Analysis
-
max time kernel
152s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe
Resource
win10-en-20211208
General
-
Target
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe
-
Size
352KB
-
MD5
b8325b86a517c7b3ac4de4ec6911d25c
-
SHA1
24dafdc0cca4ac80e0f262b39d86663ffec35717
-
SHA256
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b
-
SHA512
de88e08bdd08effa6294440593051326f2adc331e38359b2c7d0a19c35508c826a43469ddf7cf459a9a818830eba735e938fc91050213d833bc44a41ae8f330d
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 2648 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exedescription pid process target process PID 780 set thread context of 2444 780 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exepid process 2444 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 2444 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2648 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exepid process 2444 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exedescription pid process target process PID 780 wrote to memory of 2444 780 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe PID 780 wrote to memory of 2444 780 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe PID 780 wrote to memory of 2444 780 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe PID 780 wrote to memory of 2444 780 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe PID 780 wrote to memory of 2444 780 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe PID 780 wrote to memory of 2444 780 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe 6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe"C:\Users\Admin\AppData\Local\Temp\6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe"C:\Users\Admin\AppData\Local\Temp\6f5f3416324b35cbe48f45a54a43454adddedc38703fcebafda9c610a7c8078b.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2444
-