Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2023 16:28
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe
-
Size
287KB
-
MD5
4cd8e260c417673f17f86edd315ff061
-
SHA1
af5889b3421b09f80a738aa36f627646f6cc2423
-
SHA256
b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0
-
SHA512
de2f1795605a12a5950ae6918fae5d831464e9d4d21b58658c47877c7de20cb234dd1c8646ff4d10cdf47ef9e13ecf12341e4ff9d4e1f17fdca9dde2a9374960
-
SSDEEP
3072:iGcS5tv/qtTBWbgI/Teq+v0fj6meCx9OeqejQ0oVS+/a9:iw5tn6WcuTeqpNF
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
pid Process 3820 thfhdve 3568 thfhdve -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 208 set thread context of 2792 208 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 86 PID 3820 set thread context of 3568 3820 thfhdve 100 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI thfhdve Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI thfhdve Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI thfhdve Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2792 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 2792 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found 3148 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2792 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 3568 thfhdve -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3148 Process not Found Token: SeCreatePagefilePrivilege 3148 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3148 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 208 wrote to memory of 2792 208 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 86 PID 208 wrote to memory of 2792 208 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 86 PID 208 wrote to memory of 2792 208 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 86 PID 208 wrote to memory of 2792 208 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 86 PID 208 wrote to memory of 2792 208 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 86 PID 208 wrote to memory of 2792 208 NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe 86 PID 3820 wrote to memory of 3568 3820 thfhdve 100 PID 3820 wrote to memory of 3568 3820 thfhdve 100 PID 3820 wrote to memory of 3568 3820 thfhdve 100 PID 3820 wrote to memory of 3568 3820 thfhdve 100 PID 3820 wrote to memory of 3568 3820 thfhdve 100 PID 3820 wrote to memory of 3568 3820 thfhdve 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0_JC.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\thfhdveC:\Users\Admin\AppData\Roaming\thfhdve1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Roaming\thfhdveC:\Users\Admin\AppData\Roaming\thfhdve2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD54cd8e260c417673f17f86edd315ff061
SHA1af5889b3421b09f80a738aa36f627646f6cc2423
SHA256b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0
SHA512de2f1795605a12a5950ae6918fae5d831464e9d4d21b58658c47877c7de20cb234dd1c8646ff4d10cdf47ef9e13ecf12341e4ff9d4e1f17fdca9dde2a9374960
-
Filesize
287KB
MD54cd8e260c417673f17f86edd315ff061
SHA1af5889b3421b09f80a738aa36f627646f6cc2423
SHA256b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0
SHA512de2f1795605a12a5950ae6918fae5d831464e9d4d21b58658c47877c7de20cb234dd1c8646ff4d10cdf47ef9e13ecf12341e4ff9d4e1f17fdca9dde2a9374960
-
Filesize
287KB
MD54cd8e260c417673f17f86edd315ff061
SHA1af5889b3421b09f80a738aa36f627646f6cc2423
SHA256b743e97b67d7c8a8d8363cd63cd0fee42e5b45c2d5f0633479d0a387dbb5e8b0
SHA512de2f1795605a12a5950ae6918fae5d831464e9d4d21b58658c47877c7de20cb234dd1c8646ff4d10cdf47ef9e13ecf12341e4ff9d4e1f17fdca9dde2a9374960