Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:37
Static task
static1
Behavioral task
behavioral1
Sample
05d0ff85e4bc02aed7f0d3472b0e46bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05d0ff85e4bc02aed7f0d3472b0e46bc.exe
Resource
win10v2004-20231222-en
General
-
Target
05d0ff85e4bc02aed7f0d3472b0e46bc.exe
-
Size
177KB
-
MD5
05d0ff85e4bc02aed7f0d3472b0e46bc
-
SHA1
c19e208ddc3eb3693b639982db7ac79089504743
-
SHA256
907f6b8f9c0e1e15fb052deaa36b96fe53c6bd8d1e3b15f9297b4f1295c16271
-
SHA512
2b1d70e05f26a2b02315f89612a87e98caaaab52dcdefe1c7aa8b54ff06a94e556a5bdb302b8e199eee45ca9b8d41871bf20b6e78e008c21afda7304b2269a4e
-
SSDEEP
3072:tCfFJxAKiWYg6cL+35YSeFfVHwhZoWC9sI5/DuT61m:toag6c6qJXHwhZU9sI5/
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1244 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 05d0ff85e4bc02aed7f0d3472b0e46bc.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 05d0ff85e4bc02aed7f0d3472b0e46bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 05d0ff85e4bc02aed7f0d3472b0e46bc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 2156 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2156 05d0ff85e4bc02aed7f0d3472b0e46bc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17 PID 1688 wrote to memory of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17 PID 1688 wrote to memory of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17 PID 1688 wrote to memory of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17 PID 1688 wrote to memory of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17 PID 1688 wrote to memory of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17 PID 1688 wrote to memory of 2156 1688 05d0ff85e4bc02aed7f0d3472b0e46bc.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d0ff85e4bc02aed7f0d3472b0e46bc.exe"C:\Users\Admin\AppData\Local\Temp\05d0ff85e4bc02aed7f0d3472b0e46bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\05d0ff85e4bc02aed7f0d3472b0e46bc.exe"C:\Users\Admin\AppData\Local\Temp\05d0ff85e4bc02aed7f0d3472b0e46bc.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2156
-