Analysis
-
max time kernel
193s -
max time network
204s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
Resource
win10v2004-20240412-en
General
-
Target
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe
-
Size
290KB
-
MD5
6db27327a2233d8ee11abbed6229604b
-
SHA1
feb1887bd6f9c0f84ed539be18d2812042d87e74
-
SHA256
ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4
-
SHA512
a0fac0a468fbc7d4f4b9a03a2a5fb94ec90172f04805066250a6c2fbf322a149acba3ecfd4cfa6889218e0c51bcece9d26c355cf36d5f939cb828a7735d5c5bf
-
SSDEEP
6144:BecoZjpjdRLk/7Y8XOFPN8v9ntG/689RjObRXMA:B+ZjpRRA/7XOFPSvJq68fjObph
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1408 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 1568 5699.exe 1472 5C83.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2480 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 2480 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found 1408 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2480 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1408 Process not Found 1408 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1408 Process not Found 1408 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 PID 2916 wrote to memory of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 PID 2916 wrote to memory of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 PID 2916 wrote to memory of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 PID 2916 wrote to memory of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 PID 2916 wrote to memory of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 PID 2916 wrote to memory of 2480 2916 ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe 29 PID 1408 wrote to memory of 1568 1408 Process not Found 30 PID 1408 wrote to memory of 1568 1408 Process not Found 30 PID 1408 wrote to memory of 1568 1408 Process not Found 30 PID 1408 wrote to memory of 1568 1408 Process not Found 30 PID 1408 wrote to memory of 1568 1408 Process not Found 30 PID 1408 wrote to memory of 1568 1408 Process not Found 30 PID 1408 wrote to memory of 1568 1408 Process not Found 30 PID 1408 wrote to memory of 1472 1408 Process not Found 31 PID 1408 wrote to memory of 1472 1408 Process not Found 31 PID 1408 wrote to memory of 1472 1408 Process not Found 31 PID 1408 wrote to memory of 1472 1408 Process not Found 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe"C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe"C:\Users\Admin\AppData\Local\Temp\ea040833f500c29fb2229a00c1578500c65fffddab8eea70083ef392cc066bc4.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\5699.exeC:\Users\Admin\AppData\Local\Temp\5699.exe1⤵
- Executes dropped EXE
PID:1568
-
C:\Users\Admin\AppData\Local\Temp\5C83.exeC:\Users\Admin\AppData\Local\Temp\5C83.exe1⤵
- Executes dropped EXE
PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD510ef283264e5050eb40f465feabeea60
SHA15c2b60ad7c2089db827532fed6069bdf74b505f8
SHA2566d45d61463e3521aa6d3d31bd7e953d38c6381c0e1b526dcb28c7f2786669eb6
SHA512c4e4080840991a829b05c76a55f6da6bffc9f618c7a1214d4d0b84e6e714d7b0e5646a99a5d92188f71801e6b7269069728f328d3a3b3fda577191372f399080
-
Filesize
385KB
MD5bdbfccc2b71c0d7f9de70aba81597b52
SHA1ebb97f2a7fe51ff607a1d1b7557c995dd1cc275a
SHA256082e8792e48e6ae0b16330f6bde833c42158ba2c9b75fad31ebc3d939f8a0042
SHA512fba755745e82b6acd1e74e15ce9bc729a9b0e85bbb1975959c1b5d7ab1e6859efc715de87c3f4b6ef4bb21a25d9246142e96323cfc5d732ae6007b4690dcd417