Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 07:00
Static task
static1
Behavioral task
behavioral1
Sample
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe
Resource
win10v2004-20220414-en
General
-
Target
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe
-
Size
124KB
-
MD5
4762bf87bb09e916dacd13d3f6b1e98f
-
SHA1
1f4c2074cc110f6c1b7b3a9d177154453c0c575b
-
SHA256
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29
-
SHA512
56d2a5d1b27df7572af0d76514b2d9a5357926bdd6be3c574ff83f47515c49515576b14183b67a90951cc33da73752695f8fe24bad6b0073d50733e85698a3c7
Malware Config
Extracted
smokeloader
2018
http://45.62.235.208/w/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exedescription pid process target process PID 1868 set thread context of 1616 1868 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exepid process 1616 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe 1616 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exepid process 1868 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exedescription pid process target process PID 1868 wrote to memory of 1616 1868 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe PID 1868 wrote to memory of 1616 1868 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe PID 1868 wrote to memory of 1616 1868 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe PID 1868 wrote to memory of 1616 1868 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe PID 1868 wrote to memory of 1616 1868 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe 411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe"C:\Users\Admin\AppData\Local\Temp\411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe"C:\Users\Admin\AppData\Local\Temp\411101bbd66128f5220733ba0229999ccb4fa7c608dd1e4637b169e6f3a79e29.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1208-58-0x00000000025D0000-0x00000000025E5000-memory.dmpFilesize
84KB
-
memory/1616-55-0x0000000000402931-mapping.dmp
-
memory/1616-56-0x00000000759E1000-0x00000000759E3000-memory.dmpFilesize
8KB
-
memory/1616-57-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1868-54-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB