Analysis
-
max time kernel
96s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
8c1284da361042c363c4f360efd74595fcfa4d3c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c1284da361042c363c4f360efd74595fcfa4d3c.exe
Resource
win10v2004-20241007-en
General
-
Target
8c1284da361042c363c4f360efd74595fcfa4d3c.exe
-
Size
226KB
-
MD5
d9274277029e715a306411f7f4853e2c
-
SHA1
8c1284da361042c363c4f360efd74595fcfa4d3c
-
SHA256
6f7470b290031a2f14f90dadf9971df6195680228f6c4c388d03aadff3939798
-
SHA512
d7a1a2e7413e3e92af6ba10122120b350f6e9e2d983ae76c200acb5b29680c1252e6d24a3aa622cef12aa9a8e7de9bd205ed833cd554a217e20b0508eaffa19f
-
SSDEEP
3072:y9l1vvqAU+2mz0WtAJUeAE6FYW0E+cqTj4DTIbBkOAg0Fuje3BFmQ32Sl54jCd5z:616G2lWtsU3E6X08qTjjXAO+3T56w
Malware Config
Extracted
smokeloader
wood
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8c1284da361042c363c4f360efd74595fcfa4d3c.exedescription pid Process procid_target PID 1644 set thread context of 4308 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8c1284da361042c363c4f360efd74595fcfa4d3c.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c1284da361042c363c4f360efd74595fcfa4d3c.exe -
Checks SCSI registry key(s) 3 TTPs 23 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
8c1284da361042c363c4f360efd74595fcfa4d3c.exeRegSvcs.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
8c1284da361042c363c4f360efd74595fcfa4d3c.exedescription pid Process Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe Token: SeLoadDriverPrivilege 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8c1284da361042c363c4f360efd74595fcfa4d3c.exedescription pid Process procid_target PID 1644 wrote to memory of 1432 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 87 PID 1644 wrote to memory of 1432 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 87 PID 1644 wrote to memory of 1432 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 87 PID 1644 wrote to memory of 4308 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 88 PID 1644 wrote to memory of 4308 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 88 PID 1644 wrote to memory of 4308 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 88 PID 1644 wrote to memory of 4308 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 88 PID 1644 wrote to memory of 4308 1644 8c1284da361042c363c4f360efd74595fcfa4d3c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c1284da361042c363c4f360efd74595fcfa4d3c.exe"C:\Users\Admin\AppData\Local\Temp\8c1284da361042c363c4f360efd74595fcfa4d3c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Checks SCSI registry key(s)
PID:4308
-