Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
bced62dd489e2e210bd5145afa0177ac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bced62dd489e2e210bd5145afa0177ac.exe
Resource
win10v2004-20240226-en
General
-
Target
bced62dd489e2e210bd5145afa0177ac.exe
-
Size
194KB
-
MD5
bced62dd489e2e210bd5145afa0177ac
-
SHA1
8f7c03137d9051a7f0e1190e1aae815188f38161
-
SHA256
e439267dcf18cc31711d06c60f578a892aebb88e1cde0a2f40d5b877ac268c3a
-
SHA512
b119162f81b9658fbc49a424cb498bb54faa9ac27d2981a7328487a94c18d948ca926151afa2cb33a3e281bcf2162c70e28a8dea86943715bd99f7183a37416c
-
SSDEEP
3072:5aal8OhR/KOc/nDAnEttoTJ0jLahEL+y5AaZyvArywoOLi6:oa1hRNcPcnEMTJ0jLaWL+LQyvRwoOL
Malware Config
Extracted
smokeloader
pub2
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3368 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bced62dd489e2e210bd5145afa0177ac.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bced62dd489e2e210bd5145afa0177ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bced62dd489e2e210bd5145afa0177ac.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bced62dd489e2e210bd5145afa0177ac.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bced62dd489e2e210bd5145afa0177ac.exepid process 1432 bced62dd489e2e210bd5145afa0177ac.exe 1432 bced62dd489e2e210bd5145afa0177ac.exe 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 3368 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
bced62dd489e2e210bd5145afa0177ac.exepid process 1432 bced62dd489e2e210bd5145afa0177ac.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 Token: SeShutdownPrivilege 3368 Token: SeCreatePagefilePrivilege 3368 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3368 3368 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1432-1-0x0000000002E80000-0x0000000002F80000-memory.dmpFilesize
1024KB
-
memory/1432-2-0x0000000002E10000-0x0000000002E19000-memory.dmpFilesize
36KB
-
memory/1432-3-0x0000000000400000-0x0000000002C68000-memory.dmpFilesize
40.4MB
-
memory/1432-5-0x0000000000400000-0x0000000002C68000-memory.dmpFilesize
40.4MB
-
memory/1432-8-0x0000000002E10000-0x0000000002E19000-memory.dmpFilesize
36KB
-
memory/3368-4-0x0000000000D00000-0x0000000000D16000-memory.dmpFilesize
88KB