Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
07-01-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe
Resource
win10-20231215-en
General
-
Target
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe
-
Size
219KB
-
MD5
71c0797d060ae8a45196a9336fbf7b5d
-
SHA1
a2838790fa259240e53207be47535d0f89d15f40
-
SHA256
21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431
-
SHA512
2c2ae9c6510408b17a77e3ac1623a550784d2002fcaea4bf75372aeabb06a430cbe7f5543fd9631c92a545a0817f007fb65d192d75c35239c3bbb7a906fb48d9
-
SSDEEP
3072:s9L3vACvLJiX7ezDwPh0jb4rVyYI08+Yi1DrRlWwgvXF/LwHO1/D:s9L3Xv5cPhSoVyYI+KwgdDwHa
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 3312 Process not Found -
Executes dropped EXE 5 IoCs
pid Process 4292 710.exe 688 1190.exe 4564 WindowsUpdater.exe 4224 wafcfbf 2912 wafcfbf -
Loads dropped DLL 2 IoCs
pid Process 4564 WindowsUpdater.exe 4564 WindowsUpdater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3456 set thread context of 4392 3456 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 30 PID 4224 set thread context of 2912 4224 wafcfbf 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 6 IoCs
resource yara_rule behavioral2/files/0x000800000001abd7-20.dat nsis_installer_2 behavioral2/files/0x000800000001abd7-19.dat nsis_installer_2 behavioral2/files/0x000700000001abd8-25.dat nsis_installer_1 behavioral2/files/0x000700000001abd8-25.dat nsis_installer_2 behavioral2/files/0x000700000001abd8-27.dat nsis_installer_1 behavioral2/files/0x000700000001abd8-27.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wafcfbf Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wafcfbf Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wafcfbf -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4392 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 4392 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found 3312 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4392 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 2912 wafcfbf -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3312 Process not Found Token: SeCreatePagefilePrivilege 3312 Process not Found Token: SeShutdownPrivilege 3312 Process not Found Token: SeCreatePagefilePrivilege 3312 Process not Found -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3456 wrote to memory of 4392 3456 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 30 PID 3456 wrote to memory of 4392 3456 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 30 PID 3456 wrote to memory of 4392 3456 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 30 PID 3456 wrote to memory of 4392 3456 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 30 PID 3456 wrote to memory of 4392 3456 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 30 PID 3456 wrote to memory of 4392 3456 21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe 30 PID 3312 wrote to memory of 4292 3312 Process not Found 74 PID 3312 wrote to memory of 4292 3312 Process not Found 74 PID 3312 wrote to memory of 4292 3312 Process not Found 74 PID 3312 wrote to memory of 688 3312 Process not Found 75 PID 3312 wrote to memory of 688 3312 Process not Found 75 PID 3312 wrote to memory of 688 3312 Process not Found 75 PID 688 wrote to memory of 4564 688 1190.exe 76 PID 688 wrote to memory of 4564 688 1190.exe 76 PID 688 wrote to memory of 4564 688 1190.exe 76 PID 4224 wrote to memory of 2912 4224 wafcfbf 78 PID 4224 wrote to memory of 2912 4224 wafcfbf 78 PID 4224 wrote to memory of 2912 4224 wafcfbf 78 PID 4224 wrote to memory of 2912 4224 wafcfbf 78 PID 4224 wrote to memory of 2912 4224 wafcfbf 78 PID 4224 wrote to memory of 2912 4224 wafcfbf 78 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"C:\Users\Admin\AppData\Local\Temp\21a3403e49ae025b38441ee648e8eebf5b99b7c24226b968f2b38a4ce66ed431.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\710.exeC:\Users\Admin\AppData\Local\Temp\710.exe1⤵
- Executes dropped EXE
PID:4292
-
C:\Users\Admin\AppData\Local\Temp\1190.exeC:\Users\Admin\AppData\Local\Temp\1190.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4564
-
-
C:\Users\Admin\AppData\Roaming\wafcfbfC:\Users\Admin\AppData\Roaming\wafcfbf1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Roaming\wafcfbfC:\Users\Admin\AppData\Roaming\wafcfbf2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
481KB
MD522ff64cbde80065ea1ff79b8f06385c8
SHA1dfe429bc56a9e9a459cae9e2d6dc802562130731
SHA256447505bf5ddaadb69b1ee3e6ba29936481887fa9bd9c6c79e2f22d593d256071
SHA5125e28f0ad7d1ab7ee794ac6d80ea603855b7e5871ee2f525880ce0f28703ccc01cbe478ed8da5673166281225d4dc5318b577c9955a61b01ad7aff3bafd3e84e6
-
Filesize
5KB
MD5eae440ce6b3b1b7fab8f6d864a9690e1
SHA11473e6cce94e354245a3ee39c88bcb21fcf26902
SHA2569e8585762f49957e92aacc82ac553a0e9e44f1580cd78d9500100728aca4b5db
SHA5126bcee9a386aab39c145e94a3c4da2a8567009ea6960508c23ec48a9613c3ba8f33056adf65a000c16b39e6903f25e61c32a65df036eed61ee7a36140232f292a
-
Filesize
360KB
MD580c413180b6bd0dd664adc4e0665b494
SHA1e791e4a3391fc6b7bcb58399cd4fa3c52a06b940
SHA2566d99cec56614b6b8a23dfa84a50c6bbfde535411c6366ac2bcc20c9f5af62880
SHA512347f4ae6f308b37d055a6177478e45ab3838d7020abed70c7aa138d2c3771e709de204da8550aebdcaa6139d869dc7328cc7e645c4dd48d1066f9ad70225644a
-
Filesize
195KB
MD5567f2b15b305b54671a26967b4b31daa
SHA111cf46a4b7b05553495db5c66e1a042fe33e6cfb
SHA256613ee10704a87798488ee86de2c1a9a38ce3b0cfb608af96f28734ab1372744c
SHA5124f163dd7a1f7ca0c403a8d497b5075866bf9b05add6c6c2cae78da90af13f1266497995c23540184cbe498ab60cddc4d84ed153b0fdb9c7d2bea9f88856397fa
-
Filesize
33KB
MD59d90f82de2c941f34db1f0ba88237979
SHA1d511adbe4d8ebb2eaaab2601a4a936748d55e412
SHA256649882fe443be0e047a4439e7acce9f82a56bf22a7ff7eb666196236461ac532
SHA51259a3484fae3d25a0c4486241bee5c21d179e5a10a6f8e8035c003909ba11f2e4a4b9c811f22f46664010a773e802dbcde126e808c4da75b318d52f0c9562b5f3
-
Filesize
92KB
MD5fa23949873a89ff520e2788b5c2bb55b
SHA1187a183d9b0dafc8dc463fe80a6ccc8aba8f1279
SHA256864defbec2fdbf1c26aa05e4c6c12f1fea98099890ae1349db642b3c31873b39
SHA512b7bfbac096cad020e7ee7cb3fbd2985fc738fbdec7f70603b97c2b073217398b95c8b5ba66c23ffb26fe385f14e60307c29bc36bace916f7a65cb6c008bb880d
-
Filesize
176KB
MD57c881f0395b0469a24bb2732f66b6149
SHA19a4e6fefa542a9dfab8fd95f763c10ee8ec4256a
SHA256c814aefbc24ffd770505ffdb30d485513ea84aa4bd37d26e180b6db6550ce888
SHA51273876c13d999ec3261ef52cd5a3d28f501a17774696c18b526bf4a40eb8d0233c5529ef530725915820def885dc768046e6be31cf4f7be7d56ad0d3dd8113b59
-
Filesize
33KB
MD514d70c7cd0f736f1f740f2c63bfba53a
SHA1ef29631cca5a5f4668c6fdbc109a2312336949a3
SHA256ede277c100eba22fe101be3f3570e026326a91a5fed117da68b7863ad1e11801
SHA5123d6b7f09663ec79677991a05c8d9f4c51878579faa47369453f7b3641adc8c366704d1b684b4c75b87bfcf220978a0da30065fc89c74bad8fa4add09bed85127
-
Filesize
50KB
MD51d15810dd2f87923c8168139a6678b58
SHA151b4c60079b7e769b731b1e37a961ae829617529
SHA256be2f4e1fd8f6acfc037e51f16af2bbcd3014fad984f9431d63a6b168586f9041
SHA512edb26116e315b4aaddf8e4e0afeeb9c1fab485f3158622b1bbf66d4e5a8ba7f785ba843f8470765dc9dd693e5dd2504caa705aa0df93a930072dc66fe47a6ea0
-
Filesize
72KB
MD5576163b65f03c062b65669c0156cf4f4
SHA1acd6611f9bc9575b5cfad0118d222ed8f63bca84
SHA25619172f775ff211c010cbd7464d4e9187052625dc02c19ce4a8ce121a934721ac
SHA5129df1b98cbe47bb9dbcd50f8b19f1bf2e2c75ab772ec525f26b20e090b307116cb17d74e4a9133f77e13fbdc4c63e239f820c6e6830746ae6ddbe57c637b7da05
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f