Analysis
-
max time kernel
24s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 17:39
Behavioral task
behavioral1
Sample
f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe
Resource
win10v2004-20231215-en
General
-
Target
f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe
-
Size
32KB
-
MD5
abc9982b12769a29178b120ed8d79d7c
-
SHA1
f8360d1f967b2310e02a81cfbb1206bb3632ee71
-
SHA256
f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8
-
SHA512
bd8db2c3d2cfc90c04f72ce83476095abb49e5e7c9ec1366dd3653fbca95a8d063b4980977ce8687626bfe75f4d62bda408d2b5713dd25e04ecbe270973ce037
-
SSDEEP
768:OAUqYpNSIoKpDd1KM02kQhx4hOtFceWzYqvz0bOS:HLo8LKtd1PBkQD4UtFceWnz
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1360 -
Executes dropped EXE 1 IoCs
Processes:
6E6C.exepid process 2624 6E6C.exe -
Processes:
6E6C.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6E6C.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
6E6C.exepid process 2624 6E6C.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
6E6C.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6E6C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6E6C.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 2348 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exepid process 2332 f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe 2332 f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 1360 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exepid process 2332 f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
6E6C.exedescription pid process Token: SeDebugPrivilege 2624 6E6C.exe Token: SeRestorePrivilege 2624 6E6C.exe Token: SeBackupPrivilege 2624 6E6C.exe Token: SeLoadDriverPrivilege 2624 6E6C.exe Token: SeCreatePagefilePrivilege 2624 6E6C.exe Token: SeShutdownPrivilege 2624 6E6C.exe Token: SeTakeOwnershipPrivilege 2624 6E6C.exe Token: SeChangeNotifyPrivilege 2624 6E6C.exe Token: SeCreateTokenPrivilege 2624 6E6C.exe Token: SeMachineAccountPrivilege 2624 6E6C.exe Token: SeSecurityPrivilege 2624 6E6C.exe Token: SeAssignPrimaryTokenPrivilege 2624 6E6C.exe Token: SeCreateGlobalPrivilege 2624 6E6C.exe Token: 33 2624 6E6C.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
description pid process target process PID 1360 wrote to memory of 2624 1360 6E6C.exe PID 1360 wrote to memory of 2624 1360 6E6C.exe PID 1360 wrote to memory of 2624 1360 6E6C.exe PID 1360 wrote to memory of 2624 1360 6E6C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe"C:\Users\Admin\AppData\Local\Temp\f58e57d1015834305e61c7f021794c682ee9174bb3ad6eb189620811fea975a8exe.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2332
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\ae7kacu7_1.exe/suac2⤵PID:956
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\ae7kacu7.exe" /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:2296
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\SysWOW64\regedit.exe"3⤵
- Runs regedit.exe
PID:2348
-
-
-
C:\Users\Admin\AppData\Local\Temp\6E6C.exeC:\Users\Admin\AppData\Local\Temp\6E6C.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
C:\Users\Admin\AppData\Local\Temp\756F.exeC:\Users\Admin\AppData\Local\Temp\756F.exe1⤵PID:2500
-
C:\Windows\system32\taskeng.exetaskeng.exe {8D3A5B4C-CD27-4443-B083-4B3D0AF695DA} S-1-5-21-3470981204-343661084-3367201002-1000:GLTGRJAG\Admin:Interactive:[1]1⤵PID:2308
-
C:\Users\Admin\AppData\Roaming\hthauuvC:\Users\Admin\AppData\Roaming\hthauuv2⤵PID:1972
-