Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:24
Static task
static1
Behavioral task
behavioral1
Sample
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe
Resource
win10-20230220-en
General
-
Target
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe
-
Size
265KB
-
MD5
d4c7b1bf2fb6b19675194cb5c11e7a36
-
SHA1
36a817d059a1edf1473350d2a6b59768338b87b4
-
SHA256
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742
-
SHA512
23d17b0ac0e7f5cc25b112ead1d889ff934e1f8cb836b697d5a013cd82b533a07b5b3d69310a8f5b217aa170a0f5a718eebe5ed4297cc85ad9e62e1f0ba273db
-
SSDEEP
3072:gOj+QRHyUUmJyuzoLKM7pnDW3OhElMGVdyMRrUmUqHX8N19vEOQ7mML5kfVqwCUD:vd5yUUuzoLDI+9GPydqstKyfc
Malware Config
Extracted
smokeloader
lab
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3196 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exedescription pid process target process PID 8 set thread context of 3988 8 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exepid process 3988 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 3988 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 3196 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3196 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exepid process 3988 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3196 Token: SeCreatePagefilePrivilege 3196 Token: SeShutdownPrivilege 3196 Token: SeCreatePagefilePrivilege 3196 Token: SeShutdownPrivilege 3196 Token: SeCreatePagefilePrivilege 3196 Token: SeShutdownPrivilege 3196 Token: SeCreatePagefilePrivilege 3196 -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exedescription pid process target process PID 8 wrote to memory of 3988 8 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe PID 8 wrote to memory of 3988 8 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe PID 8 wrote to memory of 3988 8 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe PID 8 wrote to memory of 3988 8 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe PID 8 wrote to memory of 3988 8 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe PID 8 wrote to memory of 3988 8 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe 92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe"C:\Users\Admin\AppData\Local\Temp\92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe"C:\Users\Admin\AppData\Local\Temp\92d3562dabe0104befc4737bd99053583027facf0a3f6ef59b1c25fe78973742.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/8-122-0x00000000007A0000-0x00000000007A9000-memory.dmpFilesize
36KB
-
memory/3196-161-0x0000000001250000-0x0000000001260000-memory.dmpFilesize
64KB
-
memory/3196-124-0x0000000000DC0000-0x0000000000DD6000-memory.dmpFilesize
88KB
-
memory/3196-191-0x0000000001210000-0x000000000121E000-memory.dmpFilesize
56KB
-
memory/3196-190-0x0000000001210000-0x000000000121E000-memory.dmpFilesize
56KB
-
memory/3196-134-0x0000000000DB0000-0x0000000000DC0000-memory.dmpFilesize
64KB
-
memory/3196-136-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-139-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-141-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-142-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-143-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-160-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-147-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-163-0x0000000002FF0000-0x0000000002FFE000-memory.dmpFilesize
56KB
-
memory/3196-151-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-152-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-153-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-154-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-157-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-158-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-159-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-144-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-189-0x0000000001210000-0x000000000121E000-memory.dmpFilesize
56KB
-
memory/3196-150-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-162-0x0000000003000000-0x0000000003003000-memory.dmpFilesize
12KB
-
memory/3196-164-0x0000000000DB0000-0x0000000000DC0000-memory.dmpFilesize
64KB
-
memory/3196-165-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-168-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-169-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-170-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-171-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-172-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-175-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-178-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-179-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-180-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-181-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-182-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-185-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-186-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-187-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3196-188-0x0000000001240000-0x0000000001250000-memory.dmpFilesize
64KB
-
memory/3988-123-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3988-121-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3988-125-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB