Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
324KB
-
MD5
ca80dc3fd1fb813184ea47a1a64a6e1c
-
SHA1
3fe363ecbe89a2dbb292295a6b36f95566713dd1
-
SHA256
6a85b446824f7c993777f28f87c60a4f00c338ec2f5220965b7e96dec6f34465
-
SHA512
054a1251f680e40f9151d04e13f65f6f1b8f77539c729c6e7348d0d2f2e3357a1af4176abde31470a0ea98e4425655853e35b6e7340890cd7eb2284ae4f83cf1
-
SSDEEP
6144:DgTADocTL6CUVT/O2ZSs62HuCBFNkywm/bc:DgT4FL6CUp22Is62XkETc
Malware Config
Extracted
smokeloader
pu10
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3216 uvvjhsc 1972 uvvjhsc -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2588 set thread context of 1412 2588 setup.exe 83 PID 3216 set thread context of 1972 3216 uvvjhsc 93 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvvjhsc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvvjhsc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvvjhsc -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1412 setup.exe 1412 setup.exe 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found 3228 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3228 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1412 setup.exe 1972 uvvjhsc -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3228 Process not Found Token: SeCreatePagefilePrivilege 3228 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1412 2588 setup.exe 83 PID 2588 wrote to memory of 1412 2588 setup.exe 83 PID 2588 wrote to memory of 1412 2588 setup.exe 83 PID 2588 wrote to memory of 1412 2588 setup.exe 83 PID 2588 wrote to memory of 1412 2588 setup.exe 83 PID 2588 wrote to memory of 1412 2588 setup.exe 83 PID 3216 wrote to memory of 1972 3216 uvvjhsc 93 PID 3216 wrote to memory of 1972 3216 uvvjhsc 93 PID 3216 wrote to memory of 1972 3216 uvvjhsc 93 PID 3216 wrote to memory of 1972 3216 uvvjhsc 93 PID 3216 wrote to memory of 1972 3216 uvvjhsc 93 PID 3216 wrote to memory of 1972 3216 uvvjhsc 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1412
-
-
C:\Users\Admin\AppData\Roaming\uvvjhscC:\Users\Admin\AppData\Roaming\uvvjhsc1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Roaming\uvvjhscC:\Users\Admin\AppData\Roaming\uvvjhsc2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5ca80dc3fd1fb813184ea47a1a64a6e1c
SHA13fe363ecbe89a2dbb292295a6b36f95566713dd1
SHA2566a85b446824f7c993777f28f87c60a4f00c338ec2f5220965b7e96dec6f34465
SHA512054a1251f680e40f9151d04e13f65f6f1b8f77539c729c6e7348d0d2f2e3357a1af4176abde31470a0ea98e4425655853e35b6e7340890cd7eb2284ae4f83cf1
-
Filesize
324KB
MD5ca80dc3fd1fb813184ea47a1a64a6e1c
SHA13fe363ecbe89a2dbb292295a6b36f95566713dd1
SHA2566a85b446824f7c993777f28f87c60a4f00c338ec2f5220965b7e96dec6f34465
SHA512054a1251f680e40f9151d04e13f65f6f1b8f77539c729c6e7348d0d2f2e3357a1af4176abde31470a0ea98e4425655853e35b6e7340890cd7eb2284ae4f83cf1
-
Filesize
324KB
MD5ca80dc3fd1fb813184ea47a1a64a6e1c
SHA13fe363ecbe89a2dbb292295a6b36f95566713dd1
SHA2566a85b446824f7c993777f28f87c60a4f00c338ec2f5220965b7e96dec6f34465
SHA512054a1251f680e40f9151d04e13f65f6f1b8f77539c729c6e7348d0d2f2e3357a1af4176abde31470a0ea98e4425655853e35b6e7340890cd7eb2284ae4f83cf1