Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 19:12
Static task
static1
Behavioral task
behavioral1
Sample
C1C410655773F828F3241046A69DC03D.exe
Resource
win10v2004-20241007-en
General
-
Target
C1C410655773F828F3241046A69DC03D.exe
-
Size
385KB
-
MD5
c1c410655773f828f3241046a69dc03d
-
SHA1
b62db3073edeb499470a16308eb89141162404a4
-
SHA256
ab8adefae61ec96282b5a1dc32286ac98fbe96b9e41eaf7c4861d5c92abc9ba0
-
SHA512
0a4eb187ce61b8f20cda8374d27c314b7eabc790c46ef7b7004e40df6ea50b783c1db76cfaccda37ec1a14e12109a8671c967ad71f7fbc3b63f4f707e3ac585d
-
SSDEEP
6144:AYLJtS4esk1EserpDjb+GwD3G3A/WKnoWUB:AY9tJ7uJu3SBD3G3ux+
Malware Config
Extracted
smokeloader
sel8
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Program crash 10 IoCs
pid pid_target Process procid_target 1208 860 WerFault.exe 82 2764 3020 WerFault.exe 104 3780 3684 WerFault.exe 109 2064 3364 WerFault.exe 118 4892 1620 WerFault.exe 121 2524 1744 WerFault.exe 124 3968 1324 WerFault.exe 127 4856 3688 WerFault.exe 130 212 648 WerFault.exe 133 3076 2632 WerFault.exe 136 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C1C410655773F828F3241046A69DC03D.exe -
Checks SCSI registry key(s) 3 TTPs 33 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1C410655773F828F3241046A69DC03D.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3104 taskmgr.exe Token: SeSystemProfilePrivilege 3104 taskmgr.exe Token: SeCreateGlobalPrivilege 3104 taskmgr.exe Token: 33 3104 taskmgr.exe Token: SeIncBasePriorityPrivilege 3104 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe 3104 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\AppData\Local\Temp\C1C410655773F828F3241046A69DC03D.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 3562⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 860 -ip 8601⤵PID:4832
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2944
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 3562⤵
- Program crash
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3020 -ip 30201⤵PID:1676
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 3202⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3684 -ip 36841⤵PID:2696
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3104
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:3364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 3202⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3364 -ip 33641⤵PID:4444
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 3202⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1620 -ip 16201⤵PID:1772
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 3202⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1744 -ip 17441⤵PID:916
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:1324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 3282⤵
- Program crash
PID:3968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1324 -ip 13241⤵PID:1520
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:3688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 3202⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3688 -ip 36881⤵PID:64
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 3202⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 648 -ip 6481⤵PID:1320
-
C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"C:\Users\Admin\Desktop\C1C410655773F828F3241046A69DC03D.exe"1⤵
- Checks SCSI registry key(s)
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 3202⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2632 -ip 26321⤵PID:4344