Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe
Resource
win10v2004-20241007-en
General
-
Target
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe
-
Size
226KB
-
MD5
7e1b085263a1735851f164cdfe697228
-
SHA1
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b
-
SHA256
094e5f284519632fec8516d9c58966c9fdcc1e8e848b39532472ec6906cf2bfe
-
SHA512
0b2a6518e7b9f5938cfc1edba0e63395d95d94fd0d1eb2811f33121202f2d892606fdf5b21dbf06ab56fccf5e2c978d864be9817d87947bbe0cc4f80088270ae
-
SSDEEP
3072:kzd/XR5oQOWIpUGXAJIIAE6FxW0YyqVpF4DTIbBkOAg0Fujxh+iZj8lY9454jCBz:W/XyWVGXsIxE6K0uVpFjXAOv+iZje56e
Malware Config
Extracted
smokeloader
wood
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exedescription pid Process procid_target PID 1956 set thread context of 1624 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe -
Checks SCSI registry key(s) 3 TTPs 23 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exeRegSvcs.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exedescription pid Process Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe Token: SeLoadDriverPrivilege 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exedescription pid Process procid_target PID 1956 wrote to memory of 1624 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe 87 PID 1956 wrote to memory of 1624 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe 87 PID 1956 wrote to memory of 1624 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe 87 PID 1956 wrote to memory of 1624 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe 87 PID 1956 wrote to memory of 1624 1956 d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe"C:\Users\Admin\AppData\Local\Temp\d87cd6bf183ae379c5fb1caccd6e2627d2129a2b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Checks SCSI registry key(s)
PID:1624
-