Malware Analysis Report

2025-08-10 17:40

Sample ID 230916-qs7w9sdf47
Target 9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe
SHA256 9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb
Tags
smokeloader pub1 backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb

Threat Level: Known bad

The file 9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe was found to be: Known bad.

Malicious Activity Summary

smokeloader pub1 backdoor trojan

SmokeLoader

Deletes itself

Unsigned PE

Checks SCSI registry key(s)

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: MapViewOfSection

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-09-16 13:32

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-16 13:32

Reported

2023-09-16 13:35

Platform

win7-20230831-en

Max time kernel

150s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Deletes itself

Description Indicator Process Target
N/A N/A N/A N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe

"C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gudintas.at udp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp
MX 189.232.123.108:80 gudintas.at tcp

Files

memory/1648-3-0x0000000000400000-0x0000000000711000-memory.dmp

memory/1648-2-0x0000000000220000-0x0000000000229000-memory.dmp

memory/1648-1-0x00000000008A0000-0x00000000009A0000-memory.dmp

memory/1208-4-0x0000000002B80000-0x0000000002B96000-memory.dmp

memory/1648-5-0x0000000000400000-0x0000000000711000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-09-16 13:32

Reported

2023-09-16 13:35

Platform

win10v2004-20230915-en

Max time kernel

151s

Max time network

133s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Checks SCSI registry key(s)

Description Indicator Process Target
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe

"C:\Users\Admin\AppData\Local\Temp\9e7c8aea93412acc8d8de3a956e8485a86caf40c626b2abd491bd5404df1bfbb_JC.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 gudintas.at udp
KR 210.182.29.70:80 gudintas.at tcp
US 8.8.8.8:53 70.29.182.210.in-addr.arpa udp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
US 8.8.8.8:53 240.81.21.72.in-addr.arpa udp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
KR 210.182.29.70:80 gudintas.at tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 11.173.189.20.in-addr.arpa udp

Files

memory/3456-1-0x0000000000A30000-0x0000000000B30000-memory.dmp

memory/3456-2-0x0000000000400000-0x0000000000711000-memory.dmp

memory/3456-3-0x00000000009C0000-0x00000000009C9000-memory.dmp

memory/3240-4-0x0000000001310000-0x0000000001326000-memory.dmp

memory/3456-5-0x0000000000400000-0x0000000000711000-memory.dmp

memory/3240-11-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-13-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-12-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-14-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-15-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-16-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-17-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-19-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-22-0x0000000008C20000-0x0000000008C30000-memory.dmp

memory/3240-21-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-20-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-23-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-24-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-25-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-26-0x0000000008C20000-0x0000000008C30000-memory.dmp

memory/3240-27-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-29-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-31-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-30-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-33-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-35-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-36-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-37-0x0000000008C20000-0x0000000008C30000-memory.dmp

memory/3240-38-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-40-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-39-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-41-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-42-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-44-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-45-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-46-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-47-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-48-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-49-0x00000000077A0000-0x00000000077B0000-memory.dmp

memory/3240-50-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-51-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-52-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-53-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-54-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-56-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-59-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-58-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-60-0x00000000077B0000-0x00000000077C0000-memory.dmp

memory/3240-61-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-62-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-63-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-65-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-67-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-69-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-68-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-71-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-72-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-73-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-76-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-77-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-75-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-74-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-79-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-78-0x0000000008BF0000-0x0000000008C00000-memory.dmp

memory/3240-80-0x0000000008BF0000-0x0000000008C00000-memory.dmp