Analysis
-
max time kernel
31s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe
Resource
win10v2004-20230915-en
General
-
Target
41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe
-
Size
247KB
-
MD5
5f571f750931935ed68417426d8ca586
-
SHA1
14dfbe8c4a05523b037af7357b41a444f9ebe700
-
SHA256
41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922
-
SHA512
da7e887450993cb2c76c840177751fe6902077850bae74df2176691ed8335a93b55d49ee97712dc48f85de7f04b84accb75fa59a94a6818a8b659434afd07964
-
SSDEEP
3072:CTpKbW/eTbo4KZ1iFXJdjT+paAmlYKAF2:lbW/eY4S1KXH+znK
Malware Config
Extracted
smokeloader
up4
Extracted
smokeloader
2020
http://host-file-file0.com/
http://file-file-file1.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3756 set thread context of 1728 3756 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 82 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2890696111-2332180956-3312704074-1000\{F85D04A3-FEB7-4D0E-B9EF-0AA74FE37321} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 1728 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found 3144 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1728 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3144 Process not Found Token: SeCreatePagefilePrivilege 3144 Process not Found Token: SeShutdownPrivilege 3996 explorer.exe Token: SeCreatePagefilePrivilege 3996 explorer.exe Token: SeShutdownPrivilege 3996 explorer.exe Token: SeCreatePagefilePrivilege 3996 explorer.exe Token: SeShutdownPrivilege 3996 explorer.exe Token: SeCreatePagefilePrivilege 3996 explorer.exe Token: SeShutdownPrivilege 3996 explorer.exe Token: SeCreatePagefilePrivilege 3996 explorer.exe Token: SeShutdownPrivilege 3996 explorer.exe Token: SeCreatePagefilePrivilege 3996 explorer.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe 3996 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3756 wrote to memory of 1728 3756 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 82 PID 3756 wrote to memory of 1728 3756 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 82 PID 3756 wrote to memory of 1728 3756 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 82 PID 3756 wrote to memory of 1728 3756 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 82 PID 3756 wrote to memory of 1728 3756 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 82 PID 3756 wrote to memory of 1728 3756 41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe"C:\Users\Admin\AppData\Local\Temp\41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe"C:\Users\Admin\AppData\Local\Temp\41bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1728
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3996
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:644
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1092
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1388
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4368
-
C:\Users\Admin\AppData\Roaming\rvghgwcC:\Users\Admin\AppData\Roaming\rvghgwc1⤵PID:4120
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4428
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD5ecc3c9de4f6c2909d80c9a355c58a995
SHA1205eb3c15c1e0338dee194e6b3de88fc61e8a503
SHA2562d8dd41275cee7e1fc715eaab2e020c74e4d4640c5c7b25db31aa3a98519b966
SHA5121e7138e5770573cf06796ffdd1811d9978c9d43dbfae2250c69b79b6a3b5d51b0f7e1e4c9fca5105629454586164e2c52b9624dbde93e21ebb69694a18a3bbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize412B
MD50ca43fd7111e8453842c30095c275320
SHA177e742cea30a118111a3a2bba9a82dd15fa731ed
SHA25615c9730f9f0f4cb0dd49000f2b97e7eb70a2949331e51b28581bd9d5edab0535
SHA5126d478058788f9015eb4728d18bb0fd8564684ba35b24f376d531a2f94b4f23ea7c9f7bc24b66b4de7fd7bb65d1edf9af071841c2101a056f4b7f269047362b62
-
Filesize
247KB
MD55f571f750931935ed68417426d8ca586
SHA114dfbe8c4a05523b037af7357b41a444f9ebe700
SHA25641bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922
SHA512da7e887450993cb2c76c840177751fe6902077850bae74df2176691ed8335a93b55d49ee97712dc48f85de7f04b84accb75fa59a94a6818a8b659434afd07964
-
Filesize
247KB
MD55f571f750931935ed68417426d8ca586
SHA114dfbe8c4a05523b037af7357b41a444f9ebe700
SHA25641bbe0bbf7897cf38ccccd701d9cf5c5bfc36b4ba9e519324c03e9d70fb12922
SHA512da7e887450993cb2c76c840177751fe6902077850bae74df2176691ed8335a93b55d49ee97712dc48f85de7f04b84accb75fa59a94a6818a8b659434afd07964