Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe
Resource
win10v2004-20230220-en
General
-
Target
1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe
-
Size
270KB
-
MD5
57caa38821163a93ba5b64503740783c
-
SHA1
079d4362ab22c59000d75ff08ca121b61b9d40f9
-
SHA256
1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130
-
SHA512
e410c112cfbdbb97b45ccf408b9372b2921c1bd84adc777efb92172570eeed367272be7b32df858a66b48ef08257796a47b777e041700c19475be1f0dcbdc397
-
SSDEEP
3072:bz9QZ1WJo0DxhQghTN8v/CCRkxcYw9sgrrqTKdwKsTOmQ90ZlmhU:lUWzDxhnhTAkxPwFrqTKKKqTPV
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5036 1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe 5036 1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3140 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 5036 1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found 3140 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3652 3140 Process not Found 93 PID 3140 wrote to memory of 3652 3140 Process not Found 93 PID 3140 wrote to memory of 3652 3140 Process not Found 93 PID 3140 wrote to memory of 3652 3140 Process not Found 93 PID 3140 wrote to memory of 4444 3140 Process not Found 94 PID 3140 wrote to memory of 4444 3140 Process not Found 94 PID 3140 wrote to memory of 4444 3140 Process not Found 94 PID 3140 wrote to memory of 4528 3140 Process not Found 95 PID 3140 wrote to memory of 4528 3140 Process not Found 95 PID 3140 wrote to memory of 4528 3140 Process not Found 95 PID 3140 wrote to memory of 4528 3140 Process not Found 95 PID 3140 wrote to memory of 2564 3140 Process not Found 96 PID 3140 wrote to memory of 2564 3140 Process not Found 96 PID 3140 wrote to memory of 2564 3140 Process not Found 96 PID 3140 wrote to memory of 3804 3140 Process not Found 97 PID 3140 wrote to memory of 3804 3140 Process not Found 97 PID 3140 wrote to memory of 3804 3140 Process not Found 97 PID 3140 wrote to memory of 3804 3140 Process not Found 97 PID 3140 wrote to memory of 4468 3140 Process not Found 98 PID 3140 wrote to memory of 4468 3140 Process not Found 98 PID 3140 wrote to memory of 4468 3140 Process not Found 98 PID 3140 wrote to memory of 4468 3140 Process not Found 98 PID 3140 wrote to memory of 976 3140 Process not Found 99 PID 3140 wrote to memory of 976 3140 Process not Found 99 PID 3140 wrote to memory of 976 3140 Process not Found 99 PID 3140 wrote to memory of 976 3140 Process not Found 99 PID 3140 wrote to memory of 4052 3140 Process not Found 100 PID 3140 wrote to memory of 4052 3140 Process not Found 100 PID 3140 wrote to memory of 4052 3140 Process not Found 100 PID 3140 wrote to memory of 3688 3140 Process not Found 101 PID 3140 wrote to memory of 3688 3140 Process not Found 101 PID 3140 wrote to memory of 3688 3140 Process not Found 101 PID 3140 wrote to memory of 3688 3140 Process not Found 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe"C:\Users\Admin\AppData\Local\Temp\1a49bbcceb07f924f470f574bff3b7ad9d0622026e48af4a9f60b8c6fe072130.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5036
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3652
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4444
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4528
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2564
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3804
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4468
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:976
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4052
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3688