Analysis
-
max time kernel
300s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe
Resource
win10-20240404-en
General
-
Target
9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe
-
Size
314KB
-
MD5
26aee3a7465466d22840f63b13eb1370
-
SHA1
76444f1004164e49d5cfebde79451c6acf6380f7
-
SHA256
9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b
-
SHA512
ae82bec06a4c531d0452142f858c71659a41ee7ba08cbca0e3eee9800a2117396f2a41d1cffe583bf612c4768baddd8e6aae06e798a2a03562742b0469adbd30
-
SSDEEP
6144:PhtITwXHa8vNGJ/15QKM4ayfk9d6TzZhT:bITwXxQJ/3Q7kfhTzP
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1192 -
Executes dropped EXE 1 IoCs
Processes:
uedascwpid process 2680 uedascw -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
uedascw9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uedascw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uedascw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uedascw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exepid process 2984 9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe 2984 9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exeuedascwpid process 2984 9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe 2680 uedascw -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1192 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2016 wrote to memory of 2680 2016 taskeng.exe uedascw PID 2016 wrote to memory of 2680 2016 taskeng.exe uedascw PID 2016 wrote to memory of 2680 2016 taskeng.exe uedascw PID 2016 wrote to memory of 2680 2016 taskeng.exe uedascw
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe"C:\Users\Admin\AppData\Local\Temp\9f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2984
-
C:\Windows\system32\taskeng.exetaskeng.exe {0E732AB6-039E-49B6-B65E-387B31B2EB02} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\uedascwC:\Users\Admin\AppData\Roaming\uedascw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD526aee3a7465466d22840f63b13eb1370
SHA176444f1004164e49d5cfebde79451c6acf6380f7
SHA2569f2967278ba3b255fdda7a98062fadb86155b3b5431587fd58e9b234a4579a3b
SHA512ae82bec06a4c531d0452142f858c71659a41ee7ba08cbca0e3eee9800a2117396f2a41d1cffe583bf612c4768baddd8e6aae06e798a2a03562742b0469adbd30