Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
06/10/2023, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe
Resource
win10-20230915-en
General
-
Target
ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe
-
Size
293KB
-
MD5
fd8894c45fade2fa27b964affcb0f293
-
SHA1
2a72eeffbc496233f9eec7167ff0c74b828c4e20
-
SHA256
ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193
-
SHA512
cc2a3e7279442c595260078563ecfeda37f8a45bbe91b23a9a413d4fd2f8fdfb80ce8fccaea4fac54fcc2675d290a0dba6453f587689b144c95f744c679b81cd
-
SSDEEP
3072:Gz+UbYSifIDlUSMpqjWutafGXypDsfO8Ozp9fSSd1Tot:8PYpfIOKKgakKDsxO3NTo
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3212 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 600 set thread context of 1076 600 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 70 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 1076 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found 3212 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3212 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1076 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3212 Process not Found Token: SeCreatePagefilePrivilege 3212 Process not Found Token: SeShutdownPrivilege 3212 Process not Found Token: SeCreatePagefilePrivilege 3212 Process not Found Token: SeShutdownPrivilege 3212 Process not Found Token: SeCreatePagefilePrivilege 3212 Process not Found Token: SeShutdownPrivilege 3212 Process not Found Token: SeCreatePagefilePrivilege 3212 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 600 wrote to memory of 1076 600 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 70 PID 600 wrote to memory of 1076 600 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 70 PID 600 wrote to memory of 1076 600 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 70 PID 600 wrote to memory of 1076 600 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 70 PID 600 wrote to memory of 1076 600 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 70 PID 600 wrote to memory of 1076 600 ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe 70 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe"C:\Users\Admin\AppData\Local\Temp\ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\Temp\ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe"C:\Users\Admin\AppData\Local\Temp\ee016d52e39688670944b58a33a11545254d3c8f8b6813d59992138738349193.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1076
-