Analysis
-
max time kernel
150s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2023 16:03
Static task
static1
Behavioral task
behavioral1
Sample
76d53f3883e30802c2411a12e.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
76d53f3883e30802c2411a12e.exe
Resource
win10v2004-20230703-en
General
-
Target
76d53f3883e30802c2411a12e.exe
-
Size
233KB
-
MD5
98e71a0d9b3d1c9c2e75f248129174bd
-
SHA1
1ce86ee6f5f3dc7fc475a713f08df849f01705ac
-
SHA256
76d53f3883e30802c2411a12e3ff46dfccac84c1e83c630fcf37236e585f883c
-
SHA512
82b2e6a9526c20701f01efe2644eb56f0e2c157114c5ee257787cd384faa01ee06afbb793fd0e5d204e35f10a1381acab943d2f65970680b8845c936cd66bd23
-
SSDEEP
3072:KG4Iaf3ETBK3cxDLUKuFz2P0E5Q7p87vD7TBrq/4:gjEECoKuh2MUQ7+
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1476 set thread context of 2180 1476 76d53f3883e30802c2411a12e.exe 27 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 76d53f3883e30802c2411a12e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 76d53f3883e30802c2411a12e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 76d53f3883e30802c2411a12e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 76d53f3883e30802c2411a12e.exe 2180 76d53f3883e30802c2411a12e.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2180 76d53f3883e30802c2411a12e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2180 1476 76d53f3883e30802c2411a12e.exe 27 PID 1476 wrote to memory of 2180 1476 76d53f3883e30802c2411a12e.exe 27 PID 1476 wrote to memory of 2180 1476 76d53f3883e30802c2411a12e.exe 27 PID 1476 wrote to memory of 2180 1476 76d53f3883e30802c2411a12e.exe 27 PID 1476 wrote to memory of 2180 1476 76d53f3883e30802c2411a12e.exe 27 PID 1476 wrote to memory of 2180 1476 76d53f3883e30802c2411a12e.exe 27 PID 1476 wrote to memory of 2180 1476 76d53f3883e30802c2411a12e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\76d53f3883e30802c2411a12e.exe"C:\Users\Admin\AppData\Local\Temp\76d53f3883e30802c2411a12e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\76d53f3883e30802c2411a12e.exe"C:\Users\Admin\AppData\Local\Temp\76d53f3883e30802c2411a12e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2180
-