Analysis
-
max time kernel
300s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe
Resource
win10-20240404-en
General
-
Target
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe
-
Size
190KB
-
MD5
204e7ef6d2e34f1cb4951f80a98b7016
-
SHA1
9d3921efcd09ea06b1e02badd5248bccb829eb4e
-
SHA256
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362
-
SHA512
32fbf81d4f951f4242326ae77d3d64226d3b43b04a12d7322378be054ba82a30ff1f379370c1d552bc89faa216ba9e4979037bdf4b20c79b7014108b94d5f534
-
SSDEEP
3072:8zUhffq/KrDI/Y9KSBvYNnS1Zt0PW/fyelUpnQPqpah:8y3q/KfI/YBoGCWfyeupQPqpa
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1228 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exedescription pid process target process PID 1740 set thread context of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exepid process 2912 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 2912 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exepid process 2912 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1228 -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exedescription pid process target process PID 1740 wrote to memory of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe PID 1740 wrote to memory of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe PID 1740 wrote to memory of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe PID 1740 wrote to memory of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe PID 1740 wrote to memory of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe PID 1740 wrote to memory of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe PID 1740 wrote to memory of 2912 1740 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe 5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe"C:\Users\Admin\AppData\Local\Temp\5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe"C:\Users\Admin\AppData\Local\Temp\5a8af14bff518a9930230eef22be1a44e38a843a16bcded30ab38e344bc47362.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2912