Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
259KB
-
MD5
fde26eb8c09066b3c490e1350906e941
-
SHA1
be0954dc552656cf0d8845ed94eb35f473e43b59
-
SHA256
f56c5a8b0f93cb5ee3f14e5fdab4466999a3c305bd0f3ee4384d57e38e868a16
-
SHA512
b0b75dbdfd123fb4443721a1a6ab5fde74b87315e9ec90f189a1a4f8dcc665e721aecd741abf37ef238484ac4803a8e1a765f3566dba8fa489a5ed41e0f731ad
-
SSDEEP
3072:p1ZOh38zlnVg6xkCLHrwZYtadGqJydBBeN9tO8b6UKgj5Wu6NXv:XZ83+gWkCLLwZGadGqJydBBeBnOv/
Malware Config
Extracted
smokeloader
lab
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 4876 whvjaai 2044 whvjaai -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5100 set thread context of 3284 5100 file.exe 77 PID 4876 set thread context of 2044 4876 whvjaai 88 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI whvjaai Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI whvjaai Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI whvjaai Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3284 file.exe 3284 file.exe 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3140 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3284 file.exe 2044 whvjaai -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3140 Process not Found Token: SeCreatePagefilePrivilege 3140 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3284 5100 file.exe 77 PID 5100 wrote to memory of 3284 5100 file.exe 77 PID 5100 wrote to memory of 3284 5100 file.exe 77 PID 5100 wrote to memory of 3284 5100 file.exe 77 PID 5100 wrote to memory of 3284 5100 file.exe 77 PID 5100 wrote to memory of 3284 5100 file.exe 77 PID 4876 wrote to memory of 2044 4876 whvjaai 88 PID 4876 wrote to memory of 2044 4876 whvjaai 88 PID 4876 wrote to memory of 2044 4876 whvjaai 88 PID 4876 wrote to memory of 2044 4876 whvjaai 88 PID 4876 wrote to memory of 2044 4876 whvjaai 88 PID 4876 wrote to memory of 2044 4876 whvjaai 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3284
-
-
C:\Users\Admin\AppData\Roaming\whvjaaiC:\Users\Admin\AppData\Roaming\whvjaai1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Roaming\whvjaaiC:\Users\Admin\AppData\Roaming\whvjaai2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD5fde26eb8c09066b3c490e1350906e941
SHA1be0954dc552656cf0d8845ed94eb35f473e43b59
SHA256f56c5a8b0f93cb5ee3f14e5fdab4466999a3c305bd0f3ee4384d57e38e868a16
SHA512b0b75dbdfd123fb4443721a1a6ab5fde74b87315e9ec90f189a1a4f8dcc665e721aecd741abf37ef238484ac4803a8e1a765f3566dba8fa489a5ed41e0f731ad
-
Filesize
259KB
MD5fde26eb8c09066b3c490e1350906e941
SHA1be0954dc552656cf0d8845ed94eb35f473e43b59
SHA256f56c5a8b0f93cb5ee3f14e5fdab4466999a3c305bd0f3ee4384d57e38e868a16
SHA512b0b75dbdfd123fb4443721a1a6ab5fde74b87315e9ec90f189a1a4f8dcc665e721aecd741abf37ef238484ac4803a8e1a765f3566dba8fa489a5ed41e0f731ad
-
Filesize
259KB
MD5fde26eb8c09066b3c490e1350906e941
SHA1be0954dc552656cf0d8845ed94eb35f473e43b59
SHA256f56c5a8b0f93cb5ee3f14e5fdab4466999a3c305bd0f3ee4384d57e38e868a16
SHA512b0b75dbdfd123fb4443721a1a6ab5fde74b87315e9ec90f189a1a4f8dcc665e721aecd741abf37ef238484ac4803a8e1a765f3566dba8fa489a5ed41e0f731ad