Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21-08-2023 18:18
Static task
static1
Behavioral task
behavioral1
Sample
7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe
Resource
win10-20230703-en
General
-
Target
7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe
-
Size
248KB
-
MD5
5cc4c10eededb8e1cf10f93748c1bbc1
-
SHA1
795fd81d693cdf57c84c65623036e738a0bdd5b0
-
SHA256
7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef
-
SHA512
7eb1ada63299f6514f80c31f221846c8d868d463c7b38575f3c1866a6e4d32df6596f4ec71e8f4f0c8c4249dd784b9daf0a0d0f172447eac7e8632f5d4de4c5b
-
SSDEEP
3072:xikZKLuW7P37DPheg1492ipmpS1vMcRh+tf5XEr9:5ZKL7P37DheAEp4S1EcRelEr
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3296 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 4244 ttgbwrd 1956 ttgbwrd -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4960 set thread context of 5108 4960 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 69 PID 4244 set thread context of 1956 4244 ttgbwrd 71 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5108 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 5108 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3296 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5108 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 1956 ttgbwrd -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4960 wrote to memory of 5108 4960 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 69 PID 4960 wrote to memory of 5108 4960 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 69 PID 4960 wrote to memory of 5108 4960 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 69 PID 4960 wrote to memory of 5108 4960 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 69 PID 4960 wrote to memory of 5108 4960 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 69 PID 4960 wrote to memory of 5108 4960 7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe 69 PID 4244 wrote to memory of 1956 4244 ttgbwrd 71 PID 4244 wrote to memory of 1956 4244 ttgbwrd 71 PID 4244 wrote to memory of 1956 4244 ttgbwrd 71 PID 4244 wrote to memory of 1956 4244 ttgbwrd 71 PID 4244 wrote to memory of 1956 4244 ttgbwrd 71 PID 4244 wrote to memory of 1956 4244 ttgbwrd 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe"C:\Users\Admin\AppData\Local\Temp\7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe"C:\Users\Admin\AppData\Local\Temp\7028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5108
-
-
C:\Users\Admin\AppData\Roaming\ttgbwrdC:\Users\Admin\AppData\Roaming\ttgbwrd1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Roaming\ttgbwrdC:\Users\Admin\AppData\Roaming\ttgbwrd2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:1956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD55cc4c10eededb8e1cf10f93748c1bbc1
SHA1795fd81d693cdf57c84c65623036e738a0bdd5b0
SHA2567028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef
SHA5127eb1ada63299f6514f80c31f221846c8d868d463c7b38575f3c1866a6e4d32df6596f4ec71e8f4f0c8c4249dd784b9daf0a0d0f172447eac7e8632f5d4de4c5b
-
Filesize
248KB
MD55cc4c10eededb8e1cf10f93748c1bbc1
SHA1795fd81d693cdf57c84c65623036e738a0bdd5b0
SHA2567028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef
SHA5127eb1ada63299f6514f80c31f221846c8d868d463c7b38575f3c1866a6e4d32df6596f4ec71e8f4f0c8c4249dd784b9daf0a0d0f172447eac7e8632f5d4de4c5b
-
Filesize
248KB
MD55cc4c10eededb8e1cf10f93748c1bbc1
SHA1795fd81d693cdf57c84c65623036e738a0bdd5b0
SHA2567028754a2372837f2c2daf95f04359efdaa3d6d8826c0c59cfb187304d3ebeef
SHA5127eb1ada63299f6514f80c31f221846c8d868d463c7b38575f3c1866a6e4d32df6596f4ec71e8f4f0c8c4249dd784b9daf0a0d0f172447eac7e8632f5d4de4c5b