Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe
Resource
win10v2004-20230220-en
General
-
Target
526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe
-
Size
263KB
-
MD5
7ff62e09f6a6594a62244415293c3022
-
SHA1
228a9378ac11bc91862d630cbc615fa6f7c8c43a
-
SHA256
526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7
-
SHA512
6185419b3d9b088dceb70a81ad0ca7842a9cccb5e16f7c9c36e91f644c0097d2848916750366c2fca8c4ce5688d7ea0a32e79a9764c81d87a1a3b3a45ea124fa
-
SSDEEP
3072:W7QlyuFebELGeOlLcn9WLnt0eipQPcYQsZZcueeeMegHNol6:IQEFQGekLc8Ln0uxpetyHNol
Malware Config
Extracted
smokeloader
pu10
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2008 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 2008 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found 1372 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1372 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2008 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1372 Process not Found -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28 PID 1984 wrote to memory of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28 PID 1984 wrote to memory of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28 PID 1984 wrote to memory of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28 PID 1984 wrote to memory of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28 PID 1984 wrote to memory of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28 PID 1984 wrote to memory of 2008 1984 526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe"C:\Users\Admin\AppData\Local\Temp\526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe"C:\Users\Admin\AppData\Local\Temp\526f1d92a83956348ff97c2571afb91e8604cab1fde53530fc88546ee14891c7.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2008
-