Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2023, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe
Resource
win10v2004-20230220-en
General
-
Target
7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe
-
Size
209KB
-
MD5
2dd444b370332bce0648b5cf0527200e
-
SHA1
73991e1fdcd901a05a0c02fbeea63edf3a87135d
-
SHA256
7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf
-
SHA512
6c1dd0273d5847238f34a6c4bdbcca02a274648d21783d365855eda73261caefca895bdd93c7dd281b2246ccea36036febd897bf8660c34f4920fc4ce0986b27
-
SSDEEP
3072:TSJe6G1LrhBRcXDRQaK5dg+U0Qz2U+sE9ebGD6L64rqbIlUX7i1LlnmXF1:OW1L/OqXaz/GebGixrA97ix1C
Malware Config
Extracted
smokeloader
2022
http://caravan-spezialistan.de:47086/solxx/
http://lankanau-bremen.de:37086/dnyxx/
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral1/memory/1636-57-0x0000000000230000-0x0000000000239000-memory.dmp family_smokeloader behavioral1/memory/948-56-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/948-58-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/948-60-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1636 set thread context of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 948 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 948 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1296 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 948 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27 PID 1636 wrote to memory of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27 PID 1636 wrote to memory of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27 PID 1636 wrote to memory of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27 PID 1636 wrote to memory of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27 PID 1636 wrote to memory of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27 PID 1636 wrote to memory of 948 1636 7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe"C:\Users\Admin\AppData\Local\Temp\7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe"C:\Users\Admin\AppData\Local\Temp\7c6875e8e913861d2da44e6e3e83e79c846fbf244b3f51f5224eb1be1809bedf.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:948
-