Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe
Resource
win10v2004-20241007-en
General
-
Target
d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe
-
Size
226KB
-
MD5
b0ef821b4e2203de5adf23723bdba060
-
SHA1
d769b6bc81c4837a8ef8d88d658772f5ef8d84db
-
SHA256
b4e83bdbab9ee87d0f446a12f8f55e6ea3240104050bd6cac0df51414ed95e14
-
SHA512
bbadf476ac7003e38973b225175652f37ad80c903410e4fd255223547a761bff06d8b7439719ce71634aab16a8a65ae6adceab12b5f5d3a928df603c87998241
-
SSDEEP
3072:UFP/v9qWc+6Y1W8XAJ44AE6Fok0s8YqxPnDTIbBkOAg0FujAQ4S5Oht2q7iNK54s:q/0E6L8Xs4BE6Z0uqxPIXAOwv77iw56w
Malware Config
Extracted
smokeloader
wood
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 3876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe -
Checks SCSI registry key(s) 3 TTPs 23 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegSvcs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe Token: SeLoadDriverPrivilege 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 87 PID 2360 wrote to memory of 1876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 87 PID 2360 wrote to memory of 1876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 87 PID 2360 wrote to memory of 3876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 88 PID 2360 wrote to memory of 3876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 88 PID 2360 wrote to memory of 3876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 88 PID 2360 wrote to memory of 3876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 88 PID 2360 wrote to memory of 3876 2360 d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe"C:\Users\Admin\AppData\Local\Temp\d769b6bc81c4837a8ef8d88d658772f5ef8d84db.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Checks SCSI registry key(s)
PID:3876
-