Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
putty .exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
putty .exe
Resource
win10v2004-20241007-en
General
-
Target
putty .exe
-
Size
544KB
-
MD5
0e64b6d4d68876c72a62d2d393fd8e15
-
SHA1
91451cff1cf4f6e69731c76c7b1113e455232c9c
-
SHA256
50b32932b9f18bcc2831aa83f4f3cca77d12540d7a78853409e18450921834ad
-
SHA512
1cf9e4917fae854df6fbc844574f1a2874c8033b90a189777a292adfbee21b7a3825352935e2d65da1d14ef7603ca16d69fb1b12843329fdf43257c527b77d1e
-
SSDEEP
12288:QiK05T+NhaEsDPEYkk3vNLXdVonSyNAx2ssT5E04j:KttcKivRdWnSyErsG0
Malware Config
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2960 set thread context of 4840 2960 putty .exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language putty .exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AddInProcess32.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2960 putty .exe 2960 putty .exe 2960 putty .exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2960 putty .exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2960 wrote to memory of 4840 2960 putty .exe 91 PID 2960 wrote to memory of 4840 2960 putty .exe 91 PID 2960 wrote to memory of 4840 2960 putty .exe 91 PID 2960 wrote to memory of 4840 2960 putty .exe 91 PID 2960 wrote to memory of 4840 2960 putty .exe 91 PID 2960 wrote to memory of 4840 2960 putty .exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\putty .exe"C:\Users\Admin\AppData\Local\Temp\putty .exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Checks SCSI registry key(s)
PID:4840
-