Analysis
-
max time kernel
157s -
max time network
139s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 15:16
Static task
static1
Behavioral task
behavioral1
Sample
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe
Resource
win10-en-20211208
General
-
Target
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe
-
Size
351KB
-
MD5
f6a203f2e6659bfba867ff5013dfa019
-
SHA1
a3e5f62bcaeebd1e3e102a1071d18d2bdf307dfb
-
SHA256
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace
-
SHA512
06bf9cc489e1904e45e7fe314cae1e9c2ed2e1dd1a7b6356523fb42642b76535e2045d88c072138f11d8dba1e87c7703cfd7cf5306a73d6b5de16e15301a5d2a
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 2364 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exedescription pid process target process PID 2612 set thread context of 348 2612 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exepid process 348 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 348 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 2364 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2364 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exepid process 348 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exedescription pid process target process PID 2612 wrote to memory of 348 2612 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe PID 2612 wrote to memory of 348 2612 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe PID 2612 wrote to memory of 348 2612 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe PID 2612 wrote to memory of 348 2612 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe PID 2612 wrote to memory of 348 2612 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe PID 2612 wrote to memory of 348 2612 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe 64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe"C:\Users\Admin\AppData\Local\Temp\64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe"C:\Users\Admin\AppData\Local\Temp\64c75634681ca45017b1e20eff43287d7e5d0d9800aad1058b4d25f0487e0ace.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:348
-