Analysis
-
max time kernel
24s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe
Resource
win10v2004-20231222-en
General
-
Target
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe
-
Size
290KB
-
MD5
6db27327a2233d8ee11abbed6229604b
-
SHA1
feb1887bd6f9c0f84ed539be18d2812042d87e74
-
SHA256
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4
-
SHA512
a0fac0a468fbc7d4f4b9a03a2a5fb94ec90172f04805066250a6c2fbf322a149acba3ecfd4cfa6889218e0c51bcece9d26c355cf36d5f939cb828a7735d5c5bf
-
SSDEEP
6144:BecoZjpjdRLk/7Y8XOFPN8v9ntG/689RjObRXMA:B+ZjpRRA/7XOFPSvJq68fjObph
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3460 -
Executes dropped EXE 1 IoCs
Processes:
9D78.exepid process 4404 9D78.exe -
Processes:
9D78.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9D78.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
9D78.exepid process 4404 9D78.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exedescription pid process target process PID 4336 set thread context of 2080 4336 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3164 2080 WerFault.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe 1200 2956 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9D78.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9D78.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9D78.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exepid process 2080 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe 2080 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 3460 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exepid process 2080 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
9D78.exedescription pid process Token: SeShutdownPrivilege 3460 Token: SeCreatePagefilePrivilege 3460 Token: SeDebugPrivilege 4404 9D78.exe Token: SeRestorePrivilege 4404 9D78.exe Token: SeBackupPrivilege 4404 9D78.exe Token: SeLoadDriverPrivilege 4404 9D78.exe Token: SeCreatePagefilePrivilege 4404 9D78.exe Token: SeShutdownPrivilege 4404 9D78.exe Token: SeTakeOwnershipPrivilege 4404 9D78.exe Token: SeChangeNotifyPrivilege 4404 9D78.exe Token: SeCreateTokenPrivilege 4404 9D78.exe Token: SeMachineAccountPrivilege 4404 9D78.exe Token: SeSecurityPrivilege 4404 9D78.exe Token: SeAssignPrimaryTokenPrivilege 4404 9D78.exe Token: SeCreateGlobalPrivilege 4404 9D78.exe Token: 33 4404 9D78.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exedescription pid process target process PID 4336 wrote to memory of 2080 4336 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe PID 4336 wrote to memory of 2080 4336 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe PID 4336 wrote to memory of 2080 4336 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe PID 4336 wrote to memory of 2080 4336 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe PID 4336 wrote to memory of 2080 4336 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe PID 4336 wrote to memory of 2080 4336 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe PID 3460 wrote to memory of 4404 3460 9D78.exe PID 3460 wrote to memory of 4404 3460 9D78.exe PID 3460 wrote to memory of 4404 3460 9D78.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe"C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe"C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4exe.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 3283⤵
- Program crash
PID:3164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 2080 -ip 20801⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\9D78.exeC:\Users\Admin\AppData\Local\Temp\9D78.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4404 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 11163⤵
- Program crash
PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\A29A.exeC:\Users\Admin\AppData\Local\Temp\A29A.exe1⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"2⤵PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2956 -ip 29561⤵PID:1976