Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 12:23
Static task
static1
Behavioral task
behavioral1
Sample
a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe
Resource
win10v2004-20230621-en
General
-
Target
a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe
-
Size
319KB
-
MD5
85326f203daea8bc2130d1809bcb6b5c
-
SHA1
24077c1f68653d460c115be272906f5c4777192f
-
SHA256
a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a
-
SHA512
6970dc52fc42c7ca1104b20229f2d6d3f077a873b04d00f0a48ab5a8889fd16f3ad2fb33b311749c26d3cba9a333ec2712acf809052061ad7c46133cb0e4058a
-
SSDEEP
6144:NuLAX+WXLHBsVS5/Z2+LFECBUMHmRIXD3cAyjEvJEMrbO:A6+WX7Bsmk+LFtBUMGRmDMAyoh
Malware Config
Extracted
smokeloader
2023
Extracted
smokeloader
2022
http://c3g6gx853u6j.xyz/
http://04yh16065cdi.xyz/
http://33qd2w560vnx.xyz/
http://neriir0f76gr.com/
http://b4y08hrp3jdb.com/
http://swp6fbywla09.com/
http://7iqt53dr345u.com/
http://mj4aj8r55mho.com/
http://ne4ym7bjn1ts.com/
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2580 DA04.exe 2144 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" DA04.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 137 Go-http-client/1.1 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 412 a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe 412 a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3172 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 412 a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found 3172 Process not Found -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found Token: SeShutdownPrivilege 3172 Process not Found Token: SeCreatePagefilePrivilege 3172 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3172 Process not Found 3172 Process not Found -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2580 3172 Process not Found 99 PID 3172 wrote to memory of 2580 3172 Process not Found 99 PID 3172 wrote to memory of 2580 3172 Process not Found 99 PID 3172 wrote to memory of 5016 3172 Process not Found 100 PID 3172 wrote to memory of 5016 3172 Process not Found 100 PID 3172 wrote to memory of 5016 3172 Process not Found 100 PID 3172 wrote to memory of 5016 3172 Process not Found 100 PID 3172 wrote to memory of 4344 3172 Process not Found 101 PID 3172 wrote to memory of 4344 3172 Process not Found 101 PID 3172 wrote to memory of 4344 3172 Process not Found 101 PID 3172 wrote to memory of 4248 3172 Process not Found 102 PID 3172 wrote to memory of 4248 3172 Process not Found 102 PID 3172 wrote to memory of 4248 3172 Process not Found 102 PID 3172 wrote to memory of 4248 3172 Process not Found 102 PID 3172 wrote to memory of 1480 3172 Process not Found 103 PID 3172 wrote to memory of 1480 3172 Process not Found 103 PID 3172 wrote to memory of 1480 3172 Process not Found 103 PID 3172 wrote to memory of 4084 3172 Process not Found 105 PID 3172 wrote to memory of 4084 3172 Process not Found 105 PID 3172 wrote to memory of 4084 3172 Process not Found 105 PID 3172 wrote to memory of 4084 3172 Process not Found 105 PID 3172 wrote to memory of 2912 3172 Process not Found 106 PID 3172 wrote to memory of 2912 3172 Process not Found 106 PID 3172 wrote to memory of 2912 3172 Process not Found 106 PID 3172 wrote to memory of 2912 3172 Process not Found 106 PID 3172 wrote to memory of 4752 3172 Process not Found 107 PID 3172 wrote to memory of 4752 3172 Process not Found 107 PID 3172 wrote to memory of 4752 3172 Process not Found 107 PID 3172 wrote to memory of 4752 3172 Process not Found 107 PID 3172 wrote to memory of 3148 3172 Process not Found 109 PID 3172 wrote to memory of 3148 3172 Process not Found 109 PID 3172 wrote to memory of 3148 3172 Process not Found 109 PID 3172 wrote to memory of 3864 3172 Process not Found 110 PID 3172 wrote to memory of 3864 3172 Process not Found 110 PID 3172 wrote to memory of 3864 3172 Process not Found 110 PID 3172 wrote to memory of 3864 3172 Process not Found 110 PID 2580 wrote to memory of 2144 2580 DA04.exe 108 PID 2580 wrote to memory of 2144 2580 DA04.exe 108 PID 2580 wrote to memory of 2144 2580 DA04.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe"C:\Users\Admin\AppData\Local\Temp\a108cb7fb55413596c27e5c26ab7504de599e3887fc89270d0d3610ac3c81c7a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:412
-
C:\Users\Admin\AppData\Local\Temp\DA04.exeC:\Users\Admin\AppData\Local\Temp\DA04.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2144
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5016
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4344
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4248
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1480
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4084
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2912
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4752
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3148
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b109489b8bb8ca8d3c5381dd2969ddaf
SHA1d9579ddc7520d109cb04eb79e47effafb842134a
SHA256379b9ee5c7de68fe8174c3f6668b2629ef40df26dfbb472deee14dbb79cc8fa9
SHA512f967b83e22831b814f8ac92c5438af1c47b34321feda3b779ab65e70d8e8192ece86e4482d870b6fb37734fa689f10652ff57ab71388988f71a15290772557ac
-
Filesize
1.9MB
MD5b109489b8bb8ca8d3c5381dd2969ddaf
SHA1d9579ddc7520d109cb04eb79e47effafb842134a
SHA256379b9ee5c7de68fe8174c3f6668b2629ef40df26dfbb472deee14dbb79cc8fa9
SHA512f967b83e22831b814f8ac92c5438af1c47b34321feda3b779ab65e70d8e8192ece86e4482d870b6fb37734fa689f10652ff57ab71388988f71a15290772557ac
-
Filesize
234.5MB
MD5003f8953af9f19437f4c3e5c3cff40e2
SHA1875dd0c8090d6c3f3a7905a25e8f3449af8a6e50
SHA2564875f43b385ef0e39dad8b025694565887f58df61f8d550b0a6040fbec92a2ee
SHA5122ed64d592e0a1dec32bd69f6d1310c0eab1725ea8315245053b55f79ff5a7cc3bd0b78efc81a52a5d68352c91c0a5b332e632506184d7b233a4d74778cb56103
-
Filesize
270.2MB
MD5d38872b59fc1b3a28ff497936cfbff83
SHA17ab4b7b9f32487e53d420f2cd5e7cc0728837012
SHA256ea14926d1bd42e01108a1a2004079fb916daebeaff35be08c8bd45d818fd9be3
SHA5124cf2340934f8072b6c484e1dc860f7bc39d8359ce98e87e8db8ad199132aa2ccba9461c2ff56dcd33c874763877fb2688ec22a6918a04aecab4c0fac81ac884c