9994dab5e4f9ab05f6dfd9245898435
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1376 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b87d122c545b8dcdab899620aead7068.exedescription pid process target process PID 980 set thread context of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b87d122c545b8dcdab899620aead7068.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b87d122c545b8dcdab899620aead7068.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b87d122c545b8dcdab899620aead7068.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b87d122c545b8dcdab899620aead7068.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b87d122c545b8dcdab899620aead7068.exepid process 268 b87d122c545b8dcdab899620aead7068.exe 268 b87d122c545b8dcdab899620aead7068.exe 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1376 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b87d122c545b8dcdab899620aead7068.exepid process 268 b87d122c545b8dcdab899620aead7068.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1376 1376 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1376 1376 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
b87d122c545b8dcdab899620aead7068.exedescription pid process target process PID 980 wrote to memory of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe PID 980 wrote to memory of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe PID 980 wrote to memory of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe PID 980 wrote to memory of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe PID 980 wrote to memory of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe PID 980 wrote to memory of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe PID 980 wrote to memory of 268 980 b87d122c545b8dcdab899620aead7068.exe b87d122c545b8dcdab899620aead7068.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87d122c545b8dcdab899620aead7068.exe"C:\Users\Admin\AppData\Local\Temp\b87d122c545b8dcdab899620aead7068.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\b87d122c545b8dcdab899620aead7068.exe"C:\Users\Admin\AppData\Local\Temp\b87d122c545b8dcdab899620aead7068.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:268
-