Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
b0ef821b4e2203de5adf23723bdba060.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b0ef821b4e2203de5adf23723bdba060.exe
Resource
win10v2004-20241007-en
General
-
Target
b0ef821b4e2203de5adf23723bdba060.exe
-
Size
226KB
-
MD5
b0ef821b4e2203de5adf23723bdba060
-
SHA1
d769b6bc81c4837a8ef8d88d658772f5ef8d84db
-
SHA256
b4e83bdbab9ee87d0f446a12f8f55e6ea3240104050bd6cac0df51414ed95e14
-
SHA512
bbadf476ac7003e38973b225175652f37ad80c903410e4fd255223547a761bff06d8b7439719ce71634aab16a8a65ae6adceab12b5f5d3a928df603c87998241
-
SSDEEP
3072:UFP/v9qWc+6Y1W8XAJ44AE6Fok0s8YqxPnDTIbBkOAg0FujAQ4S5Oht2q7iNK54s:q/0E6L8Xs4BE6Z0uqxPIXAOwv77iw56w
Malware Config
Extracted
smokeloader
wood
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b0ef821b4e2203de5adf23723bdba060.exedescription pid Process procid_target PID 3816 set thread context of 1824 3816 b0ef821b4e2203de5adf23723bdba060.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b0ef821b4e2203de5adf23723bdba060.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0ef821b4e2203de5adf23723bdba060.exe -
Checks SCSI registry key(s) 3 TTPs 23 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b0ef821b4e2203de5adf23723bdba060.exeRegSvcs.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters b0ef821b4e2203de5adf23723bdba060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 b0ef821b4e2203de5adf23723bdba060.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service b0ef821b4e2203de5adf23723bdba060.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
b0ef821b4e2203de5adf23723bdba060.exedescription pid Process Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe Token: SeLoadDriverPrivilege 3816 b0ef821b4e2203de5adf23723bdba060.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
b0ef821b4e2203de5adf23723bdba060.exedescription pid Process procid_target PID 3816 wrote to memory of 1824 3816 b0ef821b4e2203de5adf23723bdba060.exe 89 PID 3816 wrote to memory of 1824 3816 b0ef821b4e2203de5adf23723bdba060.exe 89 PID 3816 wrote to memory of 1824 3816 b0ef821b4e2203de5adf23723bdba060.exe 89 PID 3816 wrote to memory of 1824 3816 b0ef821b4e2203de5adf23723bdba060.exe 89 PID 3816 wrote to memory of 1824 3816 b0ef821b4e2203de5adf23723bdba060.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ef821b4e2203de5adf23723bdba060.exe"C:\Users\Admin\AppData\Local\Temp\b0ef821b4e2203de5adf23723bdba060.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Checks SCSI registry key(s)
PID:1824
-