Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe
Resource
win10v2004-20230220-en
General
-
Target
aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe
-
Size
265KB
-
MD5
45e3214755ab6eec3ee3f2f775067c2f
-
SHA1
8a4a98878050887bb91e119dd60f116678d0da1b
-
SHA256
aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13
-
SHA512
cfa6762c341b34f33be1ed6846ec439f1505591eb3c0790d4e645d45efc823f3d65b88aefabdb533996df75b5e6ff8973519c1c2d2e91e1955935a6022cc2068
-
SSDEEP
3072:YYOTwBL4IngS+YyoacYsSWRaMlKJSawBmtg3r4fYtyN1xjU4u4JIasSGPml4eZob:YLSLZ1OcY/iHlyTcmtu4wcOBAF4eZbO
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detects Smokeloader packer 4 IoCs
resource yara_rule behavioral2/memory/5064-134-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4244-135-0x0000000000650000-0x0000000000659000-memory.dmp family_smokeloader behavioral2/memory/5064-136-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/5064-138-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4244 set thread context of 5064 4244 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 89 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 5064 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3248 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5064 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4244 wrote to memory of 5064 4244 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 89 PID 4244 wrote to memory of 5064 4244 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 89 PID 4244 wrote to memory of 5064 4244 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 89 PID 4244 wrote to memory of 5064 4244 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 89 PID 4244 wrote to memory of 5064 4244 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 89 PID 4244 wrote to memory of 5064 4244 aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe"C:\Users\Admin\AppData\Local\Temp\aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe"C:\Users\Admin\AppData\Local\Temp\aba2060c7456c6685df7d1e0ea830aec217119b1d05a8fa0c5984cbe4bb0fe13.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5064
-