Analysis
-
max time kernel
300s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-08-2023 04:05
Static task
static1
Behavioral task
behavioral1
Sample
db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe
Resource
win10-20230703-en
General
-
Target
db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe
-
Size
248KB
-
MD5
0463b8abe1f537979c3124ea6d948164
-
SHA1
a16b47f1e3986173df3f5a57ce8eb8a16a50903e
-
SHA256
db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211
-
SHA512
fbf4394335447bc9f524356ceab7a8d5b35f3b89537093e552ffe83647aefe4a7f4299dea5e38ca57a0ef1e11125af84ab2fc713173e720b791b84de534192bd
-
SSDEEP
3072:qeYZCLSWRH37DR+Cs7QxxcayGQFW4lb7TtGQ5L1lFTXeM5XpQEtF:YZCL9H37fs7QAzNFrbnMWL1lFTXpX
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1208 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2812 sgbwrct 2036 sgbwrct -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1860 set thread context of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 2812 set thread context of 2036 2812 sgbwrct 33 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 2608 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2608 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 2036 sgbwrct -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1208 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 1860 wrote to memory of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 1860 wrote to memory of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 1860 wrote to memory of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 1860 wrote to memory of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 1860 wrote to memory of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 1860 wrote to memory of 2608 1860 db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe 28 PID 2644 wrote to memory of 2812 2644 taskeng.exe 32 PID 2644 wrote to memory of 2812 2644 taskeng.exe 32 PID 2644 wrote to memory of 2812 2644 taskeng.exe 32 PID 2644 wrote to memory of 2812 2644 taskeng.exe 32 PID 2812 wrote to memory of 2036 2812 sgbwrct 33 PID 2812 wrote to memory of 2036 2812 sgbwrct 33 PID 2812 wrote to memory of 2036 2812 sgbwrct 33 PID 2812 wrote to memory of 2036 2812 sgbwrct 33 PID 2812 wrote to memory of 2036 2812 sgbwrct 33 PID 2812 wrote to memory of 2036 2812 sgbwrct 33 PID 2812 wrote to memory of 2036 2812 sgbwrct 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe"C:\Users\Admin\AppData\Local\Temp\db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe"C:\Users\Admin\AppData\Local\Temp\db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2608
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FA161D53-F0DF-47A9-8AA6-E3D63816CD2B} S-1-5-21-377084978-2088738870-2818360375-1000:DSWJWADP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\sgbwrctC:\Users\Admin\AppData\Roaming\sgbwrct2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\sgbwrctC:\Users\Admin\AppData\Roaming\sgbwrct3⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:2036
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD50463b8abe1f537979c3124ea6d948164
SHA1a16b47f1e3986173df3f5a57ce8eb8a16a50903e
SHA256db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211
SHA512fbf4394335447bc9f524356ceab7a8d5b35f3b89537093e552ffe83647aefe4a7f4299dea5e38ca57a0ef1e11125af84ab2fc713173e720b791b84de534192bd
-
Filesize
248KB
MD50463b8abe1f537979c3124ea6d948164
SHA1a16b47f1e3986173df3f5a57ce8eb8a16a50903e
SHA256db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211
SHA512fbf4394335447bc9f524356ceab7a8d5b35f3b89537093e552ffe83647aefe4a7f4299dea5e38ca57a0ef1e11125af84ab2fc713173e720b791b84de534192bd
-
Filesize
248KB
MD50463b8abe1f537979c3124ea6d948164
SHA1a16b47f1e3986173df3f5a57ce8eb8a16a50903e
SHA256db7882a8a9fad086f7b4d9ff145fd9133790e01ff39c4de5493437a43fc5b211
SHA512fbf4394335447bc9f524356ceab7a8d5b35f3b89537093e552ffe83647aefe4a7f4299dea5e38ca57a0ef1e11125af84ab2fc713173e720b791b84de534192bd