Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe
-
Size
253KB
-
MD5
b8a282944da80ceba706a7997cb4cebb
-
SHA1
ea1a8f3d0d12933449c8315268e6cac7ce575b71
-
SHA256
fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee
-
SHA512
e9e8d6607943b1ec1df02892118a0b9336da8b7f0d1a9bb75e093fe6376eed4f1559c0e63b701e9a1785975d791667eb48e5e4bd1341c55ae74ffe0dc66a8406
-
SSDEEP
3072:wFR/d9JnGLn/tFCmJXppI5nXYnDFpJi0NbTjaJfKeAljoq5X1YblV1L:qR/d9tGLnlFJJf+noR7DNPjGkf1YDh
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1380 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2256 tgijahg 2712 tgijahg -
Loads dropped DLL 1 IoCs
pid Process 2256 tgijahg -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1580 set thread context of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 2256 set thread context of 2712 2256 tgijahg 33 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tgijahg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tgijahg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tgijahg -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1532 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 1532 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found 1380 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1380 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1532 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 2712 tgijahg -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1380 Process not Found 1380 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1380 Process not Found 1380 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 1580 wrote to memory of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 1580 wrote to memory of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 1580 wrote to memory of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 1580 wrote to memory of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 1580 wrote to memory of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 1580 wrote to memory of 1532 1580 NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe 19 PID 2668 wrote to memory of 2256 2668 taskeng.exe 32 PID 2668 wrote to memory of 2256 2668 taskeng.exe 32 PID 2668 wrote to memory of 2256 2668 taskeng.exe 32 PID 2668 wrote to memory of 2256 2668 taskeng.exe 32 PID 2256 wrote to memory of 2712 2256 tgijahg 33 PID 2256 wrote to memory of 2712 2256 tgijahg 33 PID 2256 wrote to memory of 2712 2256 tgijahg 33 PID 2256 wrote to memory of 2712 2256 tgijahg 33 PID 2256 wrote to memory of 2712 2256 tgijahg 33 PID 2256 wrote to memory of 2712 2256 tgijahg 33 PID 2256 wrote to memory of 2712 2256 tgijahg 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1532
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {83BCFD38-0F28-48BC-8E35-8E5339B04EE4} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\tgijahgC:\Users\Admin\AppData\Roaming\tgijahg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\tgijahgC:\Users\Admin\AppData\Roaming\tgijahg3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5b8a282944da80ceba706a7997cb4cebb
SHA1ea1a8f3d0d12933449c8315268e6cac7ce575b71
SHA256fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee
SHA512e9e8d6607943b1ec1df02892118a0b9336da8b7f0d1a9bb75e093fe6376eed4f1559c0e63b701e9a1785975d791667eb48e5e4bd1341c55ae74ffe0dc66a8406
-
Filesize
253KB
MD5b8a282944da80ceba706a7997cb4cebb
SHA1ea1a8f3d0d12933449c8315268e6cac7ce575b71
SHA256fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee
SHA512e9e8d6607943b1ec1df02892118a0b9336da8b7f0d1a9bb75e093fe6376eed4f1559c0e63b701e9a1785975d791667eb48e5e4bd1341c55ae74ffe0dc66a8406
-
Filesize
253KB
MD5b8a282944da80ceba706a7997cb4cebb
SHA1ea1a8f3d0d12933449c8315268e6cac7ce575b71
SHA256fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee
SHA512e9e8d6607943b1ec1df02892118a0b9336da8b7f0d1a9bb75e093fe6376eed4f1559c0e63b701e9a1785975d791667eb48e5e4bd1341c55ae74ffe0dc66a8406
-
Filesize
253KB
MD5b8a282944da80ceba706a7997cb4cebb
SHA1ea1a8f3d0d12933449c8315268e6cac7ce575b71
SHA256fbc30e0aae1d6fac1226f8bfa45fba45dcf262445c81a770a69ded680e5431ee
SHA512e9e8d6607943b1ec1df02892118a0b9336da8b7f0d1a9bb75e093fe6376eed4f1559c0e63b701e9a1785975d791667eb48e5e4bd1341c55ae74ffe0dc66a8406