Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 00:20
Static task
static1
Behavioral task
behavioral1
Sample
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe
Resource
win10-en-20211208
General
-
Target
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe
-
Size
318KB
-
MD5
402d7375a6ea77e3e17142a64e3e2e61
-
SHA1
aacf99fdb58a3db24e3a217c6b9a2f4411bf1b71
-
SHA256
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33
-
SHA512
d590b934bbc31b7bc2923457a0a83de6fba1041463933cc1befd0362f8e5bf3cffab519114dba3dc825625f9ba92d3f0c080e8de9ab9a8a1771515de80b6695d
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exedescription pid process target process PID 3328 set thread context of 816 3328 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exepid process 816 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 816 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3056 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exepid process 816 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exedescription pid process target process PID 3328 wrote to memory of 816 3328 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe PID 3328 wrote to memory of 816 3328 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe PID 3328 wrote to memory of 816 3328 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe PID 3328 wrote to memory of 816 3328 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe PID 3328 wrote to memory of 816 3328 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe PID 3328 wrote to memory of 816 3328 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe 0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe"C:\Users\Admin\AppData\Local\Temp\0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe"C:\Users\Admin\AppData\Local\Temp\0f0faf33cf35426dc7dea4b0e037e30fa6150fc6c6d4e06bca0b2ddfe2080c33.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/816-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/816-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3056-119-0x0000000000610000-0x0000000000626000-memory.dmpFilesize
88KB
-
memory/3328-115-0x00000000004C0000-0x00000000004C8000-memory.dmpFilesize
32KB
-
memory/3328-116-0x00000000004D0000-0x00000000004D9000-memory.dmpFilesize
36KB