Analysis
-
max time kernel
84s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
30-05-2023 12:31
Static task
static1
Behavioral task
behavioral1
Sample
432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe
Resource
win10-20230220-en
General
-
Target
432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe
-
Size
249KB
-
MD5
875a840800e2b21ea514555ec2f40e4a
-
SHA1
e1c6f8dec8196e7cc66a6b535716ae9d0e7501bc
-
SHA256
432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7
-
SHA512
95535a13b112776557715b011f089398bfd2cefc4ea541eb5a88602a5db2c008244312ef06cc63ba007ff64bc85fa78f003f60eb46eb04efd05f7d498bb3e783
-
SSDEEP
3072:RcZzeEj3NLY8rCOnY2VSlWW5sijvYyErK3ZHVRcWEE5BTs/B1DA5a5M:2Z6Ej9NrnmfMyErKJ1+KTMYa5
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3232 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 2500 2288 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2500 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 2500 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found 3232 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3232 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2500 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3232 Process not Found Token: SeCreatePagefilePrivilege 3232 Process not Found Token: SeShutdownPrivilege 3232 Process not Found Token: SeCreatePagefilePrivilege 3232 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2500 2288 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 66 PID 2288 wrote to memory of 2500 2288 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 66 PID 2288 wrote to memory of 2500 2288 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 66 PID 2288 wrote to memory of 2500 2288 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 66 PID 2288 wrote to memory of 2500 2288 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 66 PID 2288 wrote to memory of 2500 2288 432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe"C:\Users\Admin\AppData\Local\Temp\432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe"C:\Users\Admin\AppData\Local\Temp\432287785e9456bb79c6f6c4c380a3a031d66f57c8389605ec69c383ad0d22f7.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2500
-