Analysis
-
max time kernel
166s -
max time network
118s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 14:57
Static task
static1
Behavioral task
behavioral1
Sample
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe
Resource
win10-en-20211208
General
-
Target
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe
-
Size
352KB
-
MD5
97fc4c260a19feccdf071b6a8eb3ea91
-
SHA1
95d27583e4a9d57eae95484fa098dbee043c2568
-
SHA256
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec
-
SHA512
7b2e7d830b3c345fd20b0305d406fb8be5337df9b05efc003d682293d5feaf53ac2fefe50f84f8fcc3123a26cf1bc29df29e22801155785e97604926daa2c00d
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3044 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exedescription pid process target process PID 2716 set thread context of 3636 2716 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exepid process 3636 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 3636 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 3044 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3044 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exepid process 3636 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exedescription pid process target process PID 2716 wrote to memory of 3636 2716 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe PID 2716 wrote to memory of 3636 2716 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe PID 2716 wrote to memory of 3636 2716 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe PID 2716 wrote to memory of 3636 2716 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe PID 2716 wrote to memory of 3636 2716 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe PID 2716 wrote to memory of 3636 2716 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe 60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe"C:\Users\Admin\AppData\Local\Temp\60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe"C:\Users\Admin\AppData\Local\Temp\60c726b7dd94a8c2c3bc21fd8b4d04c52cf09463c2cb54813cb4566b5fdf4bec.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3636
-