Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
676fa6c0b0bf77367c56e1fb47602dd6.exe
Resource
win7-20240903-en
General
-
Target
676fa6c0b0bf77367c56e1fb47602dd6.exe
-
Size
1.2MB
-
MD5
676fa6c0b0bf77367c56e1fb47602dd6
-
SHA1
9f92ddf0ffbdfdeb0b0a13dbf86b919787338dd9
-
SHA256
3a8a23649cd1b6dbd51d7281ded6f78fcc7389af0ecafb649d946160362d5c42
-
SHA512
2208eafa46f3a45d4aaa1b2d12f0be73983f55fccd74f2e251d6618820c36e899476f767739b047b43dc4db897edebf5403a8eba6d4e026408570cb9281c1157
-
SSDEEP
24576:afMj2ySKSGwX8y6tXb46o0B6n6LM0jSENslBY:afqOhhXh76oyiWL2lBY
Malware Config
Extracted
smokeloader
oon1
Extracted
smokeloader
bly
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2064 created 3472 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 56 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 2192 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 676fa6c0b0bf77367c56e1fb47602dd6.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 676fa6c0b0bf77367c56e1fb47602dd6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 676fa6c0b0bf77367c56e1fb47602dd6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 676fa6c0b0bf77367c56e1fb47602dd6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2192 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 86 PID 2064 wrote to memory of 2192 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 86 PID 2064 wrote to memory of 2192 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 86 PID 2064 wrote to memory of 2192 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 86 PID 2064 wrote to memory of 2192 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 86 PID 2064 wrote to memory of 2192 2064 676fa6c0b0bf77367c56e1fb47602dd6.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"C:\Users\Admin\AppData\Local\Temp\676fa6c0b0bf77367c56e1fb47602dd6.exe"2⤵
- Checks SCSI registry key(s)
PID:2192
-