Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
7a33f13cab7536657d3e8c34d.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
7a33f13cab7536657d3e8c34d.exe
Resource
win10v2004-20230621-en
General
-
Target
7a33f13cab7536657d3e8c34d.exe
-
Size
293KB
-
MD5
e858e636547aa1dff328554f5750cb37
-
SHA1
a96483d7314414755ae9f89e389843ae35d3fece
-
SHA256
7a33f13cab7536657d3e8c34d5d59b6f4eec7b479f1e852fe675b518e4138222
-
SHA512
4f95096a29614c6c3b9096fc75ea24aca2e92d619888094a942832d637df9dd55ae1eaa98df37cf3c3d57ad5d633267d019a29cf8f165f09ec4f647981656c30
-
SSDEEP
1536:duFYySyPIYf3HJRow8Fj7Mt75kwhE7rRAnqQWbL9xRaFgYbsMSu6PZ0LUW14jm7D:sFPziw8tG5sHK6FxRaFgMb
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 3192 2748 7a33f13cab7536657d3e8c34d.exe 86 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7a33f13cab7536657d3e8c34d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7a33f13cab7536657d3e8c34d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7a33f13cab7536657d3e8c34d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3192 7a33f13cab7536657d3e8c34d.exe 3192 7a33f13cab7536657d3e8c34d.exe 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found 3216 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3216 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3192 7a33f13cab7536657d3e8c34d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3192 2748 7a33f13cab7536657d3e8c34d.exe 86 PID 2748 wrote to memory of 3192 2748 7a33f13cab7536657d3e8c34d.exe 86 PID 2748 wrote to memory of 3192 2748 7a33f13cab7536657d3e8c34d.exe 86 PID 2748 wrote to memory of 3192 2748 7a33f13cab7536657d3e8c34d.exe 86 PID 2748 wrote to memory of 3192 2748 7a33f13cab7536657d3e8c34d.exe 86 PID 2748 wrote to memory of 3192 2748 7a33f13cab7536657d3e8c34d.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a33f13cab7536657d3e8c34d.exe"C:\Users\Admin\AppData\Local\Temp\7a33f13cab7536657d3e8c34d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\7a33f13cab7536657d3e8c34d.exe"C:\Users\Admin\AppData\Local\Temp\7a33f13cab7536657d3e8c34d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3192
-