Analysis
-
max time kernel
160s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
25390347b76af239fd1016a2b090ca89.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25390347b76af239fd1016a2b090ca89.exe
Resource
win10v2004-20231215-en
General
-
Target
25390347b76af239fd1016a2b090ca89.exe
-
Size
149KB
-
MD5
25390347b76af239fd1016a2b090ca89
-
SHA1
3dfac63f469ea0be1d235fc5d7a1f33b53d56b54
-
SHA256
c55df5e9d0ea176321a29f8957c7a43188796ae0fc0ffe1ae94ad6092d30ba77
-
SHA512
c050819b3a1b93e3aecd0aad0b4c07f75517ec3a48dc5a4188559ba5939e2162cbefcad25defd90c6d4075982b527b97621b820bcae8393808f3b175d7f6ceed
-
SSDEEP
1536:mhIZu/M//YQ7kv+v3eCb5rKokmJ8skGmgv4JAZlfhx5HHpQ6dIvpGaJATEL+hIty:euYQpvJ5+4kQZlfhx5HJl4QaJQKt
Malware Config
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3512 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4112 set thread context of 2108 4112 25390347b76af239fd1016a2b090ca89.exe 95 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 25390347b76af239fd1016a2b090ca89.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 25390347b76af239fd1016a2b090ca89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 25390347b76af239fd1016a2b090ca89.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 25390347b76af239fd1016a2b090ca89.exe 2108 25390347b76af239fd1016a2b090ca89.exe 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found 3512 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2108 25390347b76af239fd1016a2b090ca89.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3512 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4112 wrote to memory of 2108 4112 25390347b76af239fd1016a2b090ca89.exe 95 PID 4112 wrote to memory of 2108 4112 25390347b76af239fd1016a2b090ca89.exe 95 PID 4112 wrote to memory of 2108 4112 25390347b76af239fd1016a2b090ca89.exe 95 PID 4112 wrote to memory of 2108 4112 25390347b76af239fd1016a2b090ca89.exe 95 PID 4112 wrote to memory of 2108 4112 25390347b76af239fd1016a2b090ca89.exe 95 PID 4112 wrote to memory of 2108 4112 25390347b76af239fd1016a2b090ca89.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\25390347b76af239fd1016a2b090ca89.exe"C:\Users\Admin\AppData\Local\Temp\25390347b76af239fd1016a2b090ca89.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\25390347b76af239fd1016a2b090ca89.exe"C:\Users\Admin\AppData\Local\Temp\25390347b76af239fd1016a2b090ca89.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2108
-