Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe
Resource
win10v2004-20241007-en
General
-
Target
2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe
-
Size
235KB
-
MD5
c063005476b395e4cede57f0a52ef791
-
SHA1
ea25df176366b39976390921490c6be60d7f68ce
-
SHA256
2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97
-
SHA512
88dfeed03e5ca4bad1dec146d6f697e6be650ba9d1f4d8777c85d3a4d40fd808111de79c1d4d412b4ff7a9fb1db4fb00536900ce100fa3db93d9f336a048d9f3
-
SSDEEP
3072:9MoL3vb7EgBUJUA4i7WVA8V5bZ683Tm7uySP3/sj95IlhHVRZpHHx4bCvHOS:9TLDoQegiUDauBsj9KVRZtWCfO
Malware Config
Extracted
smokeloader
7777
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1432 set thread context of 2156 1432 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2156 1432 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe 86 PID 1432 wrote to memory of 2156 1432 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe 86 PID 1432 wrote to memory of 2156 1432 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe 86 PID 1432 wrote to memory of 2156 1432 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe 86 PID 1432 wrote to memory of 2156 1432 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe 86 PID 1432 wrote to memory of 2156 1432 2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe"C:\Users\Admin\AppData\Local\Temp\2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe"C:\Users\Admin\AppData\Local\Temp\2e281f54b30fee468336d8d5e7bc54abed5ed5517b80a592d8a8b4004e93ee97.exe"2⤵
- Checks SCSI registry key(s)
PID:2156
-