Resubmissions
09-04-2024 13:56
240409-q8381sgg93 1009-04-2024 13:56
240409-q83mgsgg92 1009-04-2024 13:56
240409-q821yscb4v 1009-04-2024 13:56
240409-q82p7acb4t 1002-12-2023 09:25
231202-ldsftabd36 10Analysis
-
max time kernel
627s -
max time network
865s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe
Resource
win11-20240221-en
General
-
Target
b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe
-
Size
306KB
-
MD5
39984dd8a5e8246ce321592c274114fd
-
SHA1
7a80fcdffbc624c54b4df3beaa9a3d1d108c7943
-
SHA256
b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a
-
SHA512
3c9c30a1c0d1799b91d9feacc3868732dca0bc2e38abf988eb3d8b42f406133d087af3f7da4e2d6ba825df10a64157349feecf99b8f656de41b4f051e67b4c4e
-
SSDEEP
3072:ZEbn4NJpfmROpECfWYS1hiwAhvJtPOSm9Zh5eAIUUXdZ315U:GcNJpfmmHCiw6vYZKAI7NhM
Malware Config
Extracted
smokeloader
pu10
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2940 set thread context of 4396 2940 b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe 74 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4396 2940 b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe 74 PID 2940 wrote to memory of 4396 2940 b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe 74 PID 2940 wrote to memory of 4396 2940 b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe 74 PID 2940 wrote to memory of 4396 2940 b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe 74 PID 2940 wrote to memory of 4396 2940 b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe 74 PID 2940 wrote to memory of 4396 2940 b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe"C:\Users\Admin\AppData\Local\Temp\b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe"C:\Users\Admin\AppData\Local\Temp\b7e1e34df8d8f63cad1d66970746631001c34f2bad3f86e3a517e5ebdfdd6b3a.exe"2⤵
- Checks SCSI registry key(s)
PID:4396
-