Analysis
-
max time kernel
150s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
11-05-2023 04:45
Static task
static1
Behavioral task
behavioral1
Sample
1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe
Resource
win10-20230220-en
General
-
Target
1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe
-
Size
325KB
-
MD5
4c0831b4e751117184b52251e0bfb467
-
SHA1
f3b72860a423565050ab4a764728207d8c60c87f
-
SHA256
1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390
-
SHA512
9785ca24b7514a24d38901f620a9ba1eaed9d6e0a563260858dd22ad23129188738bc620c3f40b0f2a1c842c17306e58f0f0767f87530534d6b1a784f7e49e68
-
SSDEEP
3072:M7mebYfcAUNuImcfigF7G16EgnMiuNqY2NZcr6vLX+BGCIJsNoENT138wT:z1fcXBfhlMniuNqJY0LgGCIMNH
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3204 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3648 set thread context of 3656 3648 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3656 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 3656 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found 3204 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3204 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3656 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3656 3648 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 66 PID 3648 wrote to memory of 3656 3648 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 66 PID 3648 wrote to memory of 3656 3648 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 66 PID 3648 wrote to memory of 3656 3648 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 66 PID 3648 wrote to memory of 3656 3648 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 66 PID 3648 wrote to memory of 3656 3648 1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe"C:\Users\Admin\AppData\Local\Temp\1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe"C:\Users\Admin\AppData\Local\Temp\1b0638b195c4605c78a20e7335e63f1c4f6cfaebfa9e6553bee795cf311cb390.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3656
-