Analysis
-
max time kernel
25s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
990a6d8f565a8df63234c7a9faabe6ba.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
990a6d8f565a8df63234c7a9faabe6ba.exe
Resource
win10v2004-20231222-en
General
-
Target
990a6d8f565a8df63234c7a9faabe6ba.exe
-
Size
290KB
-
MD5
990a6d8f565a8df63234c7a9faabe6ba
-
SHA1
328558357bbbafd16fad998fabb4e03c328900e9
-
SHA256
db726961f1431fd7343b23e90a146a7fd19233d4980815f2d68d50c36bc1175d
-
SHA512
2ae5bc20ee6b6a91662cc3d49433c7354fb8a0f3bdfb224d5da2820e6e637fb886279d6fca0b17bafa5bf991dfa9a3a4179ae9f9ba09b3f8bb04f626ea8eeabe
-
SSDEEP
3072:jec4fYwGFV04Lr70+sJiaUEvhqwuFVEYWQzkWl+tyYA5gi9/6NmJ5b4cQ4bRXp6h:jec43GFV04LNzEw9EYW8+lA/6+bRXMA
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1340 -
Executes dropped EXE 1 IoCs
Processes:
7002.exepid process 2724 7002.exe -
Processes:
7002.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7002.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
7002.exepid process 2724 7002.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
990a6d8f565a8df63234c7a9faabe6ba.exedescription pid process target process PID 2372 set thread context of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
990a6d8f565a8df63234c7a9faabe6ba.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 990a6d8f565a8df63234c7a9faabe6ba.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 990a6d8f565a8df63234c7a9faabe6ba.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 990a6d8f565a8df63234c7a9faabe6ba.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7002.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7002.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 1864 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
990a6d8f565a8df63234c7a9faabe6ba.exepid process 2408 990a6d8f565a8df63234c7a9faabe6ba.exe 2408 990a6d8f565a8df63234c7a9faabe6ba.exe 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 1340 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
990a6d8f565a8df63234c7a9faabe6ba.exepid process 2408 990a6d8f565a8df63234c7a9faabe6ba.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
7002.exedescription pid process Token: SeDebugPrivilege 2724 7002.exe Token: SeRestorePrivilege 2724 7002.exe Token: SeBackupPrivilege 2724 7002.exe Token: SeLoadDriverPrivilege 2724 7002.exe Token: SeCreatePagefilePrivilege 2724 7002.exe Token: SeShutdownPrivilege 2724 7002.exe Token: SeTakeOwnershipPrivilege 2724 7002.exe Token: SeChangeNotifyPrivilege 2724 7002.exe Token: SeCreateTokenPrivilege 2724 7002.exe Token: SeMachineAccountPrivilege 2724 7002.exe Token: SeSecurityPrivilege 2724 7002.exe Token: SeAssignPrimaryTokenPrivilege 2724 7002.exe Token: SeCreateGlobalPrivilege 2724 7002.exe Token: 33 2724 7002.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
990a6d8f565a8df63234c7a9faabe6ba.exedescription pid process target process PID 2372 wrote to memory of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe PID 2372 wrote to memory of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe PID 2372 wrote to memory of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe PID 2372 wrote to memory of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe PID 2372 wrote to memory of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe PID 2372 wrote to memory of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe PID 2372 wrote to memory of 2408 2372 990a6d8f565a8df63234c7a9faabe6ba.exe 990a6d8f565a8df63234c7a9faabe6ba.exe PID 1340 wrote to memory of 2724 1340 7002.exe PID 1340 wrote to memory of 2724 1340 7002.exe PID 1340 wrote to memory of 2724 1340 7002.exe PID 1340 wrote to memory of 2724 1340 7002.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\990a6d8f565a8df63234c7a9faabe6ba.exe"C:\Users\Admin\AppData\Local\Temp\990a6d8f565a8df63234c7a9faabe6ba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\990a6d8f565a8df63234c7a9faabe6ba.exe"C:\Users\Admin\AppData\Local\Temp\990a6d8f565a8df63234c7a9faabe6ba.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\7002.exeC:\Users\Admin\AppData\Local\Temp\7002.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\o7gq9ecs5gw_1.exe/suac3⤵PID:2504
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\O7GQ9E~1.EXE" /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1164
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\SysWOW64\regedit.exe"4⤵
- Runs regedit.exe
PID:1864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7705.exeC:\Users\Admin\AppData\Local\Temp\7705.exe1⤵PID:2540