Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 16:57
Static task
static1
Behavioral task
behavioral1
Sample
caspol.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
caspol.exe
Resource
win10v2004-20241007-en
General
-
Target
caspol.exe
-
Size
85KB
-
MD5
349b01d00e67f73554971a7059dc44a1
-
SHA1
45e5bc1a2f1fb80c4b0002f88e854efe77ac7d2a
-
SHA256
aed178c142086be0416975e80515ee2301cb8ad9e6f6f852b199fa142bba51bc
-
SHA512
98eab765f9c38b27d31516ffa7eaa945a94db27ef31a6e94ec63ccc94664d58cdd8082a3b7bb09dcd483fa8b16fc9c4b123b3256cd0c93809994ddeec782129b
-
SSDEEP
1536:Mv12CLp7WB+RdtK4QjXvqu51mbgIxIS4yEqlQ8A9Qvvrdo:E2ug2gIxIS0O09Qho
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
caspol.exedescription pid process target process PID 2540 created 3488 2540 caspol.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
caspol.exedescription pid process target process PID 2540 set thread context of 3220 2540 caspol.exe InstallUtil.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
caspol.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caspol.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI InstallUtil.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI InstallUtil.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
caspol.exepid process 2540 caspol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
caspol.exedescription pid process Token: SeDebugPrivilege 2540 caspol.exe Token: SeDebugPrivilege 2540 caspol.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
caspol.exedescription pid process target process PID 2540 wrote to memory of 3220 2540 caspol.exe InstallUtil.exe PID 2540 wrote to memory of 3220 2540 caspol.exe InstallUtil.exe PID 2540 wrote to memory of 3220 2540 caspol.exe InstallUtil.exe PID 2540 wrote to memory of 3220 2540 caspol.exe InstallUtil.exe PID 2540 wrote to memory of 3220 2540 caspol.exe InstallUtil.exe PID 2540 wrote to memory of 3220 2540 caspol.exe InstallUtil.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\caspol.exe"C:\Users\Admin\AppData\Local\Temp\caspol.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Checks SCSI registry key(s)
PID:3220
-