Analysis
-
max time kernel
290s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 04:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe
Resource
win7-20240419-en
windows7-x64
7 signatures
300 seconds
General
-
Target
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe
-
Size
1.6MB
-
MD5
7a1a1ef5364d1de84ccda20479a6be66
-
SHA1
4141826fdaf7c15e6ee2f23ea0bdc2c5ef1e09ae
-
SHA256
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d
-
SHA512
7d2cf5b4894af33c56497883b6dc9d0d69ce6beb7bc6615ee2ad0b3bf1467b4e6080ca570cacd112dd011e2764b0bd663a3d05d0a72462cbbbbf49a05a7cca36
-
SSDEEP
24576:kmZ+I9s6x+YxgS7WvwCB06006XU6DixBQuGmTm:kmZ+Iqyri2NCBL6XU6mbQrm
Malware Config
Extracted
Family
smokeloader
Botnet
pub3
Signatures
-
Detect ZGRat V1 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2480-28-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2480-30-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2480-37-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2480-42-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 behavioral1/memory/2480-40-0x0000000000400000-0x00000000004B4000-memory.dmp family_zgrat_v1 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exedescription pid process target process PID 2372 set thread context of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 set thread context of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2228 set thread context of 2480 2228 AddInProcess32.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exepid process 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe 2228 AddInProcess32.exe 2228 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe Token: SeDebugPrivilege 2228 AddInProcess32.exe Token: SeDebugPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeBackupPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe Token: SeSecurityPrivilege 2480 InstallUtil.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exeAddInProcess32.exedescription pid process target process PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2228 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2372 wrote to memory of 2524 2372 4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe AddInProcess32.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe PID 2228 wrote to memory of 2480 2228 AddInProcess32.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe"C:\Users\Admin\AppData\Local\Temp\4a312d9b5d2ad81ce5da704369f201268fda30a8274136c3595767203e463e9d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2524