Analysis
-
max time kernel
153s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 17:45
Static task
static1
Behavioral task
behavioral1
Sample
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe
Resource
win10v2004-20220414-en
General
-
Target
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe
-
Size
1.5MB
-
MD5
e7418166327850a7fa1b63e83e608115
-
SHA1
ef5697e60c83b41953bb6f9f04cb3a0d3a71fc2e
-
SHA256
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a
-
SHA512
c8b07a467ae66635b57b915b65b0a97d930183c0c3857f2e3b020079221b5ede1dd51f4f9b8ede661fc4dad8d4c5146870bc1480f64a1971c28cf70d4ffff3eb
Malware Config
Extracted
smokeloader
2017
http://dogewareservice.ru/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exedescription pid process target process PID 1756 set thread context of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exepid process 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exepid process 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exedescription pid process Token: SeDebugPrivilege 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exedescription pid process target process PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1756 wrote to memory of 1616 1756 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe PID 1616 wrote to memory of 896 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe explorer.exe PID 1616 wrote to memory of 896 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe explorer.exe PID 1616 wrote to memory of 896 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe explorer.exe PID 1616 wrote to memory of 896 1616 3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe"C:\Users\Admin\AppData\Local\Temp\3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe"C:\Users\Admin\AppData\Local\Temp\3921ed60cb4c8f6f4f958de1c1c5c9461838f6bcb9f410bf8b5065723bd4144a.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/896-66-0x0000000000000000-mapping.dmp
-
memory/896-70-0x0000000000080000-0x000000000008A000-memory.dmpFilesize
40KB
-
memory/896-69-0x0000000000270000-0x00000000004F1000-memory.dmpFilesize
2.5MB
-
memory/896-68-0x0000000074D01000-0x0000000074D03000-memory.dmpFilesize
8KB
-
memory/1616-57-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/1616-59-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/1616-63-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/1616-64-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB
-
memory/1616-61-0x00000000004014EF-mapping.dmp
-
memory/1616-60-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/1616-56-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/1756-54-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/1756-65-0x00000000748C0000-0x0000000074E6B000-memory.dmpFilesize
5.7MB
-
memory/1756-55-0x00000000748C0000-0x0000000074E6B000-memory.dmpFilesize
5.7MB