Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2023, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe
Resource
win10v2004-20230220-en
General
-
Target
8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe
-
Size
239KB
-
MD5
e5ada34070c9c17dd96f91a551b25a7e
-
SHA1
4d97e462228f3763924d8925c096e31ba1e50eac
-
SHA256
8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450
-
SHA512
415766373f22f73bb0ba5fd6bd9babb980b9e5a5f88037298ce01e6c372976273ac5b5386c414aecc9fac2c55609295aa6dcc8353dcfce8f754530bbc1c5400f
-
SSDEEP
3072:FlRpD304bU+eRGsWzw8WYlrq90xlhqR4XV+lOAD9J6t28SuBty4:XR24bUSjw/YwOlhqm+lOkK2IP
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3440 set thread context of 3468 3440 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 84 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3468 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 3468 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found 3184 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3184 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3468 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found Token: SeShutdownPrivilege 3184 Process not Found Token: SeCreatePagefilePrivilege 3184 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3468 3440 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 84 PID 3440 wrote to memory of 3468 3440 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 84 PID 3440 wrote to memory of 3468 3440 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 84 PID 3440 wrote to memory of 3468 3440 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 84 PID 3440 wrote to memory of 3468 3440 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 84 PID 3440 wrote to memory of 3468 3440 8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe"C:\Users\Admin\AppData\Local\Temp\8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe"C:\Users\Admin\AppData\Local\Temp\8babe83f93f4409f3234fb14104f061222ec5cc5fd31e5a89e4988733255c450.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3468
-