Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2023, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
57a8ecaee021fbffd08b27cd2f67ff88.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
57a8ecaee021fbffd08b27cd2f67ff88.exe
Resource
win10v2004-20230221-en
General
-
Target
57a8ecaee021fbffd08b27cd2f67ff88.exe
-
Size
585KB
-
MD5
57a8ecaee021fbffd08b27cd2f67ff88
-
SHA1
56df20ecf3bac9dc4d9d0c230b95d09cb272c4e2
-
SHA256
999ae9856f3df7405d491edac3bdac882351623f63586472336957bc379285d6
-
SHA512
7e95b34e54557124e1f82d7a5dcd81bdcd6d60c5fbe111a12397cb956e0417352991c16704095aba7da7d8bfe7baf3bdc8821495ee1cb6d5a15822291b785311
-
SSDEEP
12288:Ax353lnE5BhWH78QM8I9wjvHhKDMZqTLhs:Ax3tlnE5KbXWsvQAZcLh
Malware Config
Extracted
smokeloader
swo
Extracted
smokeloader
2020
http://akmedia.in/js/k/index.php
http://bethesdaserukam.org/setting/k/index.php
http://stemschools.in/js/k/index.php
http://dejarestaurant.com/wp-admin/js/k/index.php
http://moabscript.ir/wp-admin/js/k/index.php
http://nicehybridseeds.com/image/catalog/k/index.php
http://imaker.io/picktail/js/k/index.php
http://nanavatisworld.com/assets/js/k/index.php
http://smartbubox.com/img/k/index.php
http://krigenpharmaceuticals.com/js/k/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1604 set thread context of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 57a8ecaee021fbffd08b27cd2f67ff88.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 57a8ecaee021fbffd08b27cd2f67ff88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 57a8ecaee021fbffd08b27cd2f67ff88.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 57a8ecaee021fbffd08b27cd2f67ff88.exe 1444 57a8ecaee021fbffd08b27cd2f67ff88.exe 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1444 57a8ecaee021fbffd08b27cd2f67ff88.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28 PID 1604 wrote to memory of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28 PID 1604 wrote to memory of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28 PID 1604 wrote to memory of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28 PID 1604 wrote to memory of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28 PID 1604 wrote to memory of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28 PID 1604 wrote to memory of 1444 1604 57a8ecaee021fbffd08b27cd2f67ff88.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\57a8ecaee021fbffd08b27cd2f67ff88.exe"C:\Users\Admin\AppData\Local\Temp\57a8ecaee021fbffd08b27cd2f67ff88.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\57a8ecaee021fbffd08b27cd2f67ff88.exe"{path}"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1444
-