Analysis
-
max time kernel
300s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe
Resource
win10-20240319-en
General
-
Target
1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe
-
Size
242KB
-
MD5
f27255fbf7ddab80b8f9aa0fe62ecbd8
-
SHA1
afcb58b2823d6094fff4b15ada58aa3f695a6705
-
SHA256
1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019
-
SHA512
910aa92a48c390775f97753d5fd93e47416e4ac39b24123bd41d4eeebc96ee2ce83feb0083b8f2b1d4c22e16585000c1e383e16f8336928b4d42bfd29008b234
-
SSDEEP
3072:vCLPAPZuzMWzr6ZrTyOZv2t9rUdg5+76xbvJOQzCB44:KLGq6ZK6v2tZUZ74JOQA
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1268 -
Executes dropped EXE 1 IoCs
Processes:
dgjjebapid process 520 dgjjeba -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exedgjjebadescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dgjjeba Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dgjjeba Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dgjjeba -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exepid process 856 1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe 856 1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exedgjjebapid process 856 1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe 520 dgjjeba -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1268 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2932 wrote to memory of 520 2932 taskeng.exe dgjjeba PID 2932 wrote to memory of 520 2932 taskeng.exe dgjjeba PID 2932 wrote to memory of 520 2932 taskeng.exe dgjjeba PID 2932 wrote to memory of 520 2932 taskeng.exe dgjjeba
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe"C:\Users\Admin\AppData\Local\Temp\1b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:856
-
C:\Windows\system32\taskeng.exetaskeng.exe {5E104BCB-2F57-412D-91C1-1A8BFFF43792} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\dgjjebaC:\Users\Admin\AppData\Roaming\dgjjeba2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD5f27255fbf7ddab80b8f9aa0fe62ecbd8
SHA1afcb58b2823d6094fff4b15ada58aa3f695a6705
SHA2561b8c7c770e1105b0d96c8e30486955d37358930ed79d4b5434d5dd894da2d019
SHA512910aa92a48c390775f97753d5fd93e47416e4ac39b24123bd41d4eeebc96ee2ce83feb0083b8f2b1d4c22e16585000c1e383e16f8336928b4d42bfd29008b234