Analysis
-
max time kernel
300s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe
Resource
win10-20240404-en
General
-
Target
ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe
-
Size
222KB
-
MD5
96c60afa5c5265b8ddfe6471ef6eb984
-
SHA1
91a21892133e9bb9b3c9dbd15b07b4224bc0567c
-
SHA256
ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf
-
SHA512
72bb8a938b58bc6be3650a327c806bd401d36f0e7e9ff73ec0a4d4229e5b94160795ba85f7dfc5785f5cf71a68601e7cb52cec6c5058312e82d154d87c5214b0
-
SSDEEP
3072:41rDMnPimnYvPEkGF41EKJ/gqXJagCg5qfSVQP:45Yn6mQ8GvgqXwZ3KVQ
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2022
http://nidoe.org/tmp/index.php
http://sodez.ru/tmp/index.php
http://uama.com.ua/tmp/index.php
http://talesofpirates.net/tmp/index.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1208 -
Executes dropped EXE 1 IoCs
Processes:
rtsiwrwpid process 1936 rtsiwrw -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
rtsiwrwae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rtsiwrw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rtsiwrw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rtsiwrw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exepid process 1200 ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe 1200 ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exertsiwrwpid process 1200 ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe 1936 rtsiwrw -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1208 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2292 wrote to memory of 1936 2292 taskeng.exe rtsiwrw PID 2292 wrote to memory of 1936 2292 taskeng.exe rtsiwrw PID 2292 wrote to memory of 1936 2292 taskeng.exe rtsiwrw PID 2292 wrote to memory of 1936 2292 taskeng.exe rtsiwrw
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe"C:\Users\Admin\AppData\Local\Temp\ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1200
-
C:\Windows\system32\taskeng.exetaskeng.exe {484EDACC-9EDD-414F-8EA0-29371A50FD18} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\rtsiwrwC:\Users\Admin\AppData\Roaming\rtsiwrw2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD596c60afa5c5265b8ddfe6471ef6eb984
SHA191a21892133e9bb9b3c9dbd15b07b4224bc0567c
SHA256ae4180e4445722038a31316c00548218d653508ef603e2052e954a55d3b2accf
SHA51272bb8a938b58bc6be3650a327c806bd401d36f0e7e9ff73ec0a4d4229e5b94160795ba85f7dfc5785f5cf71a68601e7cb52cec6c5058312e82d154d87c5214b0