Analysis
-
max time kernel
82s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe
Resource
win10v2004-20230220-en
General
-
Target
28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe
-
Size
215KB
-
MD5
16a53e1b1ca4d25d135e8d7f59c21b86
-
SHA1
f8aa9d5179570886670d7a15bbf09880e99cfc93
-
SHA256
28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca
-
SHA512
4356f6c58fa9f820eba95673af6e8e7d94bc25ccc2303f07f08e7799ca368cf9f2229c4a89e1e3d4c6b580bb0641ac307a2e773489abf6400c746614590c0218
-
SSDEEP
3072:q1osos+2pT4IyARnsE+rCAO0VRu+WWBgciLrCChWiQ5voyWp:Z2VcAT+rCN0Hu++cYC8eoxp
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5012 set thread context of 4280 5012 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 81 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4280 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 4280 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found 3112 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3112 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4280 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4280 5012 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 81 PID 5012 wrote to memory of 4280 5012 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 81 PID 5012 wrote to memory of 4280 5012 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 81 PID 5012 wrote to memory of 4280 5012 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 81 PID 5012 wrote to memory of 4280 5012 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 81 PID 5012 wrote to memory of 4280 5012 28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe"C:\Users\Admin\AppData\Local\Temp\28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe"C:\Users\Admin\AppData\Local\Temp\28c11c0c471c73d30ebdbfc022f30c5be0c4878f8903c34f1dbaef5f200c73ca.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4280
-