Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05-08-2023 11:29
Behavioral task
behavioral1
Sample
6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe
-
Size
36KB
-
MD5
5fa3557102d4401a68eaf267dc293160
-
SHA1
8592aa9a803b3d8b68a71ede5e1fdf518754c859
-
SHA256
6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238ab
-
SHA512
d3ec8431c3fa7f14d5c06d9b48c642cad6b41d61f532a701228c054cca858a7a0e8161f259e81e1267b69e261869c3bd200aa9fcf28c6176b4abe3c2aec30fe2
-
SSDEEP
384:K9VD6tee+qUOTd2opQTLAdz1SvNmhpdvOjT7PbA6HBiTSnjxZMdP05ldpRMaYIBI:k6Qe+qUv8zcqdvOXA6XkPslJvGaVW
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1300 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 1632 hdrwuji -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe 2504 6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found 1300 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1300 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2504 6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe 1632 hdrwuji -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1300 Process not Found 1300 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1300 Process not Found 1300 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 1632 2744 taskeng.exe 31 PID 2744 wrote to memory of 1632 2744 taskeng.exe 31 PID 2744 wrote to memory of 1632 2744 taskeng.exe 31 PID 2744 wrote to memory of 1632 2744 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\6e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238abexe_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2504
-
C:\Windows\system32\taskeng.exetaskeng.exe {DAB9D5BC-2AC6-458C-9FBB-9D76FC1B2997} S-1-5-21-4159544280-4273523227-683900707-1000:UMAXQRGK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\hdrwujiC:\Users\Admin\AppData\Roaming\hdrwuji2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:1632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55fa3557102d4401a68eaf267dc293160
SHA18592aa9a803b3d8b68a71ede5e1fdf518754c859
SHA2566e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238ab
SHA512d3ec8431c3fa7f14d5c06d9b48c642cad6b41d61f532a701228c054cca858a7a0e8161f259e81e1267b69e261869c3bd200aa9fcf28c6176b4abe3c2aec30fe2
-
Filesize
36KB
MD55fa3557102d4401a68eaf267dc293160
SHA18592aa9a803b3d8b68a71ede5e1fdf518754c859
SHA2566e0d5486bbb74259d577fb0a9e6613d520d8da5531b7235401fb4adab3b238ab
SHA512d3ec8431c3fa7f14d5c06d9b48c642cad6b41d61f532a701228c054cca858a7a0e8161f259e81e1267b69e261869c3bd200aa9fcf28c6176b4abe3c2aec30fe2