Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe
Resource
win10v2004-20231020-en
General
-
Target
bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe
-
Size
257KB
-
MD5
dde4b4f0192805f947928cb6f45ef2b1
-
SHA1
7b0a1ba202ec69d1f29ef1abd10fba6574cbfc46
-
SHA256
bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1
-
SHA512
02a6cfa529cd9184772ddec5a4df0e0fbf5b6c81e5ea700942d2d58b363ad7cf593c4f56da6a4c35ae4c0a1ea92209a892c37adef7ef4ef410838abe30c52e1e
-
SSDEEP
3072:KhPHwEtAFOYt/zXKPopyv4Pwx+nq4ai/Arlomf0m6YRBWZ7ovb9Pz:KxCYYtLXKPoQ4Pg4aiIWw0m5uM
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3280 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4792 set thread context of 4800 4792 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 91 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4800 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 4800 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found 3280 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3280 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4800 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3280 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4800 4792 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 91 PID 4792 wrote to memory of 4800 4792 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 91 PID 4792 wrote to memory of 4800 4792 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 91 PID 4792 wrote to memory of 4800 4792 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 91 PID 4792 wrote to memory of 4800 4792 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 91 PID 4792 wrote to memory of 4800 4792 bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe"C:\Users\Admin\AppData\Local\Temp\bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe"C:\Users\Admin\AppData\Local\Temp\bd04a59ab42c5eee8f984e2865df899a4b7bb6b8f41370d784e498516f0509b1.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4800
-