Analysis

  • max time kernel
    151s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2023, 01:31

General

  • Target

    86363226fc4b59da604231bc51c1c0461680839bf33566f109d3272388ffcd88.exe

  • Size

    228KB

  • MD5

    f68a75373994ac14735b965b3d97162b

  • SHA1

    c57535e961d95b572d8e6d6639a88c52c2855165

  • SHA256

    86363226fc4b59da604231bc51c1c0461680839bf33566f109d3272388ffcd88

  • SHA512

    7916e1a8ae7b0e3059a97d1cbdbfef146a5c7df778c0c3e4f3e999ca6098f6722eced52337336b94bdb6d183de3446e0210d84b885d68aa870e9cd15a45c08e3

  • SSDEEP

    3072:OP1E92YqkZuiiJ6hA4FgBQnUVxSHdI4s6Lirt782vRJ5VCF4m/4xF:OqfuiiJ0FJUVmdNMrWCJ04m/M

Malware Config

Extracted

Family

smokeloader

Botnet

pu10

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\86363226fc4b59da604231bc51c1c0461680839bf33566f109d3272388ffcd88.exe
    "C:\Users\Admin\AppData\Local\Temp\86363226fc4b59da604231bc51c1c0461680839bf33566f109d3272388ffcd88.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\86363226fc4b59da604231bc51c1c0461680839bf33566f109d3272388ffcd88.exe
      "C:\Users\Admin\AppData\Local\Temp\86363226fc4b59da604231bc51c1c0461680839bf33566f109d3272388ffcd88.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-137-0x0000000000E80000-0x0000000000E96000-memory.dmp

    Filesize

    88KB

  • memory/1040-145-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-146-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-147-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-148-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-149-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-150-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-151-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-152-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-154-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-153-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-156-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-155-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-157-0x0000000002FB0000-0x0000000002FC0000-memory.dmp

    Filesize

    64KB

  • memory/1040-158-0x00000000074D0000-0x00000000074E0000-memory.dmp

    Filesize

    64KB

  • memory/1040-159-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-160-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-161-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-162-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-163-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-164-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-165-0x0000000002990000-0x0000000002992000-memory.dmp

    Filesize

    8KB

  • memory/1040-166-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-167-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-168-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-169-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-170-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-171-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-172-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-174-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-173-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-175-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-176-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-177-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-178-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-179-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-180-0x0000000002990000-0x0000000002992000-memory.dmp

    Filesize

    8KB

  • memory/1040-181-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-182-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-183-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-184-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-185-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-186-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-187-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-188-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-189-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-190-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-191-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-192-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-193-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-194-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-195-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-196-0x0000000002E90000-0x0000000002EA0000-memory.dmp

    Filesize

    64KB

  • memory/1040-197-0x0000000002950000-0x0000000002952000-memory.dmp

    Filesize

    8KB

  • memory/1040-198-0x0000000002960000-0x000000000296A000-memory.dmp

    Filesize

    40KB

  • memory/1540-134-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1540-136-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1540-138-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1684-135-0x0000000002D00000-0x0000000002D09000-memory.dmp

    Filesize

    36KB