Analysis
-
max time kernel
158s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 18:12
Static task
static1
Behavioral task
behavioral1
Sample
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe
Resource
win10-en-20211208
General
-
Target
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe
-
Size
352KB
-
MD5
78e1a5228b6f53501616a16a9619e4a5
-
SHA1
3ae98bd1689eaac92cb2a7432d9b937445184429
-
SHA256
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53
-
SHA512
f5624e45b8fd6baaac6b3b4abcc2c4128847076b251e143dc639494336ad64e5863d49ebbabb9ca1e23e2c49e536fe3d58b5639b660666d03b5702d3769d1204
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 2720 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exedescription pid process target process PID 3468 set thread context of 2208 3468 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exepid process 2208 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 2208 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 2720 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2720 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exepid process 2208 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exedescription pid process target process PID 3468 wrote to memory of 2208 3468 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe PID 3468 wrote to memory of 2208 3468 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe PID 3468 wrote to memory of 2208 3468 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe PID 3468 wrote to memory of 2208 3468 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe PID 3468 wrote to memory of 2208 3468 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe PID 3468 wrote to memory of 2208 3468 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe 33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe"C:\Users\Admin\AppData\Local\Temp\33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe"C:\Users\Admin\AppData\Local\Temp\33c77f1a6470b895e6531692d7f0656f059078e5e754064414c03af38e03bf53.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2208
-