Analysis
-
max time kernel
300s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe
Resource
win10-20231020-en
General
-
Target
e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe
-
Size
291KB
-
MD5
d559b9922fd74cf1089b5d3a57020d8d
-
SHA1
25a42743138724b39f5b00ea3e2f88d23603689e
-
SHA256
e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4
-
SHA512
823ecf75f158ae708cc3921d92fcf4652d90d2aedc344bd00142c5aa40bbbf75765c1da2eead64f06119236789d037eaf6f31a31536fbb6cdfa97b68a5ce51c5
-
SSDEEP
3072:0timTEMg88HcaT75GQRbh2nRbZYdeUlLwQj+Is:OzTEh88H3v5GVp474
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1200 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2772 ddetgwg 1944 ddetgwg -
Loads dropped DLL 1 IoCs
pid Process 2772 ddetgwg -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 304 set thread context of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 2772 set thread context of 1944 2772 ddetgwg 33 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddetgwg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddetgwg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ddetgwg -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 368 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 368 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 368 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 1944 ddetgwg -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 304 wrote to memory of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 304 wrote to memory of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 304 wrote to memory of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 304 wrote to memory of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 304 wrote to memory of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 304 wrote to memory of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 304 wrote to memory of 368 304 e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe 28 PID 2532 wrote to memory of 2772 2532 taskeng.exe 32 PID 2532 wrote to memory of 2772 2532 taskeng.exe 32 PID 2532 wrote to memory of 2772 2532 taskeng.exe 32 PID 2532 wrote to memory of 2772 2532 taskeng.exe 32 PID 2772 wrote to memory of 1944 2772 ddetgwg 33 PID 2772 wrote to memory of 1944 2772 ddetgwg 33 PID 2772 wrote to memory of 1944 2772 ddetgwg 33 PID 2772 wrote to memory of 1944 2772 ddetgwg 33 PID 2772 wrote to memory of 1944 2772 ddetgwg 33 PID 2772 wrote to memory of 1944 2772 ddetgwg 33 PID 2772 wrote to memory of 1944 2772 ddetgwg 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe"C:\Users\Admin\AppData\Local\Temp\e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe"C:\Users\Admin\AppData\Local\Temp\e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:368
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0AA47A21-EF49-452B-8112-824B2BCA5148} S-1-5-21-3618187007-3650799920-3290345941-1000:BPDFUYWR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\ddetgwgC:\Users\Admin\AppData\Roaming\ddetgwg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\ddetgwgC:\Users\Admin\AppData\Roaming\ddetgwg3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD5d559b9922fd74cf1089b5d3a57020d8d
SHA125a42743138724b39f5b00ea3e2f88d23603689e
SHA256e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4
SHA512823ecf75f158ae708cc3921d92fcf4652d90d2aedc344bd00142c5aa40bbbf75765c1da2eead64f06119236789d037eaf6f31a31536fbb6cdfa97b68a5ce51c5
-
Filesize
291KB
MD5d559b9922fd74cf1089b5d3a57020d8d
SHA125a42743138724b39f5b00ea3e2f88d23603689e
SHA256e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4
SHA512823ecf75f158ae708cc3921d92fcf4652d90d2aedc344bd00142c5aa40bbbf75765c1da2eead64f06119236789d037eaf6f31a31536fbb6cdfa97b68a5ce51c5
-
Filesize
291KB
MD5d559b9922fd74cf1089b5d3a57020d8d
SHA125a42743138724b39f5b00ea3e2f88d23603689e
SHA256e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4
SHA512823ecf75f158ae708cc3921d92fcf4652d90d2aedc344bd00142c5aa40bbbf75765c1da2eead64f06119236789d037eaf6f31a31536fbb6cdfa97b68a5ce51c5
-
Filesize
291KB
MD5d559b9922fd74cf1089b5d3a57020d8d
SHA125a42743138724b39f5b00ea3e2f88d23603689e
SHA256e54bb1783c1e0d9c8dfee460edb517fb3db08f7bb0a670023b1c68d273a978a4
SHA512823ecf75f158ae708cc3921d92fcf4652d90d2aedc344bd00142c5aa40bbbf75765c1da2eead64f06119236789d037eaf6f31a31536fbb6cdfa97b68a5ce51c5