Analysis
-
max time kernel
43s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
9c8cdcad2c02527baabc6021db827860.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9c8cdcad2c02527baabc6021db827860.exe
Resource
win10v2004-20231222-en
General
-
Target
9c8cdcad2c02527baabc6021db827860.exe
-
Size
289KB
-
MD5
9c8cdcad2c02527baabc6021db827860
-
SHA1
595e8b0ca750ffa43b5d33135bd3ac8ad1cdd128
-
SHA256
792da83612534b65156bbeb82f175987cd969bee28f7c685623048b75a1e0c98
-
SHA512
b1e1ade668338272d252a18b608252664aa120a09e3ae8b5567f18cc15645c2fb6633e223a80d5172dd24a00294a15ce7456f7c9d5fe6ee084abd3241b5abef9
-
SSDEEP
6144:Gec43GFV0BLNzEwFrAcqvUoqcUc5E3/6IbRXMA:Gu3GFmBpzEwMHYL6Ibph
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1360 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2892 AD11.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AD11.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2892 AD11.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9c8cdcad2c02527baabc6021db827860.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9c8cdcad2c02527baabc6021db827860.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9c8cdcad2c02527baabc6021db827860.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AD11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AD11.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe -
Runs regedit.exe 1 IoCs
pid Process 2120 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 9c8cdcad2c02527baabc6021db827860.exe 2396 9c8cdcad2c02527baabc6021db827860.exe 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2396 9c8cdcad2c02527baabc6021db827860.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2892 AD11.exe Token: SeRestorePrivilege 2892 AD11.exe Token: SeBackupPrivilege 2892 AD11.exe Token: SeLoadDriverPrivilege 2892 AD11.exe Token: SeCreatePagefilePrivilege 2892 AD11.exe Token: SeShutdownPrivilege 2892 AD11.exe Token: SeTakeOwnershipPrivilege 2892 AD11.exe Token: SeChangeNotifyPrivilege 2892 AD11.exe Token: SeCreateTokenPrivilege 2892 AD11.exe Token: SeMachineAccountPrivilege 2892 AD11.exe Token: SeSecurityPrivilege 2892 AD11.exe Token: SeAssignPrimaryTokenPrivilege 2892 AD11.exe Token: SeCreateGlobalPrivilege 2892 AD11.exe Token: 33 2892 AD11.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 PID 2240 wrote to memory of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 PID 2240 wrote to memory of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 PID 2240 wrote to memory of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 PID 2240 wrote to memory of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 PID 2240 wrote to memory of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 PID 2240 wrote to memory of 2396 2240 9c8cdcad2c02527baabc6021db827860.exe 22 PID 1360 wrote to memory of 2892 1360 Process not Found 31 PID 1360 wrote to memory of 2892 1360 Process not Found 31 PID 1360 wrote to memory of 2892 1360 Process not Found 31 PID 1360 wrote to memory of 2892 1360 Process not Found 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c8cdcad2c02527baabc6021db827860.exe"C:\Users\Admin\AppData\Local\Temp\9c8cdcad2c02527baabc6021db827860.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\9c8cdcad2c02527baabc6021db827860.exe"C:\Users\Admin\AppData\Local\Temp\9c8cdcad2c02527baabc6021db827860.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2396
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\mq7931ys3e9q_1.exe/suac2⤵PID:1636
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\MQ7931~1.EXE" /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:2556
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\SysWOW64\regedit.exe"3⤵
- Runs regedit.exe
PID:2120
-
-
-
C:\Users\Admin\AppData\Local\Temp\B2DC.exeC:\Users\Admin\AppData\Local\Temp\B2DC.exe1⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\AD11.exeC:\Users\Admin\AppData\Local\Temp\AD11.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2892