Analysis
-
max time kernel
294s -
max time network
284s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18-06-2023 01:25
Static task
static1
Behavioral task
behavioral1
Sample
835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe
Resource
win10-20230220-en
General
-
Target
835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe
-
Size
248KB
-
MD5
aba61284cec3036dae80ece91256cf35
-
SHA1
1ccbcd2605d623ada8ecbcace5c1ff1f082c9e2d
-
SHA256
835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9
-
SHA512
8f57b93b11df6d5aa2686afeb156310bea2f65ed6e17f6b27d1a5089a0d729057f255c9169d797f62c72263ccd4a90fa7203708ebaf3c13521825e1f65a42331
-
SSDEEP
3072:bnwpjZ/aX+tl/w8aKwg/6K0HXDZh/TKHXwdDlsv5HyVSeR/:Epd/aX+t9w8av13D7/TK3nYR
Malware Config
Extracted
systembc
admex1955x.xyz:4044
servx2785x.xyz:4044
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
cgmgaq.execgmgaq.exepid process 2072 cgmgaq.exe 3996 cgmgaq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run 835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe'\"" 835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cgmgaq.exedescription pid process target process PID 2072 set thread context of 3996 2072 cgmgaq.exe cgmgaq.exe -
Drops file in Windows directory 1 IoCs
Processes:
835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exedescription ioc process File created C:\Windows\Tasks\wecosannqqvdppttxgs.job 835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
cgmgaq.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cgmgaq.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cgmgaq.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cgmgaq.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cgmgaq.exepid process 3996 cgmgaq.exe 3996 cgmgaq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cgmgaq.exedescription pid process target process PID 2072 wrote to memory of 3996 2072 cgmgaq.exe cgmgaq.exe PID 2072 wrote to memory of 3996 2072 cgmgaq.exe cgmgaq.exe PID 2072 wrote to memory of 3996 2072 cgmgaq.exe cgmgaq.exe PID 2072 wrote to memory of 3996 2072 cgmgaq.exe cgmgaq.exe PID 2072 wrote to memory of 3996 2072 cgmgaq.exe cgmgaq.exe PID 2072 wrote to memory of 3996 2072 cgmgaq.exe cgmgaq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe"C:\Users\Admin\AppData\Local\Temp\835089cc52af94cdcdf26ab335f8a4fe4719071746539acf472579fa2fc8e4f9.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\cgmgaq.exeC:\Users\Admin\AppData\Local\Temp\cgmgaq.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cgmgaq.exeC:\Users\Admin\AppData\Local\Temp\cgmgaq.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cgmgaq.exeFilesize
248KB
MD5b7a27f7fb7e89d794ae09acbfed3745a
SHA1aaa6004d82ef20fbd8f19859cf1dc738a90234b1
SHA256757b0254c3a04feabe3c7866f59e522bd8c8b0fa5c51d7f8d2cf61a298d4f6bd
SHA512be61ed786ce3ae62efd012f3c76d9be6761e3fdd03709737b0b0ed546c6b5301ce5c786372305766cae28ad20208ab11799ae5a3a81554270e6f7dcbec97f3e9
-
C:\Users\Admin\AppData\Local\Temp\cgmgaq.exeFilesize
248KB
MD5b7a27f7fb7e89d794ae09acbfed3745a
SHA1aaa6004d82ef20fbd8f19859cf1dc738a90234b1
SHA256757b0254c3a04feabe3c7866f59e522bd8c8b0fa5c51d7f8d2cf61a298d4f6bd
SHA512be61ed786ce3ae62efd012f3c76d9be6761e3fdd03709737b0b0ed546c6b5301ce5c786372305766cae28ad20208ab11799ae5a3a81554270e6f7dcbec97f3e9
-
C:\Users\Admin\AppData\Local\Temp\cgmgaq.exeFilesize
248KB
MD5b7a27f7fb7e89d794ae09acbfed3745a
SHA1aaa6004d82ef20fbd8f19859cf1dc738a90234b1
SHA256757b0254c3a04feabe3c7866f59e522bd8c8b0fa5c51d7f8d2cf61a298d4f6bd
SHA512be61ed786ce3ae62efd012f3c76d9be6761e3fdd03709737b0b0ed546c6b5301ce5c786372305766cae28ad20208ab11799ae5a3a81554270e6f7dcbec97f3e9
-
memory/2072-143-0x0000000000A90000-0x0000000000A99000-memory.dmpFilesize
36KB
-
memory/3996-141-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3996-144-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3996-146-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4220-116-0x0000000000A10000-0x0000000000A25000-memory.dmpFilesize
84KB
-
memory/4220-117-0x0000000000AC0000-0x0000000000AC5000-memory.dmpFilesize
20KB
-
memory/4220-118-0x0000000000400000-0x0000000000924000-memory.dmpFilesize
5.1MB