Analysis Overview
SHA256
2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9
Threat Level: Known bad
The file 2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9 was found to be: Known bad.
Malicious Activity Summary
SmokeLoader
Deletes itself
Executes dropped EXE
Unsigned PE
Suspicious use of UnmapMainImage
Uses Task Scheduler COM API
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-03-07 18:38
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-07 18:38
Reported
2024-03-07 18:40
Platform
win7-20240221-en
Max time kernel
150s
Max time network
121s
Command Line
Signatures
SmokeLoader
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\wwvjcuv | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\wwvjcuv | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\wwvjcuv | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\wwvjcuv | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\wwvjcuv | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2536 wrote to memory of 2876 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\wwvjcuv |
| PID 2536 wrote to memory of 2876 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\wwvjcuv |
| PID 2536 wrote to memory of 2876 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\wwvjcuv |
| PID 2536 wrote to memory of 2876 | N/A | C:\Windows\system32\taskeng.exe | C:\Users\Admin\AppData\Roaming\wwvjcuv |
Processes
C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe
"C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {2DE0CAA3-873E-4E5B-94E0-2B022EA1D50D} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]
C:\Users\Admin\AppData\Roaming\wwvjcuv
C:\Users\Admin\AppData\Roaming\wwvjcuv
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | kamsmad.com | udp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
| KR | 211.171.233.126:80 | kamsmad.com | tcp |
Files
memory/1312-1-0x0000000002350000-0x0000000002450000-memory.dmp
memory/1312-2-0x0000000000220000-0x000000000022B000-memory.dmp
memory/1312-3-0x0000000000400000-0x0000000001F06000-memory.dmp
memory/1312-5-0x0000000000400000-0x0000000001F06000-memory.dmp
memory/1212-4-0x0000000003E40000-0x0000000003E56000-memory.dmp
C:\Users\Admin\AppData\Roaming\wwvjcuv
| MD5 | 4c8da92ecf868d4042cc5252d659925a |
| SHA1 | 589db861e7216d9dad95c217cd09375066229da9 |
| SHA256 | 2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9 |
| SHA512 | e9640761edff7ae479fc922f8dfa141daebc69244870ae5ef322c839e1fb5a893cc6d5c5ccdd189c4f2a34227e636d9c53658f740a48ff88f0794a0919b080ef |
memory/2876-14-0x00000000002B0000-0x00000000003B0000-memory.dmp
memory/2876-15-0x0000000000400000-0x0000000001F06000-memory.dmp
memory/1212-16-0x0000000002DC0000-0x0000000002DD6000-memory.dmp
memory/2876-17-0x0000000000400000-0x0000000001F06000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-07 18:38
Reported
2024-03-07 18:40
Platform
win10v2004-20240226-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
SmokeLoader
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\sjsgwiv | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\sjsgwiv | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\sjsgwiv | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\sjsgwiv | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\sjsgwiv | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe
"C:\Users\Admin\AppData\Local\Temp\2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9.exe"
C:\Users\Admin\AppData\Roaming\sjsgwiv
C:\Users\Admin\AppData\Roaming\sjsgwiv
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 195.233.44.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 100.5.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | kamsmad.com | udp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| US | 8.8.8.8:53 | 44.55.182.186.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.178.17.96.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| US | 8.8.8.8:53 | 218.135.221.88.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| AR | 186.182.55.44:80 | kamsmad.com | tcp |
| US | 8.8.8.8:53 | 179.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 33.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 168.117.168.52.in-addr.arpa | udp |
Files
memory/2264-1-0x0000000002070000-0x0000000002170000-memory.dmp
memory/2264-2-0x0000000003C50000-0x0000000003C5B000-memory.dmp
memory/2264-3-0x0000000000400000-0x0000000001F06000-memory.dmp
memory/3356-4-0x0000000002810000-0x0000000002826000-memory.dmp
memory/2264-5-0x0000000000400000-0x0000000001F06000-memory.dmp
C:\Users\Admin\AppData\Roaming\sjsgwiv
| MD5 | 4c8da92ecf868d4042cc5252d659925a |
| SHA1 | 589db861e7216d9dad95c217cd09375066229da9 |
| SHA256 | 2c23e348735e23bfa0c31760dadae7045a43fb5997e5b93e8bb155663e4652f9 |
| SHA512 | e9640761edff7ae479fc922f8dfa141daebc69244870ae5ef322c839e1fb5a893cc6d5c5ccdd189c4f2a34227e636d9c53658f740a48ff88f0794a0919b080ef |
memory/4268-14-0x0000000002250000-0x0000000002350000-memory.dmp
memory/4268-15-0x0000000000400000-0x0000000001F06000-memory.dmp
memory/3356-16-0x0000000002790000-0x00000000027A6000-memory.dmp
memory/4268-17-0x0000000000400000-0x0000000001F06000-memory.dmp