Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 21:33
Static task
static1
Behavioral task
behavioral1
Sample
b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe
Resource
win10v2004-20230915-en
General
-
Target
b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe
-
Size
268KB
-
MD5
1a32b483f1e2bea874f739753ee2f660
-
SHA1
a967c5efee45bacd09ec4b661eb39871c9a36789
-
SHA256
b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c
-
SHA512
b804123cdf4ab07ff4694e8b5e44719e899b18fcbdbc1cb6625027785f927be6df16426ed22de5f911edbaa364a28d88d3f8e3cfa2f5db5b84a9f20adf79619c
-
SSDEEP
3072:T/E/QMmXj/mpf5EbJKGnohmo827UobSWy3wTj2E5h6cccN/ZZ:w/+Xj/mR5IJamd2A7Wy3w/vf
Malware Config
Extracted
smokeloader
up4
Extracted
smokeloader
2020
http://host-file-file0.com/
http://file-file-file1.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1276 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 1628 ssfftbh 1516 ssfftbh -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2080 set thread context of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 1628 set thread context of 1516 1628 ssfftbh 35 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ssfftbh Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ssfftbh Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ssfftbh Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 3004 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found 1276 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1276 Process not Found 2644 explorer.exe 2852 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3004 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 1516 ssfftbh -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2644 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2644 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 2080 wrote to memory of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 2080 wrote to memory of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 2080 wrote to memory of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 2080 wrote to memory of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 2080 wrote to memory of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 2080 wrote to memory of 3004 2080 b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe 28 PID 2472 wrote to memory of 1628 2472 taskeng.exe 34 PID 2472 wrote to memory of 1628 2472 taskeng.exe 34 PID 2472 wrote to memory of 1628 2472 taskeng.exe 34 PID 2472 wrote to memory of 1628 2472 taskeng.exe 34 PID 1628 wrote to memory of 1516 1628 ssfftbh 35 PID 1628 wrote to memory of 1516 1628 ssfftbh 35 PID 1628 wrote to memory of 1516 1628 ssfftbh 35 PID 1628 wrote to memory of 1516 1628 ssfftbh 35 PID 1628 wrote to memory of 1516 1628 ssfftbh 35 PID 1628 wrote to memory of 1516 1628 ssfftbh 35 PID 1628 wrote to memory of 1516 1628 ssfftbh 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe"C:\Users\Admin\AppData\Local\Temp\b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe"C:\Users\Admin\AppData\Local\Temp\b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3004
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2644
-
C:\Windows\system32\taskeng.exetaskeng.exe {2B40C50C-0180-48BD-B662-C767DA1780D3} S-1-5-21-3849525425-30183055-657688904-1000:KGPMNUDG\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\ssfftbhC:\Users\Admin\AppData\Roaming\ssfftbh2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\ssfftbhC:\Users\Admin\AppData\Roaming\ssfftbh3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1516
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD51a32b483f1e2bea874f739753ee2f660
SHA1a967c5efee45bacd09ec4b661eb39871c9a36789
SHA256b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c
SHA512b804123cdf4ab07ff4694e8b5e44719e899b18fcbdbc1cb6625027785f927be6df16426ed22de5f911edbaa364a28d88d3f8e3cfa2f5db5b84a9f20adf79619c
-
Filesize
268KB
MD51a32b483f1e2bea874f739753ee2f660
SHA1a967c5efee45bacd09ec4b661eb39871c9a36789
SHA256b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c
SHA512b804123cdf4ab07ff4694e8b5e44719e899b18fcbdbc1cb6625027785f927be6df16426ed22de5f911edbaa364a28d88d3f8e3cfa2f5db5b84a9f20adf79619c
-
Filesize
268KB
MD51a32b483f1e2bea874f739753ee2f660
SHA1a967c5efee45bacd09ec4b661eb39871c9a36789
SHA256b48773d15d2b3d75b90c045fc0e801bc7f20062281a0e2a8d7ac4e6364debe7c
SHA512b804123cdf4ab07ff4694e8b5e44719e899b18fcbdbc1cb6625027785f927be6df16426ed22de5f911edbaa364a28d88d3f8e3cfa2f5db5b84a9f20adf79619c