Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe
Resource
win10v2004-20230220-en
General
-
Target
c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe
-
Size
251KB
-
MD5
f479496457eb0fccc8180d62bb35d167
-
SHA1
d7f7bac98589b9608f03f07e8fc4e5fac751f6d1
-
SHA256
c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10
-
SHA512
05eb0638d6dead5c13dbfda5cf682e1dc6634b12f9c35e8eeecc75a72d116307dde0f1baa71e9c6d4486ae19ed0b0186861ae2bf63ef54dee60629d76db90c42
-
SSDEEP
6144:+iEnhe+hhLUeA8RIJTXmjtXlIrMhxNkLS:+jheUh4eBRIAFlIr2g
Malware Config
Extracted
smokeloader
lab
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2352 set thread context of 2848 2352 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 83 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 2848 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3080 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2848 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2848 2352 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 83 PID 2352 wrote to memory of 2848 2352 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 83 PID 2352 wrote to memory of 2848 2352 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 83 PID 2352 wrote to memory of 2848 2352 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 83 PID 2352 wrote to memory of 2848 2352 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 83 PID 2352 wrote to memory of 2848 2352 c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe"C:\Users\Admin\AppData\Local\Temp\c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe"C:\Users\Admin\AppData\Local\Temp\c190faab2a022e6a7c392f336d101d9058869c21acad7b19ef018112ed3a1e10.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2848
-