Analysis
-
max time kernel
77s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:31
Static task
static1
Behavioral task
behavioral1
Sample
1d153b36dff89349d52e0b5847b9a8a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d153b36dff89349d52e0b5847b9a8a4.exe
Resource
win10v2004-20231222-en
General
-
Target
1d153b36dff89349d52e0b5847b9a8a4.exe
-
Size
150KB
-
MD5
1d153b36dff89349d52e0b5847b9a8a4
-
SHA1
8329a08acea7666e06e75af8e3d88c36e777f17e
-
SHA256
9093d320baf890134c0fc716eaa10cf5027dd4e804570867506537b555fd5ea7
-
SHA512
9554720af3c8d065a7a8df284ca1f083ac8f703e278fe33f08f4583b2f2c5a6d9ecb24f6e4577f6a7ea0e9972e662d992a5e5c75b716df8e9682dcee67014af7
-
SSDEEP
3072:km7BEuvfr02yZzFRPpYC585IXiCwBwJQKt:DESfrZy9yit
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3496 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3220 set thread context of 4532 3220 1d153b36dff89349d52e0b5847b9a8a4.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3748 4532 WerFault.exe 83 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d153b36dff89349d52e0b5847b9a8a4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d153b36dff89349d52e0b5847b9a8a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d153b36dff89349d52e0b5847b9a8a4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 1d153b36dff89349d52e0b5847b9a8a4.exe 4532 1d153b36dff89349d52e0b5847b9a8a4.exe 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found 3496 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4532 1d153b36dff89349d52e0b5847b9a8a4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3496 Process not Found Token: SeCreatePagefilePrivilege 3496 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4532 3220 1d153b36dff89349d52e0b5847b9a8a4.exe 83 PID 3220 wrote to memory of 4532 3220 1d153b36dff89349d52e0b5847b9a8a4.exe 83 PID 3220 wrote to memory of 4532 3220 1d153b36dff89349d52e0b5847b9a8a4.exe 83 PID 3220 wrote to memory of 4532 3220 1d153b36dff89349d52e0b5847b9a8a4.exe 83 PID 3220 wrote to memory of 4532 3220 1d153b36dff89349d52e0b5847b9a8a4.exe 83 PID 3220 wrote to memory of 4532 3220 1d153b36dff89349d52e0b5847b9a8a4.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d153b36dff89349d52e0b5847b9a8a4.exe"C:\Users\Admin\AppData\Local\Temp\1d153b36dff89349d52e0b5847b9a8a4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\1d153b36dff89349d52e0b5847b9a8a4.exe"C:\Users\Admin\AppData\Local\Temp\1d153b36dff89349d52e0b5847b9a8a4.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 3283⤵
- Program crash
PID:3748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4532 -ip 45321⤵PID:4952