Analysis
-
max time kernel
230s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
6586b9c152398549ce825694f6c95bdf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6586b9c152398549ce825694f6c95bdf.exe
Resource
win10v2004-20231215-en
General
-
Target
6586b9c152398549ce825694f6c95bdf.exe
-
Size
237KB
-
MD5
6586b9c152398549ce825694f6c95bdf
-
SHA1
5cdabc2477b658c35767e0477a2159e5914e9bda
-
SHA256
fe74f3ee571f291acdaa6d0546bc16e7d5feb3ca1bd6ad1fb3c74b73483b871b
-
SHA512
533c085c288c183597a014559abc6a8a3ba0efa02dacb6aef4a503f39c890689d122a805134564527689590ef49d9407333bc9951fbd713f3564bf4c95515fa5
-
SSDEEP
6144:Dh4q/WqT5h3BZZdQKhZHnqjMZ6YeasCHxyvHSC5IjK8:DWqlh3BZZTHHqAULasZHJ5IjK8
Malware Config
Extracted
smokeloader
0208
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1188 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6586b9c152398549ce825694f6c95bdf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6586b9c152398549ce825694f6c95bdf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6586b9c152398549ce825694f6c95bdf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2948 6586b9c152398549ce825694f6c95bdf.exe 2948 6586b9c152398549ce825694f6c95bdf.exe 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2948 6586b9c152398549ce825694f6c95bdf.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27 PID 1968 wrote to memory of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27 PID 1968 wrote to memory of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27 PID 1968 wrote to memory of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27 PID 1968 wrote to memory of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27 PID 1968 wrote to memory of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27 PID 1968 wrote to memory of 2948 1968 6586b9c152398549ce825694f6c95bdf.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\6586b9c152398549ce825694f6c95bdf.exe"C:\Users\Admin\AppData\Local\Temp\6586b9c152398549ce825694f6c95bdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\6586b9c152398549ce825694f6c95bdf.exe"C:\Users\Admin\AppData\Local\Temp\6586b9c152398549ce825694f6c95bdf.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2948
-