Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 16:31
Static task
static1
Behavioral task
behavioral1
Sample
2f3f9d5bf3901c8b739563dac.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2f3f9d5bf3901c8b739563dac.exe
Resource
win10v2004-20230703-en
General
-
Target
2f3f9d5bf3901c8b739563dac.exe
-
Size
232KB
-
MD5
2f3f9d5bf3901c8b739563daccf6b564
-
SHA1
6e5f3458712f56c6d09c8b590af31e80038d16b7
-
SHA256
954a8d78e97e2bb65568d4c5d692a2a9975a330eaa7fae20e4620d18ccbb5881
-
SHA512
b711d8e07fb99ff9dda011d49d2d5cae8a446a012d5ce17c1958bfd837405c3f87b3cf9d9eb118f13182289800b04499d8b4e456d46c47edce6bce87acacd5f6
-
SSDEEP
3072:3lAehY5NAN5dYLnjO0zhkOkw0Nr4wG+aTp24c+1d8o4jJFTqQU:VAgVYTthJkpk+R
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2f3f9d5bf3901c8b739563dac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2f3f9d5bf3901c8b739563dac.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2f3f9d5bf3901c8b739563dac.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4380 2f3f9d5bf3901c8b739563dac.exe 4380 2f3f9d5bf3901c8b739563dac.exe 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4380 2f3f9d5bf3901c8b739563dac.exe 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3340 3148 Process not Found 83 PID 3148 wrote to memory of 3340 3148 Process not Found 83 PID 3148 wrote to memory of 3340 3148 Process not Found 83 PID 3148 wrote to memory of 3340 3148 Process not Found 83 PID 3148 wrote to memory of 5072 3148 Process not Found 84 PID 3148 wrote to memory of 5072 3148 Process not Found 84 PID 3148 wrote to memory of 5072 3148 Process not Found 84 PID 3148 wrote to memory of 1128 3148 Process not Found 85 PID 3148 wrote to memory of 1128 3148 Process not Found 85 PID 3148 wrote to memory of 1128 3148 Process not Found 85 PID 3148 wrote to memory of 1128 3148 Process not Found 85 PID 3148 wrote to memory of 1336 3148 Process not Found 86 PID 3148 wrote to memory of 1336 3148 Process not Found 86 PID 3148 wrote to memory of 1336 3148 Process not Found 86 PID 3148 wrote to memory of 2468 3148 Process not Found 89 PID 3148 wrote to memory of 2468 3148 Process not Found 89 PID 3148 wrote to memory of 2468 3148 Process not Found 89 PID 3148 wrote to memory of 2468 3148 Process not Found 89 PID 3148 wrote to memory of 3452 3148 Process not Found 90 PID 3148 wrote to memory of 3452 3148 Process not Found 90 PID 3148 wrote to memory of 3452 3148 Process not Found 90 PID 3148 wrote to memory of 3452 3148 Process not Found 90 PID 3148 wrote to memory of 4528 3148 Process not Found 91 PID 3148 wrote to memory of 4528 3148 Process not Found 91 PID 3148 wrote to memory of 4528 3148 Process not Found 91 PID 3148 wrote to memory of 4528 3148 Process not Found 91 PID 3148 wrote to memory of 1944 3148 Process not Found 92 PID 3148 wrote to memory of 1944 3148 Process not Found 92 PID 3148 wrote to memory of 1944 3148 Process not Found 92 PID 3148 wrote to memory of 1048 3148 Process not Found 93 PID 3148 wrote to memory of 1048 3148 Process not Found 93 PID 3148 wrote to memory of 1048 3148 Process not Found 93 PID 3148 wrote to memory of 1048 3148 Process not Found 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3f9d5bf3901c8b739563dac.exe"C:\Users\Admin\AppData\Local\Temp\2f3f9d5bf3901c8b739563dac.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4380
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3340
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5072
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1128
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1336
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2468
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3452
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4528
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1944
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1048