Analysis
-
max time kernel
153s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 02:06
Static task
static1
Behavioral task
behavioral1
Sample
b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe
Resource
win10v2004-20230915-en
General
-
Target
b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe
-
Size
321KB
-
MD5
69571d8b5030df70fa48bd4ae9b51fb9
-
SHA1
a0f5ac47f33b8560f7a08c2774864c50386c29ea
-
SHA256
b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f
-
SHA512
12774fc2be7db6fb5437f00acc4f99b1f423b5df34d3fa5d5498a5e85361791514fb1911513a578742dbda728a38402d84f3cfbee94b3c753215c71a1c5a7821
-
SSDEEP
3072:kjEx0qhF76kmDTVXvqgkpFyhiK1jagLGh8aAlcYU7T1T7C4X7LcrtxdB:oExhhV6kmDTV/qDyrjaR8XJ8T1TFq
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1348 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2680 iihfaha 2744 iihfaha -
Loads dropped DLL 1 IoCs
pid Process 2680 iihfaha -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2544 set thread context of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2680 set thread context of 2744 2680 iihfaha 33 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iihfaha Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iihfaha Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iihfaha Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 2052 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found 1348 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1348 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2052 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 2744 iihfaha -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2544 wrote to memory of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2544 wrote to memory of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2544 wrote to memory of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2544 wrote to memory of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2544 wrote to memory of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2544 wrote to memory of 2052 2544 b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe 28 PID 2304 wrote to memory of 2680 2304 taskeng.exe 32 PID 2304 wrote to memory of 2680 2304 taskeng.exe 32 PID 2304 wrote to memory of 2680 2304 taskeng.exe 32 PID 2304 wrote to memory of 2680 2304 taskeng.exe 32 PID 2680 wrote to memory of 2744 2680 iihfaha 33 PID 2680 wrote to memory of 2744 2680 iihfaha 33 PID 2680 wrote to memory of 2744 2680 iihfaha 33 PID 2680 wrote to memory of 2744 2680 iihfaha 33 PID 2680 wrote to memory of 2744 2680 iihfaha 33 PID 2680 wrote to memory of 2744 2680 iihfaha 33 PID 2680 wrote to memory of 2744 2680 iihfaha 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe"C:\Users\Admin\AppData\Local\Temp\b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe"C:\Users\Admin\AppData\Local\Temp\b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2052
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {445A41D0-72B3-42AC-A7A2-49835778EFAC} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\iihfahaC:\Users\Admin\AppData\Roaming\iihfaha2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\iihfahaC:\Users\Admin\AppData\Roaming\iihfaha3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD569571d8b5030df70fa48bd4ae9b51fb9
SHA1a0f5ac47f33b8560f7a08c2774864c50386c29ea
SHA256b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f
SHA51212774fc2be7db6fb5437f00acc4f99b1f423b5df34d3fa5d5498a5e85361791514fb1911513a578742dbda728a38402d84f3cfbee94b3c753215c71a1c5a7821
-
Filesize
321KB
MD569571d8b5030df70fa48bd4ae9b51fb9
SHA1a0f5ac47f33b8560f7a08c2774864c50386c29ea
SHA256b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f
SHA51212774fc2be7db6fb5437f00acc4f99b1f423b5df34d3fa5d5498a5e85361791514fb1911513a578742dbda728a38402d84f3cfbee94b3c753215c71a1c5a7821
-
Filesize
321KB
MD569571d8b5030df70fa48bd4ae9b51fb9
SHA1a0f5ac47f33b8560f7a08c2774864c50386c29ea
SHA256b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f
SHA51212774fc2be7db6fb5437f00acc4f99b1f423b5df34d3fa5d5498a5e85361791514fb1911513a578742dbda728a38402d84f3cfbee94b3c753215c71a1c5a7821
-
Filesize
321KB
MD569571d8b5030df70fa48bd4ae9b51fb9
SHA1a0f5ac47f33b8560f7a08c2774864c50386c29ea
SHA256b351eec5ba7867286296879d049320b0fbed7200fba224236c5bdd40d688fd8f
SHA51212774fc2be7db6fb5437f00acc4f99b1f423b5df34d3fa5d5498a5e85361791514fb1911513a578742dbda728a38402d84f3cfbee94b3c753215c71a1c5a7821