Analysis
-
max time kernel
300s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
01/07/2023, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe
Resource
win10-20230621-en
General
-
Target
81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe
-
Size
302KB
-
MD5
fb1d011a8fb404470f23e4b67ffa2b5c
-
SHA1
97474aa850c1557b3ab72e62d93e3b2595470be8
-
SHA256
81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7
-
SHA512
a25eca4a1fa3b6a69b5af620e81e74d8727ce7e13dc8fb20ecf13e3aaf8e3df14881da06d11e47f47b53fc76d9a982b8a6c51d8074fb2b7f4f2fd42bce1553e8
-
SSDEEP
3072:+1fRH9XTXv7FyVvLT2Vt3lLX6tGxMctxF4VXS1EMVgMg2W5DMc6ryTA:8ZH9jXoNCTt44pTuA5wMxryT
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3244 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4228 set thread context of 4248 4228 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 66 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4248 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 4248 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found 3244 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3244 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4248 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3244 Process not Found Token: SeCreatePagefilePrivilege 3244 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4228 wrote to memory of 4248 4228 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 66 PID 4228 wrote to memory of 4248 4228 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 66 PID 4228 wrote to memory of 4248 4228 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 66 PID 4228 wrote to memory of 4248 4228 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 66 PID 4228 wrote to memory of 4248 4228 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 66 PID 4228 wrote to memory of 4248 4228 81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe"C:\Users\Admin\AppData\Local\Temp\81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe"C:\Users\Admin\AppData\Local\Temp\81715fbf292d109c91aa87583ea0a19c46e489311498119a1b7c37249fda4ce7.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4248
-