Analysis
-
max time kernel
30s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe
Resource
win10v2004-20231222-en
General
-
Target
d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe
-
Size
312KB
-
MD5
e2dcde964008d3c1087df8373550a753
-
SHA1
96949175c64c2e732a83c1378cf13bafefc163a0
-
SHA256
d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7
-
SHA512
b6b0b4ba59e75090bb3855ef89f10decfa19980bae7a919a59e76a14d8ff59ee3109ed29ad5115fae0b276db769fd4dbbdced689b2f8b248ab012cd4180eac3c
-
SSDEEP
3072:cm37/rLzRqCKgiH5OGyqwuSANL7uY1ncfH5nP83NpBJFwj0:cM7zLzoCKgkbyq0ANL1xch03NU
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3392 -
Executes dropped EXE 1 IoCs
Processes:
B4AA.exepid process 1928 B4AA.exe -
Processes:
B4AA.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B4AA.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
B4AA.exepid process 1928 B4AA.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2060 228 WerFault.exe d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe 1896 1264 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
B4AA.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B4AA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B4AA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exepid process 228 d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe 228 d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 3392 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exepid process 228 d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
B4AA.exedescription pid process Token: SeShutdownPrivilege 3392 Token: SeCreatePagefilePrivilege 3392 Token: SeDebugPrivilege 1928 B4AA.exe Token: SeRestorePrivilege 1928 B4AA.exe Token: SeBackupPrivilege 1928 B4AA.exe Token: SeLoadDriverPrivilege 1928 B4AA.exe Token: SeCreatePagefilePrivilege 1928 B4AA.exe Token: SeShutdownPrivilege 1928 B4AA.exe Token: SeTakeOwnershipPrivilege 1928 B4AA.exe Token: SeChangeNotifyPrivilege 1928 B4AA.exe Token: SeCreateTokenPrivilege 1928 B4AA.exe Token: SeMachineAccountPrivilege 1928 B4AA.exe Token: SeSecurityPrivilege 1928 B4AA.exe Token: SeAssignPrimaryTokenPrivilege 1928 B4AA.exe Token: SeCreateGlobalPrivilege 1928 B4AA.exe Token: 33 1928 B4AA.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
description pid process target process PID 3392 wrote to memory of 1928 3392 B4AA.exe PID 3392 wrote to memory of 1928 3392 B4AA.exe PID 3392 wrote to memory of 1928 3392 B4AA.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe"C:\Users\Admin\AppData\Local\Temp\d71a7808aa7379bc12ec11726af9c97fcf7186ac10f987e303320b6cb41904c7.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 3682⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 228 -ip 2281⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\B4AA.exeC:\Users\Admin\AppData\Local\Temp\B4AA.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 11283⤵
- Program crash
PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\B93F.exeC:\Users\Admin\AppData\Local\Temp\B93F.exe1⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"2⤵PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1264 -ip 12641⤵PID:4092