Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 01:09
Static task
static1
Behavioral task
behavioral1
Sample
387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe
Resource
win10v2004-20230221-en
General
-
Target
387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe
-
Size
224KB
-
MD5
5e3a6bec7a92d30dec303dd335ea7f92
-
SHA1
82bf71f1856a62c24e8c8d902d53dba99008550f
-
SHA256
387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658
-
SHA512
27341b567c888de5109da8fb27640a6b4ff2165957872923eac7cbb7ad434bc29558d913930112cdb84976d3df9a267186aae891ea89fcd825a2502c54ea8813
-
SSDEEP
3072:1YjdIs1K3dVAVIw0DVtyTgMr0ojauaLif/zxWHM6VyiaD5UE1ElCETy9Y:y+H0VirKnaLI/zxj6VxOUEKl
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
Processes:
adeesjwpid process 3780 adeesjw -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exeadeesjwdescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI adeesjw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI adeesjw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI adeesjw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exepid process 2116 387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe 2116 387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3128 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exeadeesjwpid process 2116 387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3128 3780 adeesjw -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 Token: SeShutdownPrivilege 3128 Token: SeCreatePagefilePrivilege 3128 -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
description pid process target process PID 3128 wrote to memory of 1340 3128 explorer.exe PID 3128 wrote to memory of 1340 3128 explorer.exe PID 3128 wrote to memory of 1340 3128 explorer.exe PID 3128 wrote to memory of 1340 3128 explorer.exe PID 3128 wrote to memory of 4284 3128 explorer.exe PID 3128 wrote to memory of 4284 3128 explorer.exe PID 3128 wrote to memory of 4284 3128 explorer.exe PID 3128 wrote to memory of 1804 3128 explorer.exe PID 3128 wrote to memory of 1804 3128 explorer.exe PID 3128 wrote to memory of 1804 3128 explorer.exe PID 3128 wrote to memory of 1804 3128 explorer.exe PID 3128 wrote to memory of 1872 3128 explorer.exe PID 3128 wrote to memory of 1872 3128 explorer.exe PID 3128 wrote to memory of 1872 3128 explorer.exe PID 3128 wrote to memory of 340 3128 explorer.exe PID 3128 wrote to memory of 340 3128 explorer.exe PID 3128 wrote to memory of 340 3128 explorer.exe PID 3128 wrote to memory of 340 3128 explorer.exe PID 3128 wrote to memory of 3576 3128 explorer.exe PID 3128 wrote to memory of 3576 3128 explorer.exe PID 3128 wrote to memory of 3576 3128 explorer.exe PID 3128 wrote to memory of 3576 3128 explorer.exe PID 3128 wrote to memory of 1268 3128 explorer.exe PID 3128 wrote to memory of 1268 3128 explorer.exe PID 3128 wrote to memory of 1268 3128 explorer.exe PID 3128 wrote to memory of 1268 3128 explorer.exe PID 3128 wrote to memory of 4008 3128 explorer.exe PID 3128 wrote to memory of 4008 3128 explorer.exe PID 3128 wrote to memory of 4008 3128 explorer.exe PID 3128 wrote to memory of 3088 3128 explorer.exe PID 3128 wrote to memory of 3088 3128 explorer.exe PID 3128 wrote to memory of 3088 3128 explorer.exe PID 3128 wrote to memory of 3088 3128 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe"C:\Users\Admin\AppData\Local\Temp\387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2116
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1340
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4284
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1804
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1872
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:340
-
C:\Users\Admin\AppData\Roaming\adeesjwC:\Users\Admin\AppData\Roaming\adeesjw1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3780
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3576
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1268
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4008
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD55e3a6bec7a92d30dec303dd335ea7f92
SHA182bf71f1856a62c24e8c8d902d53dba99008550f
SHA256387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658
SHA51227341b567c888de5109da8fb27640a6b4ff2165957872923eac7cbb7ad434bc29558d913930112cdb84976d3df9a267186aae891ea89fcd825a2502c54ea8813
-
Filesize
224KB
MD55e3a6bec7a92d30dec303dd335ea7f92
SHA182bf71f1856a62c24e8c8d902d53dba99008550f
SHA256387e053c28b9c0fbb7749da52d4db404caf5483f9f4a3a56981cf59b1fb7b658
SHA51227341b567c888de5109da8fb27640a6b4ff2165957872923eac7cbb7ad434bc29558d913930112cdb84976d3df9a267186aae891ea89fcd825a2502c54ea8813