Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
277KB
-
MD5
0ae23cd6bb94954011e39d65cd859740
-
SHA1
53b9b06b65c708eff41deb34d221563ac77453fa
-
SHA256
8a7bd81348d196411870662f20f8070ebc068ee21de4cbae342ea44da41da0bc
-
SHA512
e913898913e49cb170fde0cbee257fd2af0fb9d931daeeb3d8902b44b14e7ab6ee30d8dc118ff95e5bc2f8f6e827fa0abb94a8d351c3b075c5f1431f268083a8
-
SSDEEP
3072:exlPvo2dcvcCN75ABlfTynGydZxALCyFI1VENsRyWf8Ml7sWYu0ZWnMWN8aeeL:e9gVZaTynKCGI0HWf8SYWY6Mva
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 setup.exe 5064 setup.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 5064 setup.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3156 Process not Found 3156 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3156 wrote to memory of 2840 3156 Process not Found 90 PID 3156 wrote to memory of 2840 3156 Process not Found 90 PID 3156 wrote to memory of 2840 3156 Process not Found 90 PID 3156 wrote to memory of 2840 3156 Process not Found 90 PID 3156 wrote to memory of 1904 3156 Process not Found 91 PID 3156 wrote to memory of 1904 3156 Process not Found 91 PID 3156 wrote to memory of 1904 3156 Process not Found 91 PID 3156 wrote to memory of 5012 3156 Process not Found 92 PID 3156 wrote to memory of 5012 3156 Process not Found 92 PID 3156 wrote to memory of 5012 3156 Process not Found 92 PID 3156 wrote to memory of 5012 3156 Process not Found 92 PID 3156 wrote to memory of 1372 3156 Process not Found 93 PID 3156 wrote to memory of 1372 3156 Process not Found 93 PID 3156 wrote to memory of 1372 3156 Process not Found 93 PID 3156 wrote to memory of 4672 3156 Process not Found 94 PID 3156 wrote to memory of 4672 3156 Process not Found 94 PID 3156 wrote to memory of 4672 3156 Process not Found 94 PID 3156 wrote to memory of 4672 3156 Process not Found 94 PID 3156 wrote to memory of 4680 3156 Process not Found 95 PID 3156 wrote to memory of 4680 3156 Process not Found 95 PID 3156 wrote to memory of 4680 3156 Process not Found 95 PID 3156 wrote to memory of 4680 3156 Process not Found 95 PID 3156 wrote to memory of 2836 3156 Process not Found 96 PID 3156 wrote to memory of 2836 3156 Process not Found 96 PID 3156 wrote to memory of 2836 3156 Process not Found 96 PID 3156 wrote to memory of 2836 3156 Process not Found 96 PID 3156 wrote to memory of 4676 3156 Process not Found 97 PID 3156 wrote to memory of 4676 3156 Process not Found 97 PID 3156 wrote to memory of 4676 3156 Process not Found 97 PID 3156 wrote to memory of 4300 3156 Process not Found 98 PID 3156 wrote to memory of 4300 3156 Process not Found 98 PID 3156 wrote to memory of 4300 3156 Process not Found 98 PID 3156 wrote to memory of 4300 3156 Process not Found 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5064
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2840
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1904
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5012
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1372
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4672
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4680
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4676
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4300