Analysis
-
max time kernel
150s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe
Resource
win10-20230220-en
General
-
Target
c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe
-
Size
320KB
-
MD5
a7c725549c0c599ec6931876d6c54338
-
SHA1
d21d68273f0826cf0067e0b1883b1b03a1eb96ec
-
SHA256
c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67
-
SHA512
982387043dfdc191bb4083edbce5cb39ee545e9da3872005f20cee510e44a72212ee93b6358320e001bcb37eb6da7aeb614b6b3ea9844e70ceae26a6ec81bd4d
-
SSDEEP
6144:T+O78LYiM8QXRE2sSolZWqSxjojm2IVvGG4:65ciM8QBIx0orIVvG
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3240 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4220 set thread context of 4244 4220 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 67 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4244 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 4244 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found 3240 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3240 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4244 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4244 4220 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 67 PID 4220 wrote to memory of 4244 4220 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 67 PID 4220 wrote to memory of 4244 4220 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 67 PID 4220 wrote to memory of 4244 4220 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 67 PID 4220 wrote to memory of 4244 4220 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 67 PID 4220 wrote to memory of 4244 4220 c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe 67 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe"C:\Users\Admin\AppData\Local\Temp\c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe"C:\Users\Admin\AppData\Local\Temp\c98f8aba043610f3ec2228c91c7926fa456cba24a88a0ff4e441b424bb8efc67.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4244
-