Analysis
-
max time kernel
41s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:20
Static task
static1
Behavioral task
behavioral1
Sample
e1d04ea9b2999651b365830ab57ff89d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e1d04ea9b2999651b365830ab57ff89d.exe
Resource
win10v2004-20230915-en
General
-
Target
e1d04ea9b2999651b365830ab57ff89d.exe
-
Size
246KB
-
MD5
e1d04ea9b2999651b365830ab57ff89d
-
SHA1
7fc1f5a92e66620e66e8d4d0f17704040d879a95
-
SHA256
e70377f317976aa7fa721c3c2e0b6f9e14169cd16ac11c85f18aefba6f13548a
-
SHA512
c6f6dd3eadef96588a0d42ed1dced6894093d3fe017084b088a176a5d50379ea2eb1cad2ccff04d057258b54d28b3f113a9b528c12b012c3c204a8623b26c803
-
SSDEEP
6144:WXz4SHy5uoBMFGV5PEkIXEHvZAOvRpnXVs0BC+:vCmuoBMUOMxh1s0BC+
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 3200 DA43.exe 2412 EF24.exe 744 F80E.bat 1652 FD4F.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2396 set thread context of 2784 2396 e1d04ea9b2999651b365830ab57ff89d.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 3396 2396 WerFault.exe 84 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2784 AppLaunch.exe 2784 AppLaunch.exe 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found 412 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2784 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 412 Process not Found Token: SeCreatePagefilePrivilege 412 Process not Found Token: SeShutdownPrivilege 412 Process not Found Token: SeCreatePagefilePrivilege 412 Process not Found Token: SeShutdownPrivilege 412 Process not Found Token: SeCreatePagefilePrivilege 412 Process not Found Token: SeShutdownPrivilege 412 Process not Found Token: SeCreatePagefilePrivilege 412 Process not Found Token: SeShutdownPrivilege 412 Process not Found Token: SeCreatePagefilePrivilege 412 Process not Found -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2784 2396 e1d04ea9b2999651b365830ab57ff89d.exe 88 PID 2396 wrote to memory of 2784 2396 e1d04ea9b2999651b365830ab57ff89d.exe 88 PID 2396 wrote to memory of 2784 2396 e1d04ea9b2999651b365830ab57ff89d.exe 88 PID 2396 wrote to memory of 2784 2396 e1d04ea9b2999651b365830ab57ff89d.exe 88 PID 2396 wrote to memory of 2784 2396 e1d04ea9b2999651b365830ab57ff89d.exe 88 PID 2396 wrote to memory of 2784 2396 e1d04ea9b2999651b365830ab57ff89d.exe 88 PID 412 wrote to memory of 3200 412 Process not Found 94 PID 412 wrote to memory of 3200 412 Process not Found 94 PID 412 wrote to memory of 3200 412 Process not Found 94 PID 412 wrote to memory of 2412 412 Process not Found 95 PID 412 wrote to memory of 2412 412 Process not Found 95 PID 412 wrote to memory of 2412 412 Process not Found 95 PID 412 wrote to memory of 744 412 Process not Found 97 PID 412 wrote to memory of 744 412 Process not Found 97 PID 412 wrote to memory of 744 412 Process not Found 97 PID 412 wrote to memory of 1652 412 Process not Found 99 PID 412 wrote to memory of 1652 412 Process not Found 99 PID 412 wrote to memory of 1652 412 Process not Found 99 PID 2412 wrote to memory of 4136 2412 EF24.exe 100 PID 2412 wrote to memory of 4136 2412 EF24.exe 100 PID 2412 wrote to memory of 4136 2412 EF24.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1d04ea9b2999651b365830ab57ff89d.exe"C:\Users\Admin\AppData\Local\Temp\e1d04ea9b2999651b365830ab57ff89d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 1482⤵
- Program crash
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2396 -ip 23961⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\DA43.exeC:\Users\Admin\AppData\Local\Temp\DA43.exe1⤵
- Executes dropped EXE
PID:3200
-
C:\Users\Admin\AppData\Local\Temp\EF24.exeC:\Users\Admin\AppData\Local\Temp\EF24.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4136
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\F80E.bat"C:\Users\Admin\AppData\Local\Temp\F80E.bat"1⤵
- Executes dropped EXE
PID:744
-
C:\Users\Admin\AppData\Local\Temp\FD4F.exeC:\Users\Admin\AppData\Local\Temp\FD4F.exe1⤵
- Executes dropped EXE
PID:1652
-
C:\Users\Admin\AppData\Local\Temp\31C.exeC:\Users\Admin\AppData\Local\Temp\31C.exe1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD511e55586a1c9957b5ef1ca8eae7eb1d1
SHA1fa8390c9662d22223eca762e4cc923379073c942
SHA25688ad234ee3b3259a7f9260b8939f12199dac6cf9e75c39764093455bcb8431b2
SHA51212ef1f3c9f45eb7047aa3e1a38df3a6f729deb07b832eda59c1eeba52a85cb86ae0502fc01d19d7514817eff7cee2cb1bafc043feb65c86fc6f00fc99ee4abfe
-
Filesize
1.3MB
MD511e55586a1c9957b5ef1ca8eae7eb1d1
SHA1fa8390c9662d22223eca762e4cc923379073c942
SHA25688ad234ee3b3259a7f9260b8939f12199dac6cf9e75c39764093455bcb8431b2
SHA51212ef1f3c9f45eb7047aa3e1a38df3a6f729deb07b832eda59c1eeba52a85cb86ae0502fc01d19d7514817eff7cee2cb1bafc043feb65c86fc6f00fc99ee4abfe
-
Filesize
407KB
MD59634c504f71e61702400626e6bf08115
SHA12a43a748891053653f4e6f086e8cdad9d0427e14
SHA256624523de4ca9e421e57cfeb51ef243a32a469ab547ab884e0db3befe6383fa7b
SHA512c9f2891fc451d63cf3070abe4e64b10ca3e65bc92cf4733f7f9d455b8810e558cafdf38345166ba098580e61bcf265a0193abbdfb793eb42c17e3b2d55dfcbd2
-
Filesize
407KB
MD59634c504f71e61702400626e6bf08115
SHA12a43a748891053653f4e6f086e8cdad9d0427e14
SHA256624523de4ca9e421e57cfeb51ef243a32a469ab547ab884e0db3befe6383fa7b
SHA512c9f2891fc451d63cf3070abe4e64b10ca3e65bc92cf4733f7f9d455b8810e558cafdf38345166ba098580e61bcf265a0193abbdfb793eb42c17e3b2d55dfcbd2
-
Filesize
97KB
MD53039dc5c244eb1d05d148d7a8564762c
SHA1389e4b3dd42508514ab9ed6e036cccd76a1832ba
SHA256768d0f7284c83bf2136191453781945d95cc5432a21c8b2548f09f8f838e194e
SHA51267d3d9fe5191c611f3cdbf883b54a06c249a6fe9bc35afceaa08a4c2a1c0058781794435e14b19dd4d0ef4481af01a266f7814eabee90d4fc2706b9ba493457d
-
Filesize
97KB
MD53039dc5c244eb1d05d148d7a8564762c
SHA1389e4b3dd42508514ab9ed6e036cccd76a1832ba
SHA256768d0f7284c83bf2136191453781945d95cc5432a21c8b2548f09f8f838e194e
SHA51267d3d9fe5191c611f3cdbf883b54a06c249a6fe9bc35afceaa08a4c2a1c0058781794435e14b19dd4d0ef4481af01a266f7814eabee90d4fc2706b9ba493457d
-
Filesize
463KB
MD534a2f8f4d5572b4f6a20ab4d8f31f520
SHA191d3a6e057299e9158c931429c9a08a52b550b6d
SHA256dcc05d8f34d776cf2257fa68096df5708fe6f2c4c4aa63bcd7e424a4c8d75d2a
SHA51235a8b506e0fd966027c4cc9c936a0a45b26ca1423afda3124e0f9d0dd43bb46a4ba8ca31ffef0180a5285d98c0b21f1f1f7b3fac60f6328d4c32b8e143691197
-
Filesize
463KB
MD534a2f8f4d5572b4f6a20ab4d8f31f520
SHA191d3a6e057299e9158c931429c9a08a52b550b6d
SHA256dcc05d8f34d776cf2257fa68096df5708fe6f2c4c4aa63bcd7e424a4c8d75d2a
SHA51235a8b506e0fd966027c4cc9c936a0a45b26ca1423afda3124e0f9d0dd43bb46a4ba8ca31ffef0180a5285d98c0b21f1f1f7b3fac60f6328d4c32b8e143691197