Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe
-
Size
312KB
-
MD5
ecebcfb4709df4fd437cac2d5f14cb05
-
SHA1
3aab7c184d965c66e23ebe9b281a897512a8d4bc
-
SHA256
9a7f4d4d2c440b8009781e82023e52e122d77c584ff7bef19002a29e3b918efd
-
SHA512
49bb4a1005ddcd186a7b98b2a14bbf2ebbe7a474662e671a50aef6115b5307c51385eaf518be7534d289070045604f44932f95d482ff3869343ecb268892c06a
-
SSDEEP
6144:D6HdDo6Ge4/tijD11qOHT/Iw6ZxpRwgZI8e:qdcpe4/Mf11qOHT/YxpRwof
Malware Config
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1188 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 1436 uvjdcah 1564 uvjdcah -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2244 set thread context of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 1436 set thread context of 1564 1436 uvjdcah 33 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvjdcah Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvjdcah Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uvjdcah -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 2904 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found 1188 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2904 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2904 2244 ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe 28 PID 268 wrote to memory of 1436 268 taskeng.exe 32 PID 268 wrote to memory of 1436 268 taskeng.exe 32 PID 268 wrote to memory of 1436 268 taskeng.exe 32 PID 268 wrote to memory of 1436 268 taskeng.exe 32 PID 1436 wrote to memory of 1564 1436 uvjdcah 33 PID 1436 wrote to memory of 1564 1436 uvjdcah 33 PID 1436 wrote to memory of 1564 1436 uvjdcah 33 PID 1436 wrote to memory of 1564 1436 uvjdcah 33 PID 1436 wrote to memory of 1564 1436 uvjdcah 33 PID 1436 wrote to memory of 1564 1436 uvjdcah 33 PID 1436 wrote to memory of 1564 1436 uvjdcah 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecebcfb4709df4fd437cac2d5f14cb05_JaffaCakes118.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2904
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {12257B04-42CD-4EF6-9191-AF20278A990D} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Roaming\uvjdcahC:\Users\Admin\AppData\Roaming\uvjdcah2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Roaming\uvjdcahC:\Users\Admin\AppData\Roaming\uvjdcah3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5ecebcfb4709df4fd437cac2d5f14cb05
SHA13aab7c184d965c66e23ebe9b281a897512a8d4bc
SHA2569a7f4d4d2c440b8009781e82023e52e122d77c584ff7bef19002a29e3b918efd
SHA51249bb4a1005ddcd186a7b98b2a14bbf2ebbe7a474662e671a50aef6115b5307c51385eaf518be7534d289070045604f44932f95d482ff3869343ecb268892c06a