Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 10:21
Static task
static1
Behavioral task
behavioral1
Sample
fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe
Resource
win10v2004-20230220-en
General
-
Target
fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe
-
Size
233KB
-
MD5
190d1cf0cb396fe696dfba4f114087ef
-
SHA1
91722541bf951621816e458b42bce5040275d7ed
-
SHA256
fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f
-
SHA512
627779af33c6b83abccd6716030424104e050ff22ad8756a44684113ee6244e8a2327365c89fe915811712e278613937522192ef9c7b6760a6603e9351cb87ec
-
SSDEEP
3072:N2rRsFTgVq2u3rwV1Qa2ik4VLDHISdyMPf4lvbADzKWH9CN0UI:TZmqlry15Bd3xf4uPKWH9CN0U
Malware Config
Extracted
smokeloader
lab
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1920 set thread context of 4512 1920 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 86 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 4512 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found 3176 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4512 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found Token: SeShutdownPrivilege 3176 Process not Found Token: SeCreatePagefilePrivilege 3176 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4512 1920 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 86 PID 1920 wrote to memory of 4512 1920 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 86 PID 1920 wrote to memory of 4512 1920 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 86 PID 1920 wrote to memory of 4512 1920 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 86 PID 1920 wrote to memory of 4512 1920 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 86 PID 1920 wrote to memory of 4512 1920 fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe"C:\Users\Admin\AppData\Local\Temp\fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe"C:\Users\Admin\AppData\Local\Temp\fcc6db5850927866d4cbe47d291c406551fdcacd462234b31800e3377f30734f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4512
-