Analysis
-
max time kernel
300s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe
Resource
win10-20231025-en
General
-
Target
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe
-
Size
221KB
-
MD5
6a5328207dfc2885b6976339c6df2f36
-
SHA1
119bda84754b0b13d63a668d5e29b8e1d09ba8eb
-
SHA256
5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e
-
SHA512
c489767e5cd1b6d07fa0328d8bfb0cefe0c299f6c8b482340c97d357cd6b8b8fbd7c5446096ebe3d646106eac927df18c0d3790b51ab216259452762bd46c2e0
-
SSDEEP
6144:Kos7DjeAarEIZeHJPlTGB5Po2clXxy0mmLEw:kDqAarEI0H7go2c2V6Ew
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1196 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2724 iuideru 2668 iuideru -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1700 set thread context of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 2724 set thread context of 2668 2724 iuideru 33 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iuideru Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iuideru Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iuideru -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1480 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 1480 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1480 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 2668 iuideru -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 1700 wrote to memory of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 1700 wrote to memory of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 1700 wrote to memory of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 1700 wrote to memory of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 1700 wrote to memory of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 1700 wrote to memory of 1480 1700 5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe 28 PID 2308 wrote to memory of 2724 2308 taskeng.exe 32 PID 2308 wrote to memory of 2724 2308 taskeng.exe 32 PID 2308 wrote to memory of 2724 2308 taskeng.exe 32 PID 2308 wrote to memory of 2724 2308 taskeng.exe 32 PID 2724 wrote to memory of 2668 2724 iuideru 33 PID 2724 wrote to memory of 2668 2724 iuideru 33 PID 2724 wrote to memory of 2668 2724 iuideru 33 PID 2724 wrote to memory of 2668 2724 iuideru 33 PID 2724 wrote to memory of 2668 2724 iuideru 33 PID 2724 wrote to memory of 2668 2724 iuideru 33 PID 2724 wrote to memory of 2668 2724 iuideru 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe"C:\Users\Admin\AppData\Local\Temp\5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe"C:\Users\Admin\AppData\Local\Temp\5dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1480
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5D286F80-9F67-4010-A6D6-757F0B4ECC2A} S-1-5-21-2084844033-2744876406-2053742436-1000:GGPVHMXR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Roaming\iuideruC:\Users\Admin\AppData\Roaming\iuideru2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\iuideruC:\Users\Admin\AppData\Roaming\iuideru3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD56a5328207dfc2885b6976339c6df2f36
SHA1119bda84754b0b13d63a668d5e29b8e1d09ba8eb
SHA2565dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e
SHA512c489767e5cd1b6d07fa0328d8bfb0cefe0c299f6c8b482340c97d357cd6b8b8fbd7c5446096ebe3d646106eac927df18c0d3790b51ab216259452762bd46c2e0
-
Filesize
221KB
MD56a5328207dfc2885b6976339c6df2f36
SHA1119bda84754b0b13d63a668d5e29b8e1d09ba8eb
SHA2565dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e
SHA512c489767e5cd1b6d07fa0328d8bfb0cefe0c299f6c8b482340c97d357cd6b8b8fbd7c5446096ebe3d646106eac927df18c0d3790b51ab216259452762bd46c2e0
-
Filesize
221KB
MD56a5328207dfc2885b6976339c6df2f36
SHA1119bda84754b0b13d63a668d5e29b8e1d09ba8eb
SHA2565dd895076ae040aa0668382cf16bd3536bc36819d247adb56e2de7d6afbbda5e
SHA512c489767e5cd1b6d07fa0328d8bfb0cefe0c299f6c8b482340c97d357cd6b8b8fbd7c5446096ebe3d646106eac927df18c0d3790b51ab216259452762bd46c2e0